Search research publications and outputs

  1. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  2. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 14 May 2017, (Accepted/In press).

    Research output: Contribution to conferencePaper

  3. A 65nm CMOS lossless bio-signal compression circuit with 250 femtoJoule performance per bit.

    Crispin-Bailey, C., Dai, C. & Austin, J., 30 Aug 2019, p. 1-14. 14 p.

    Research output: Contribution to conferencePaper

  4. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  5. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  6. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  7. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  8. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  9. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  10. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  11. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  12. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  13. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  14. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  15. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  16. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  17. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  18. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaper

  19. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  20. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  21. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  22. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  23. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  24. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  25. A Deep Hybrid Graph Kernel through Deep Learning Networks

    Cui, L., Bai, L., Rossi, L. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  26. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  27. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  28. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  29. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  30. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  31. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  32. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  33. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  34. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  35. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  36. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  37. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  38. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaper

  39. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  40. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  41. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  42. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  43. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  44. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  45. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  46. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaper

  47. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  48. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  49. A JAVA bread-board simulator digital circuit simulation with an extensible e-learning tool

    Bailey, C. & Freeman, M. J., 2009, p. 299-306. 8 p.

    Research output: Contribution to conferencePaper

  50. A Layered Behavioural Model of Platelets

    Schneider, S., Treharne, H., Cavalcanti, A. & Woodcock, J., 2006, p. 98-106.

    Research output: Contribution to conferencePaper

  51. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  52. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  53. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  54. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  55. A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems

    Mokhtar, M., Bi, R., Timmis, J. & Tyrrell, A. M., May 2009, p. 2055-2062. 8 p.

    Research output: Contribution to conferencePaper

  56. A Navigation-based Algorithm for Matching Scenario Patterns

    Ma, J., Zhao, G. & Hancock, E. R., 2007, p. 151-157.

    Research output: Contribution to conferencePaper

  57. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  58. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  59. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  60. A New Framework for Grayscale and Colour Non-lambertian Shape-from-Shading

    Smith, W. A. P. & Hancock, E. R., 2007, p. 869-880.

    Research output: Contribution to conferencePaper

  61. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  62. A New Paradigm for SpeckNets: Inspiration from Fungal Colonies

    Falconer, R., Bown, J., Hart, E. & Timmis, J., 2008, p. 90-95.

    Research output: Contribution to conferencePaper

  63. A Note on Traces Refinement and the it onf Relation in the Unifying Theories of Programming

    Cavalcanti, A. & Gaudel, M-C., 2008, p. 42-61.

    Research output: Contribution to conferencePaper

  64. A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Laurens, P., Paige, R. F., Brooke, P. J. & Chivers, H., 2007, p. 97-106.

    Research output: Contribution to conferencePaper

  65. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  66. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  67. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  68. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  69. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  70. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  71. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  72. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  73. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  74. A Research Agenda for Metaheuristic Standardization

    Swan, J., Adriaensen, S., Bishr, M., Burke, E. K., Clark, J. A., De Causmaecker, P., Durillo, J., Hammond, K., Hart, E., Johnson, C. G., Kocsis, Z. A., Kovitz, B., Krawiec, K., Martin, S., Merelo, J. J., Minku, L. L., Özcan, E., Pappa, G. L., Pesch, E., Garcia-Sànchez, P. & 7 othersSchaerf, A., Sim, K., Smith, J., Stützle, T., Stefan, V., Wagner, S. & Yao, X., Jun 2015, p. 1-3. 3 p.

    Research output: Contribution to conferencePaper

  75. A Rigorous Evaluation of Crossover and Mutation in Genetic Programming

    White, D. & Poulding, S., 2009, p. 220-231. 12 p.

    Research output: Contribution to conferencePaper

  76. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  77. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  78. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  79. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  80. A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Menon, C. & Alexander, R. D., 1 Nov 2017.

    Research output: Contribution to conferencePaper

  81. A Secure Scheme for Group Communication of Wireless IoT Devices

    Alohali, B., Vasilakis, V., Moscholios, I. & Logothetis, M., 27 Sep 2018. 6 p.

    Research output: Contribution to conferencePaper

  82. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  83. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  84. A Signature-based Intrusion Detection System for the Internet of Things

    Ioulianou, P., Vasilakis, V., Moscholios, I. & Logothetis, M., 8 Jun 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  85. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  86. A Static Checker for Safe Pattern Matching in Haskell

    Mitchell, N., Runciman, C. & Eekelen, M. V., 2007, p. 15-30.

    Research output: Contribution to conferencePaper

  87. A Strategic Roadmap for Business Model Change for the Video-games Industry

    Goumagias, N., Purvis, K., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. & Kudenko, D., 3 May 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  88. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  89. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  90. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  91. A Systematic Approach for Designing Mutation Operators for MDE languages

    Alhwikem, F. H. M., Paige, R. F., Rose, L. M. & Alexander, R. D., Oct 2016.

    Research output: Contribution to conferencePaper

  92. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  93. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  94. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  95. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  96. A Theory of Pointers for the UTP

    Harwood, W., Cavalcanti, A. & Woodcock, J., 2008, p. 141-155.

    Research output: Contribution to conferencePaper

  97. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  98. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  99. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  100. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  101. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  102. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  103. A UML Profile for Knowledge-Based Systems Modelling

    Abdullah, M. S., Paige, R. F., Kimble, C. & Benest, I. D., 20 Aug 2007, p. 871-878.

    Research output: Contribution to conferencePaper

  104. A Unified Neighbor Reconstruction Method for Embeddings

    Hancock, E. R., Zhang, Z. H. & Bai, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  105. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  106. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  107. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  108. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  109. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  110. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  111. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  112. A framework for describing and comparing courses and curricula

    Pedroni, M., Oriol, M. & Meyer, B., 1 Jun 2007, p. 131.

    Research output: Contribution to conferencePaper

  113. A functional-logic library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, p. 37--48.

    Research output: Contribution to conferencePaper

  114. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  115. A high abstraction, high accuracy power estimation model for networks-on-chip

    Ost, L., Guindani, G., Indrusiak, L. S., Reinbrecht, C., Raupp, T. & Moraes, F., 2009, p. 31:1--31:6.

    Research output: Contribution to conferencePaper

  116. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  117. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaper

  118. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  119. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  120. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  121. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  122. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaper

  123. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  124. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  125. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  126. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  127. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  128. A unified model of specular and diffuse reflectance for rough, glossy surfaces

    Smith, W. A. P. & Hancock, E. R., 2009, p. 643-650.

    Research output: Contribution to conferencePaper

  129. ABZ2008 VSR-Net Workshop

    Woodcock, J. & Boca, P., 2008, p. 378-379.

    Research output: Contribution to conferencePaper

  130. AI and Automatic Music Generation for Mindfulness

    Williams, D., Hodge, V. J., Gega, L., Murphy, D., Cowling, P. I. & Drachen, A., 17 Mar 2019. 10 p.

    Research output: Contribution to conferencePaper

  131. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data

    Ting, I-H., Clark, L., Kimble, C., Kudenko, D. & Wright, P., 2007, p. 66-73.

    Research output: Contribution to conferencePaper

  132. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  133. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  134. Abstracting Complex Languages through Transformation and Composition

    Johannes, J., Zschaler, S., Fernández, M. A., Castillo, A., Kolovos, D. S. & Paige, R. F., 2009, p. 546-550.

    Research output: Contribution to conferencePaper

  135. Abstraction and Reformulation in the Generation of Constraint Models

    Frisch, A. M., 2007, p. 2-3.

    Research output: Contribution to conferencePaper

  136. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  137. Accessibility 2.0: people, policies and processes

    Kelly, B., Sloan, D., Brown, S., Seale, J., Petrie, H., Lauke, P. & Ball, S., 2007, p. 138-147.

    Research output: Contribution to conferencePaper

  138. Accessibility in non-professional web authoring tools: a missed web 2.0 opportunity?

    Power, C. & Petrie, H., 2007, p. 116-119.

    Research output: Contribution to conferencePaper

  139. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  140. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  141. Accessible Player Experiences (APX): The Players

    Power, C. D., Beeston, J. T. & Cairns, P., 25 Mar 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  142. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  143. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  144. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  145. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  146. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  147. Adaptable Lymphocytes for Artificial Immune Systems

    Andrews, P. S. & Timmis, J., 2008, p. 376-386.

    Research output: Contribution to conferencePaper

  148. Adaptive Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  149. Adaptivity in Question Answering with User Modelling and a Dialogue Interface

    Quarteroni, S. & Manandhar, S., 2006.

    Research output: Contribution to conferencePaper

  150. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  151. Advanced Structural Representations for Question Classification and Answer Re-ranking

    Quarteroni, S., Moschitti, A., Manandhar, S., Basili, R., Amati, G., Carpineto, C. & Romano, G., 2007, p. 234-245.

    Research output: Contribution to conferencePaper

  152. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  153. Aggregation of Information leaked by a MANET

    Murdoch, J., Clark, J. A., McDermid, J. A., Chivers, H. R. & Worthington, O., 2007.

    Research output: Contribution to conferencePaper

  154. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  155. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  156. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  157. Agile development of secure web applications

    Ge, X., Paige, R. F., Polack, F., Chivers, H. & Brooke, P. J., 2006, p. 305-312. 7 p.

    Research output: Contribution to conferencePaper

  158. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  159. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  160. An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks

    Ochirsuren, E., Indrusiak, L. S. & Glesner, M., 1 Jun 2008, p. 174 -179.

    Research output: Contribution to conferencePaper

  161. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  162. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  163. An Analysis of Approaches to Model Migration

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  164. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  165. An Analysis of Problem Difficulty for a Class of Optimisation Heuristics

    Ridge, E. & Kudenko, D., 2007, p. 198-209.

    Research output: Contribution to conferencePaper

  166. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  167. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  168. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  169. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction

    Secker, A., Davies, M. N., Freitas, A. A., Timmis, J., Clark, E. & Flower, D. R., 2008, p. 242-253.

    Research output: Contribution to conferencePaper

  170. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  171. An Associative Memory for Association Rule Mining

    Baez-Monroy, V. O. & O'Keefe, S., 2007, p. 2227-2232.

    Research output: Contribution to conferencePaper

  172. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  173. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  174. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  175. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  176. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  177. An Empirical Analysis of the Impact of Prioritised Sweeping on the DynaQ's Performance

    Grzes, M. & Kudenko, D., 2008, p. 1041-1051.

    Research output: Contribution to conferencePaper

  178. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  179. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  180. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  181. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  182. An FPGA-based system for development of real-time embedded vision applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 2007, p. 33-40. 8 p.

    Research output: Contribution to conferencePaper

  183. An IDE-based, Integrated Solution to Schema Evolution of Object-Oriented Software

    Piccioni, M., Oriol, M., Meyer, B. & Schneider, T., 1 Nov 2009, p. 650--654. 4 p.

    Research output: Contribution to conferencePaper

  184. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  185. An Investigation into the Use of Mutation Analysis for Automated Program Repair

    Timperley, C. S., Stepney, S. & Le Goues, C., 17 Aug 2017, p. 99-114. 16 p.

    Research output: Contribution to conferencePaper

  186. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  187. An Investigation on the Compression Quality of aiNet

    Stibor, T. & Timmis, J., 2007, p. 495-502.

    Research output: Contribution to conferencePaper

  188. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  189. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  190. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  191. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  192. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  193. An action semantics for MOF 2.0

    Paige, R. F., Kolovos, D. S., Polack, F. & Haddad, H., 2006, p. 1304-1305.

    Research output: Contribution to conferencePaper

  194. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  195. An improved speaker diarization system

    Fu, R. & Benest, I. D., 2007, p. 2605-2608.

    Research output: Contribution to conferencePaper

  196. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  197. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  198. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  199. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  200. Analogue Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  201. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  202. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  203. Analysis of Hierarchical EDF Pre-emptive Scheduling

    Zhang, F. & Burns, A., 2007, p. 423-434.

    Research output: Contribution to conferencePaper

  204. Analysis of Write-back Caches under Fixed-priority Preemptive and Non-preemptive Scheduling

    Davis, R. I., Altmeyer, S. & Reineke, J., Oct 2016.

    Research output: Contribution to conferencePaper

  205. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  206. Anisotropic fluid solver for robust optical flow smoothing

    Doshi, A. & Bors, A. G., 6 May 2009, p. 117-120.

    Research output: Contribution to conferencePaper

  207. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  208. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  209. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  210. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  211. Applying UML Interactions and Actor-Oriented Simulation to the Design Space Exploration of Network-on-Chip Interconnects

    Indrusiak, L. S., Ost, L., Moller, L., Moraes, F. & Glesner, M., 1 Apr 2008, p. 491 -494.

    Research output: Contribution to conferencePaper

  212. Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, p. 929-930.

    Research output: Contribution to conferencePaper

  213. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  214. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  215. Approximating 3D facial shape from photographs using coupled statistical models

    Castelan, M., Smith, W. A. P. & Hancock, E. R., 2006, p. 89-98. 10 p.

    Research output: Contribution to conferencePaper

  216. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  217. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  218. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  219. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  220. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  221. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  222. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  223. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  224. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  225. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  226. Auditory Immersion of 5.1 Virtualization within Gameplay

    Hughes, S. S. & Kearney, G. C., 27 Sep 2016.

    Research output: Contribution to conferencePaper

  227. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  228. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  229. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  230. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  231. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  232. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  233. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  234. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  235. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  236. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  237. Automatic Generation of Information-seeking Questions Using Concept Clusters

    Li, S. & Manandhar, S., 2009, p. 93-96.

    Research output: Contribution to conferencePaper

  238. Automatic Generation of Integrated Formal Models Corresponding to UML System Models

    Treharne, H., Turner, E., Paige, R. F. & Kolovos, D. S., 2009, p. 357-367.

    Research output: Contribution to conferencePaper

  239. Automatic Generation of Verified Concurrent Hardware

    Oliveira, M. & Woodcock, J., 2007, p. 286-306.

    Research output: Contribution to conferencePaper

  240. Automatic Multilingual Lexicon Generation using Wikipedia as a Resource

    Shahid, A. R. & Kazakov, D., 2009, p. 357-360.

    Research output: Contribution to conferencePaper

  241. Automatic Test Data Generation for Multiple Condition and MCDC Coverage

    Ghani, K., Clark, J. A., Boness, K., Fernandes, J. M., Hall, J. G., Machado, R. J. & Oberhauser, R., 2009, p. 152-157. 6 p.

    Research output: Contribution to conferencePaper

  242. Automatic Translation from it ircus to Java

    Freitas, A. & Cavalcanti, A., 2006, p. 115-130.

    Research output: Contribution to conferencePaper

  243. Automatic extraction of notions from course material

    Pedroni, M., Oriol, M., Meyer, B. & Angerer, L., 2008, p. 251.

    Research output: Contribution to conferencePaper

  244. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  245. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  246. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  247. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  248. Automorphisms of transition graphs for a linear cellular automaton

    Powley, E. J. & Stepney, S., 2008, p. 55-68.

    Research output: Contribution to conferencePaper

  249. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity

    Amálio, N., Polack, F. & Zhang, J., 2008, p. 323-336.

    Research output: Contribution to conferencePaper

  250. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  251. Background Subtraction in Video Using Recursive Mixture Models, Spatio-Temporal Filtering and Shadow Removal

    Chen, Z., Pears, N., Freeman, M. & Austin, J., 2009, p. 1141-1150.

    Research output: Contribution to conferencePaper

  252. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  253. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  254. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  255. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

  256. Binary neural network based 3D facial feature localization

    Ju, Q., O'Keefe, S. & Austin, J., 2009, p. 1462-1469.

    Research output: Contribution to conferencePaper

  257. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  258. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  259. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  260. Blind and robust mesh watermarking using manifold harmonics

    Wang, K., Luo, M., Bors, A. G. & Denis, F., Nov 2009, p. 3657-3660. 4 p.

    Research output: Contribution to conferencePaper

  261. BookLeaf: An Unstructured Hydrodynamics Mini-application

    Truby, D., Wright, S. A., Kevis, R., Maheswaran, S., Herdman, A. & Jarvis, S. A., 10 Sep 2018. 8 p.

    Research output: Contribution to conferencePaper

  262. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  263. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  264. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  265. Building for Users not for Experts: Designing a Visualization of the Literature Domain

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 707-712.

    Research output: Contribution to conferencePaper

  266. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  267. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  268. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  269. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  270. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  271. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  272. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  273. Can we Remove the Human from Hazard Analysis?

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  274. Capturing player experiences with post-game commentaries.

    Gow, J., Cairns, P. A., Colton, S., Baumgarten, R. & Miller, P., 2010.

    Research output: Contribution to conferencePaper

  275. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  276. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  277. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  278. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  279. Certification of Autonomous Systems

    R Alexander, M. H-M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  280. Certification of Autonomous Systems under UK Military Safety Standards

    Alexander, R., Hall-May, M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  281. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  282. Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System

    Habli, I. & Kelly, T., 2007, p. 193-202.

    Research output: Contribution to conferencePaper

  283. Challenges of evaluating the information visualisation experience

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 167-170.

    Research output: Contribution to conferencePaper

  284. Challenges when using Model-Driven Architecture in the development of Safety Critical Software

    Conmy, P. & Paige, R. F., 31 Mar 2007, p. 127-136. 9 p.

    Research output: Contribution to conferencePaper

  285. Character Education Using Pedagogical Agents and Socratic Voice

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  286. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  287. Characterising Facial Gender Difference Using Fisher-Rao Metric

    Ceolin, S. & Hancock, E. R., 2010, p. 4308-4311.

    Research output: Contribution to conferencePaper

  288. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  289. Characterising embedded applications using a UML profile

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Oct 2009, p. 172 -175.

    Research output: Contribution to conferencePaper

  290. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  291. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  292. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  293. Clustering Morphological Paradigms Using Syntactic Categories

    Can, B. & Manandhar, S., 2009, p. 641-648.

    Research output: Contribution to conferencePaper

  294. Co-designing the computational model and the computing substrate

    Stepney, S., 2019, p. 5–14. 10 p.

    Research output: Contribution to conferencePaper

  295. Co-ordinating Knowledge in Pervasive Environments

    Nixon, L., Tolksdorf, R., Wood, A. M. & Menezes, R., 2007, p. to appear.

    Research output: Contribution to conferencePaper

  296. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  297. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  298. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  299. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  300. Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005

    Burns, A., Wellings, A. J. & Zhang, F., 2009, p. 119-133.

    Research output: Contribution to conferencePaper

  301. Combining Gameplay Data with Monte Carlo Tree Search to Emulate Human Play

    Devlin, S., Anspoka, A., Sephton, N. J., Cowling, P. I. & Rollason, J., 19 Sep 2016.

    Research output: Contribution to conferencePaper

  302. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  303. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  304. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

  305. Combining Reinforcement Learning with Symbolic Planning

    Grounds, M. & Kudenko, D., 2007, p. 75-86.

    Research output: Contribution to conferencePaper

  306. Combining Simulation with Machine Learning to Build Accident Models

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  307. Combining shape-from-shading and stereo using Gaussian-Markov random fields

    Haines, T. S. F. & Wilson, R. C., 8 Dec 2008, p. 1-4. 4 p.

    Research output: Contribution to conferencePaper

  308. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  309. Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM

    Stibor, T. & Timmis, J., 2007, p. 3727-3734.

    Research output: Contribution to conferencePaper

  310. Communicating Complex Systems

    Welch, P. H., Barnes, F. R. M. & Polack, F., 2006, p. 107-120.

    Research output: Contribution to conferencePaper

  311. Communication Systems in ClawZ

    Vernon, M., Zeyda, F. & Cavalcanti, A., 2010, p. 334-348.

    Research output: Contribution to conferencePaper

  312. Commute-Time Convolution Kernels for Graph Clustering

    Rahman, N. A. & Hancock, E. R., 2010, p. 316-323.

    Research output: Contribution to conferencePaper

  313. Comparing Composite vs. Wave-Cores in a Novel Dark-Silicon Methodology

    Crispin-Bailey, C. & Arnone, A., 27 Jun 2016. 4 p.

    Research output: Contribution to conferencePaper

  314. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  315. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  316. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  317. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  318. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  319. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  320. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  321. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  322. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  323. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  324. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  325. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  326. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  327. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  328. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  329. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  330. Concordance: A Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 245-260.

    Research output: Contribution to conferencePaper

  331. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  332. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  333. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  334. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  335. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  336. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  337. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  338. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  339. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  340. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  341. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  342. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  343. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  344. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  345. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  346. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  347. Coordination of Collaborative Engineering: State of the Art and Future Challenges

    Pawlak, A., Sandkuhl, K., Cholewa, W. & Indrusiak, L. S., 2007.

    Research output: Contribution to conferencePaper

  348. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  349. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  350. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  351. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  352. Cotranslational Protein Folding with L-systems

    Danks, G. B., Stepney, S., Caves, L. S. D., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 289-296.

    Research output: Contribution to conferencePaper

  353. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  354. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  355. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  356. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  357. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  358. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  359. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  360. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  361. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaper

  362. Deep Learning of Cell Classification using Microscope Images of Intracellular Microtubule Networks

    Alexei, S., Dmitry, B., Marina, P., Kudenko, D., Burakov, A. & Nadezhdina, E., 18 Dec 2017.

    Research output: Contribution to conferencePaper

  363. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  364. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  365. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  366. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  367. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  368. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  369. Dependency Based Embeddings for Sentence Classification Tasks

    Komninos, A. & Manandhar, S., 12 Jun 2016, p. 1490-1500. 11 p.

    Research output: Contribution to conferencePaper

  370. Depth-Based Subgraph Convolutional Neural Networks

    Zhang, Z., Hancock, E. R., Bai, L. & Cui, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  371. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  372. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  373. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  374. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  375. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  376. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  377. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  378. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  379. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  380. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  381. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  382. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  383. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  384. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  385. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  386. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  387. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  388. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  389. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  390. Developing user requirements for visualizations of literature knowledge domains

    Faisal, S., Cairns, P. & Blandford, A., 2006, p. 264-269.

    Research output: Contribution to conferencePaper

  391. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  392. Deviational Analyses for Validating Regulations on Real Systems

    Polack, F., Srivatanakul, T., Kelly, T., Clark, J. A., Laleau, R. & Lemoine, M., 2006.

    Research output: Contribution to conferencePaper

  393. Directed Graph Evolution from Euler-Lagrange Dynamics

    Wang, J., Wilson, R. C. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  394. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  395. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  396. Discriminative Features Matter: Multi-layer Bilinear Pooling for Camera Localization

    Wang, X., Wang, X., Wang, C., Bai, X., Wu, J. & Hancock, E. R., 23 Jul 2019, (Accepted/In press). 12 p.

    Research output: Contribution to conferencePaper

  397. Dispatching Domains for Multiprocessor Platforms and Their Representation in Ada

    Burns, A. & Wellings, A. J., 2010, p. 41-53.

    Research output: Contribution to conferencePaper

  398. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  399. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  400. Distribution Data Across Multiple Cloud Storage Using ReinforcementLearning Method

    Algarni, A. F. H. & Kudenko, D., 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  401. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  402. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  403. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  404. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  405. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  406. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  407. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  408. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  409. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  410. Ecore to GenModel Case

    Kolovos, D. S., Rose, L. M., Paige, R. F. & de Lara, J., 2010.

    Research output: Contribution to conferencePaper

  411. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  412. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  413. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  414. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  415. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  416. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  417. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  418. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  419. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  420. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  421. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  422. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  423. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  424. Enforcing Behaviour with Anonymity

    Wright, J. & Stepney, S., 2008.

    Research output: Contribution to conferencePaper

  425. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  426. Engineering Emergence

    Stepney, S., Polack, F. & Turner, H. R., 2006, p. 89-97.

    Research output: Contribution to conferencePaper

  427. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  428. Ensuring Dependable Systems of Systems

    Kelly, T., Hall-May, M. & Alexander, R., 2007.

    Research output: Contribution to conferencePaper

  429. Environment orientation: an architecture for simulating complex systems

    Hoverd, T. & Stepney, S., 2009, p. 67-82.

    Research output: Contribution to conferencePaper

  430. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  431. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  432. Equivalence Arguments for Complex Systems Simulations: A Case-Study

    Ghetiu, T., Alexander, R., Andrews, P., Polack, F. & Bown, J., 2009.

    Research output: Contribution to conferencePaper

  433. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaper

  434. Escaping the Non-Quantitative Trap

    Alexander, R. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  435. Establishing Private Communications in Open Systems using Multicapabilities

    Udzir, N. I. & Wood, A., 1 Apr 2006.

    Research output: Contribution to conferencePaper

  436. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  437. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  438. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  439. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  440. Ethics and the safety of autonomous systems

    Menon, C. & Alexander, R. D., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  441. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  442. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  443. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  444. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  445. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  446. Evolving Test Environments to Identify Faults in Swarm Robotics Algorithms

    Wei, H., Timmis, J. I. & Alexander, R. D., 6 Jun 2017.

    Research output: Contribution to conferencePaper

  447. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  448. Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks

    Zuhily, A. & Burns, A., 2008, p. 410-424.

    Research output: Contribution to conferencePaper

  449. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  450. Experience Report: Visualizing Data through Functional Pipelines

    Duke, D., Borgo, R., Runciman, C. & Wallace, M., 1 Sep 2008, p. 379--382.

    Research output: Contribution to conferencePaper

  451. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  452. Experimental assessment of random testing for object-oriented software

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2007, p. 84.

    Research output: Contribution to conferencePaper

  453. Experiments in Object Trouve browsing

    Colton, S., Torres, P., Gow, J. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  454. Exploiting Loose Horizontal Coupling in Evolutionary Swarm Robotics

    Owen, J., Stepney, S., Timmis, J. & Winfield, A. F. T., 2010, p. 432-439.

    Research output: Contribution to conferencePaper

  455. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  456. Extending Argumentation to Goal-Oriented Requirements Engineering

    Habli, I., Wu, W., Attwood, K. & Kelly, T., 2007, p. 306-316.

    Research output: Contribution to conferencePaper

  457. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  458. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  459. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  460. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  461. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  462. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  463. Extending the safety case concept to address dependability

    Despotou, G. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  464. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  465. Extreme Programming Security Practices

    Ge, X., Paige, R. F., Polack, F. & Brooke, P. J., 2007, p. 226-230. 4 p.

    Research output: Contribution to conferencePaper

  466. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  467. FIFO with Offsets: High Schedulability with Low Overheads

    Nasri, M., Davis, R. I. & Brandenburg, B., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  468. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  469. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  470. FPTC: Automated Safety Analysis for Domain-Specific Languages

    Paige, R. F., Rose, L. M., Ge, X., Kolovos, D. S. & Brooke, P. J., 2009, p. 229-242.

    Research output: Contribution to conferencePaper

  471. FSF: A Real-Time Scheduling Architecture Framework

    Aldea, M., Bernat, G., Broster, I., Burns, A., Dobrin, R., Drake, J. M., Fohler, G., Gai, P., Harbour, M. G., Guidi, G., Gutiérrez, J. J., Lennvall, T., Lipari, G., Martínez, J. M., Medina, J. L. & Trimarchi, M., 2006, p. 113-124.

    Research output: Contribution to conferencePaper

  472. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  473. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  474. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  475. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  476. Facial Shape Estimation in the Presence of Cast Shadows

    Smith, W. A. P. & Hancock, E. R., 2006, p. 779-788.

    Research output: Contribution to conferencePaper

  477. Facial Shape Spaces from Surface Normals and Geodesic Distance

    Ceolin, S., Smith, W. A. P. & Hancock, E. R., 2007, p. 416-423.

    Research output: Contribution to conferencePaper

  478. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  479. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  480. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next