Search research publications and outputs

501 - 1000 out of 1,233Page size: 500
  1. Paper › Research › Peer-reviewed
  2. Combining Reinforcement Learning with Symbolic Planning

    Grounds, M. & Kudenko, D., 2007, p. 75-86.

    Research output: Contribution to conferencePaper

  3. Combining shape-from-shading and stereo using Gaussian-Markov random fields

    Haines, T. S. F. & Wilson, R. C., 8 Dec 2008, p. 1-4. 4 p.

    Research output: Contribution to conferencePaper

  4. Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM

    Stibor, T. & Timmis, J., 2007, p. 3727-3734.

    Research output: Contribution to conferencePaper

  5. Communication Systems in ClawZ

    Vernon, M., Zeyda, F. & Cavalcanti, A., 2010, p. 334-348.

    Research output: Contribution to conferencePaper

  6. Comparing Composite vs. Wave-Cores in a Novel Dark-Silicon Methodology

    Crispin-Bailey, C. & Arnone, A., 27 Jun 2016. 4 p.

    Research output: Contribution to conferencePaper

  7. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  8. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  9. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  10. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  11. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  12. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  13. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  14. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  15. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  16. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  17. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  18. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  19. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  20. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  21. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  22. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  23. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  24. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  25. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  26. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  27. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  28. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  29. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  30. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  31. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  32. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  33. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  34. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  35. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  36. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  37. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  38. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  39. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  40. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  41. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaper

  42. Deep Learning of Cell Classification using Microscope Images of Intracellular Microtubule Networks

    Alexei, S., Dmitry, B., Marina, P., Kudenko, D., Burakov, A. & Nadezhdina, E., 18 Dec 2017.

    Research output: Contribution to conferencePaper

  43. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  44. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  45. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  46. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  47. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  48. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  49. Dependency Based Embeddings for Sentence Classification Tasks

    Komninos, A. & Manandhar, S., 12 Jun 2016, p. 1490-1500. 11 p.

    Research output: Contribution to conferencePaper

  50. Depth-Based Subgraph Convolutional Neural Networks

    Zhang, Z., Hancock, E. R., Bai, L. & Cui, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  51. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  52. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  53. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  54. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  55. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  56. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  57. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  58. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  59. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  60. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  61. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  62. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  63. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  64. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  65. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  66. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  67. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  68. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  69. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  70. Directed Graph Evolution from Euler-Lagrange Dynamics

    Wang, J., Wilson, R. C. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  71. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  72. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  73. Discriminative Features Matter: Multi-layer Bilinear Pooling for Camera Localization

    Wang, X., Wang, X., Wang, C., Bai, X., Wu, J. & Hancock, E. R., 23 Jul 2019, (Accepted/In press). 12 p.

    Research output: Contribution to conferencePaper

  74. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  75. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  76. Distribution Data Across Multiple Cloud Storage Using ReinforcementLearning Method

    Algarni, A. F. H. & Kudenko, D., 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  77. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  78. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  79. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  80. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  81. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  82. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  83. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  84. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  85. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  86. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  87. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  88. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  89. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  90. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  91. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  92. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  93. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  94. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  95. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  96. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  97. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  98. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  99. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  100. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  101. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  102. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaper

  103. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  104. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  105. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  106. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  107. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  108. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  109. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  110. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  111. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  112. Evolving Test Environments to Identify Faults in Swarm Robotics Algorithms

    Wei, H., Timmis, J. I. & Alexander, R. D., 6 Jun 2017.

    Research output: Contribution to conferencePaper

  113. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  114. Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks

    Zuhily, A. & Burns, A., 2008, p. 410-424.

    Research output: Contribution to conferencePaper

  115. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  116. Experimental assessment of random testing for object-oriented software

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2007, p. 84.

    Research output: Contribution to conferencePaper

  117. Experiments in Object Trouve browsing

    Colton, S., Torres, P., Gow, J. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  118. Exploiting Loose Horizontal Coupling in Evolutionary Swarm Robotics

    Owen, J., Stepney, S., Timmis, J. & Winfield, A. F. T., 2010, p. 432-439.

    Research output: Contribution to conferencePaper

  119. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  120. Extending Argumentation to Goal-Oriented Requirements Engineering

    Habli, I., Wu, W., Attwood, K. & Kelly, T., 2007, p. 306-316.

    Research output: Contribution to conferencePaper

  121. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  122. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  123. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  124. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  125. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  126. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  127. Extreme Programming Security Practices

    Ge, X., Paige, R. F., Polack, F. & Brooke, P. J., 2007, p. 226-230. 4 p.

    Research output: Contribution to conferencePaper

  128. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  129. FIFO with Offsets: High Schedulability with Low Overheads

    Nasri, M., Davis, R. I. & Brandenburg, B., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  130. FPTC: Automated Safety Analysis for Domain-Specific Languages

    Paige, R. F., Rose, L. M., Ge, X., Kolovos, D. S. & Brooke, P. J., 2009, p. 229-242.

    Research output: Contribution to conferencePaper

  131. FSF: A Real-Time Scheduling Architecture Framework

    Aldea, M., Bernat, G., Broster, I., Burns, A., Dobrin, R., Drake, J. M., Fohler, G., Gai, P., Harbour, M. G., Guidi, G., Gutiérrez, J. J., Lennvall, T., Lipari, G., Martínez, J. M., Medina, J. L. & Trimarchi, M., 2006, p. 113-124.

    Research output: Contribution to conferencePaper

  132. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  133. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  134. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  135. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  136. Facial Shape Estimation in the Presence of Cast Shadows

    Smith, W. A. P. & Hancock, E. R., 2006, p. 779-788.

    Research output: Contribution to conferencePaper

  137. Facial Shape Spaces from Surface Normals and Geodesic Distance

    Ceolin, S., Smith, W. A. P. & Hancock, E. R., 2007, p. 416-423.

    Research output: Contribution to conferencePaper

  138. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  139. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  140. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaper

  141. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  142. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  143. Feature-Rich Networks for Knowledge Base Completion

    Manandhar, S. K. & Komninos, A., 30 Jul 2017, p. 324-329. 6 p.

    Research output: Contribution to conferencePaper

  144. First Steps in the Verified Software Grand Challenge

    Woodcock, J., 2006, p. 203-206.

    Research output: Contribution to conferencePaper

  145. Flexibility and Manageability of IMS Projects

    Stephenson, Z., Nicholson, M. & McDermid, J. A., 2006.

    Research output: Contribution to conferencePaper

  146. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  147. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  148. Formal Analysis in Model Management: Exploiting the Power of CZT

    Williams, J. R., Polack, F. A. C. & Paige, R. F., 2010, p. 414.

    Research output: Contribution to conferencePaper

  149. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  150. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  151. Formalising Flash Memory: First Steps

    Butterfield, A. & Woodcock, J., 2007, p. 251-260.

    Research output: Contribution to conferencePaper

  152. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  153. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  154. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  155. From Circus to JCSP

    Oliveira, M. & Cavalcanti, A., 2004, p. 320-340.

    Research output: Contribution to conferencePaper

  156. From Java to real-time Java: a model-driven methodology with automated toolchain

    Chang, W., Zhao, S., Wei, R., Wellings, A. J. & Burns, A., 23 Jun 2019, p. 123-134. 12 p.

    Research output: Contribution to conferencePaper

  157. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  158. From the gaming experience to the wider user experience

    Gámez, E. H. C., Cairns, P. A. & Cox, A. L., 2009, p. 520-523.

    Research output: Contribution to conferencePaper

  159. Functional Faces: Groupwise Dense Correspondence using Functional Maps

    Zhang, C., Smith, W. A. P., Dessein, A. F., Pears, N. E. & Dai, H., 26 Jun 2016, p. 5033-5041. 9 p.

    Research output: Contribution to conferencePaper

  160. Functional grouping analysis of varying reactor types in the Spiky-RBN AChem

    Krastev, M. S., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 247-254.

    Research output: Contribution to conferencePaper

  161. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  162. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  163. Game Intelligence: Proceedings of the IEEE Conference on Computational Intelligence in Games (CIG)

    Devlin, S., Cowling, P. I., Kudenko, D., Goumagias, N., Nucciarelli, A., Cabras, I., Fernandes, K. J. & Li, F., 2014.

    Research output: Contribution to conferencePaper

  164. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  165. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  166. Generation of Dilemma-Based Narratives: Method and Turing Test Evaluation

    Barber, H. & Kudenko, D., 2008, p. 214-217.

    Research output: Contribution to conferencePaper

  167. Generic component lookup

    Bay, T., Eugster, P. & Oriol, M., 2006, p. 182-197. 15 p.

    Research output: Contribution to conferencePaper

  168. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  169. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  170. Getting Farther on Software Evolution via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S. & Saake, G., 2008, p. 63-69.

    Research output: Contribution to conferencePaper

  171. Global Constraints for Lexicographic Orderings

    Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. & Walsh, T., 2002, p. 93-108.

    Research output: Contribution to conferencePaper

  172. Global Register Allocation, Register Allocation for Stack Machines

    Crispin-Bailey, C. & Shannon, M., Sep 2006. 8 p.

    Research output: Contribution to conferencePaper

  173. Gloss Overlap Extensions for a Semantic Network Algorithm: Building a Better Semantic Distance Measure

    Jayasooriya, T. & Manandhar, S., 2006, p. 74-79.

    Research output: Contribution to conferencePaper

  174. Goal-Based Safety Standards: Opportunities and Challenges

    Kelly, T. P., McDermid, J. A. & Weaver, R. A., 2005.

    Research output: Contribution to conferencePaper

  175. Goal-Oriented Automatic Test Case Generators for MC/DC Compliancy

    Aydal, E. G., Woodcock, J. & Cavalcanti, A., 2007, p. 290-295.

    Research output: Contribution to conferencePaper

  176. Grand Challenge 7: Journeys in Non-Classical Computation

    Stepney, S., Abramsky, S., Adamatzky, A., Johnson, C. G., Timmis, J., Gelenbe, E., Abramsky, S. & Sassone, V., 2008, p. 407-421.

    Research output: Contribution to conferencePaper

  177. Graph Characteristic from the Gauss-Bonnet Theorem

    ElGhawalby, H. & Hancock, E. R., 2008, p. 207-216.

    Research output: Contribution to conferencePaper

  178. Graph Drawing using Quantum Commute Time

    Emms, D., Hancock, E. & Wilson, R., 2008, p. 3743-3746. 4 p.

    Research output: Contribution to conferencePaper

  179. Graph Embedding Using an Edge-Based Wave Kernel

    ElGhawalby, H. & Hancock, E. R., 2010, p. 60-69.

    Research output: Contribution to conferencePaper

  180. Graph Matching using Adjacency Matrix Markov Chains

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  181. Graph Similarity Using Interfering Quantum Walks

    Emms, D., Hancock, E. R. & Wilson, R. C., 2007, p. 823-831.

    Research output: Contribution to conferencePaper

  182. Graph Spectral Image Smoothing

    Zhang, F. & Hancock, E. R., 2007, p. 191-203.

    Research output: Contribution to conferencePaper

  183. Grid Enabling Data De-Duplication

    Austin, J., Turner, A. & Alwis, S., 2006, p. 2.

    Research output: Contribution to conferencePaper

  184. Grouping Line-segments using Eigenclustering

    Robles-Kelly, A. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  185. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  186. HLL Enhancement for Stack Based Processors

    Crispin-Bailey, C. & Sotudeh, R., 1994. 4 p.

    Research output: Contribution to conferencePaper

  187. Haptic Virtual Reality for Blind Computer Users

    Colwell, C., Petrie, H., Kornbrot, D., Hardwick, A. & Furner, S., 1998, p. 92-99.

    Research output: Contribution to conferencePaper

  188. Hardware architecture for a Bidirectional Hetero-Associative Protein Processing Associative Memory

    Qadir, O., Liu, J., Tempesti, G., Timmis, J. & Tyrrell, A., Jun 2011, p. 208-215. 8 p.

    Research output: Contribution to conferencePaper

  189. Hardware implementation of similarity functions

    Freeman, M., Weeks, M. & Austin, J., 2005, p. 329-332.

    Research output: Contribution to conferencePaper

  190. Hazard Analysis for Security Protocol Requirements

    Foster, N. & Jacob, J. L., 2002, p. 75-92.

    Research output: Contribution to conferencePaper

  191. Health Modelling for Agility in Safety Critical Systems Development

    Stephenson, Z. R., McDermid, J. A. & Ward, A. G., 2006.

    Research output: Contribution to conferencePaper

  192. Heat Flow-Thermodynamic Depth Complexity in Networks

    Escolano, F., Lozano, M. A. & Hancock, E. R., 2010, p. 1578-1581.

    Research output: Contribution to conferencePaper

  193. Hierarchical growing cell structures: TreeGCS

    Hodge, V. J. & Austin, J., 2000, p. 553-556.

    Research output: Contribution to conferencePaper

  194. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y., McDermid, J. A., Felici, M., Kanoun, K. & Pasquini, A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  195. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  196. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

  197. High Integrity Software Development: Process and Tool Issues

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1994.

    Research output: Contribution to conferencePaper

  198. High Level Failure Analysis for Integrated Modular Avionics

    Conmy, P., McDermid, J. A. & Lindsay, P. A., 2001, p. 13-22.

    Research output: Contribution to conferencePaper

  199. High frequency forecasting with associative memories

    Pasley, A. & Austin, J., 2002, p. 433-438.

    Research output: Contribution to conferencePaper

  200. High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A. & Stephenson, Z. R., 1 Dec 2005, p. 1518-1523. 6 p.

    Research output: Contribution to conferencePaper

  201. Huge data but small programs: visualization design via multiple embedded DSLs

    Duke, D. J., Borgo, R., Runciman, C. & Wallace, M., 2009, p. 31-45. 14 p.

    Research output: Contribution to conferencePaper

  202. Human competitive security protocols synthesis

    Chen, H., Clark, J. A. & Jacob, J., 2006, p. 1855-1856.

    Research output: Contribution to conferencePaper

  203. Hypergraphs, Characteristic Polynomials and the Ihara Zeta Function

    Ren, P., Aleksic, T., Wilson, R. C. & Hancock, E. R., 2009, p. 369-376.

    Research output: Contribution to conferencePaper

  204. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaper

  205. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  206. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  207. Ide-integrated support for schema evolution in object-oriented applications

    Piccioni, M., Oriol, M. & Meyer, B., 2007, p. 27.

    Research output: Contribution to conferencePaper

  208. Identifying Perceptual Structures In Trademark Images

    Hodge, V. J., Hollier, G. P., Austin, J. & Eakins, J., 13 Feb 2008, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  209. Identifying safety dependencies in modular computer systems

    Conmy, P., Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  210. Image Segmentation using Commute Times

    Qiu, H., Hancock, E. R., Clocksin, W. F., Fitzgibbon, A. W. & Torr, P. H. S., 2005.

    Research output: Contribution to conferencePaper

  211. Immune Systems and Computation: An Interdisciplinary Adventure

    Timmis, J., Andrews, P. S., Owens, N. D. L. & Clark, E., 2008, p. 8-18.

    Research output: Contribution to conferencePaper

  212. Immune and Evolutionary Approaches to Software Mutation Testing

    May, P., Timmis, J. & Mander, K., 2007, p. 336-347.

    Research output: Contribution to conferencePaper

  213. Immuno-Engineering

    Timmis, J., Hart, E., Hone, A., Neal, M., Robins, A., Stepney, S. & Tyrrell, A., 2008.

    Research output: Contribution to conferencePaper

  214. Implementation and Application of Functional Languages

    Mitchell, N., Runciman, C., Chitil, O., Horváth, Z. & Zsók, V., 2008, p. 147-164. 18 p.

    Research output: Contribution to conferencePaper

  215. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  216. Implicit mapping of pointers inside C++ Lambda closure objects in OpenMP target offload regions

    Truby, D. R., Bertolli, C., Wright, S. A., Bercea, G-T., O'Brien, K. & Jarvis, S. A., 1 Feb 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  217. Improved local buffering schemes for ATM-based multimedia servers

    Crispin-Bailey, C., Maierhofer, M. & Sotudeh, R., Sep 1998, p. 302-306. 5 p.

    Research output: Contribution to conferencePaper

  218. Improvement to Quick Processor-Demand Analysis for EDF-Scheduled Real-Time Systems

    Zhang, F. & Burns, A., 2009, p. 76-86.

    Research output: Contribution to conferencePaper

  219. Improvements in Speaker Diarization System

    Fu, R. & Benest, I. D., 2007, p. 317-323.

    Research output: Contribution to conferencePaper

  220. Improving Multimedia Server Efficiency in ATM Networks

    Crispin-Bailey, C., Maierhofer, M. & sotudeh, R., Jul 1998.

    Research output: Contribution to conferencePaper

  221. Improving Optimistic Exploration in Model-Free Reinforcement Learning

    Grzes, M. & Kudenko, D., 2009, p. 360-369.

    Research output: Contribution to conferencePaper

  222. Improving efficiency of persistent storage access in embedded Linux

    Joyce, R. A. & Audsley, N. C., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  223. Improving the Performance of Embedded Superscalatr Microprocessors by Adding Partial Pipeline

    Crispin-Bailey, C., Shi, H., Hastie, N. & Farrel, G., 31 Aug 2005, p. 15-20. 6 p.

    Research output: Contribution to conferencePaper

  224. Incorporating epistemic uncertainty into the safety assurance of socio-technical systems

    Leong, C. W. K., Kelly, T. P. & Alexander, R. D., 29 Apr 2017.

    Research output: Contribution to conferencePaper

  225. Increased Extent of Characteristic Views using Shape-from-Shading for Object Recognition

    Worthington, P. L., Huet, B. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  226. Incremental Development of a High Integrity Compiler: Experience from an Industrial Development

    Stepney, S., 1998, p. 142-149.

    Research output: Contribution to conferencePaper

  227. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  228. Inducing a perceptual relevance shape classifier

    Hodge, V. J., Eakins, J. P. & Austin, J., 2007, p. 138-145.

    Research output: Contribution to conferencePaper

  229. Inductive Mercury Programming

    Fisher, B. & Cussens, J., 2006, p. 199-213.

    Research output: Contribution to conferencePaper

  230. Industrial Practice in Formal Methods: A Review

    Bicarregui, J., Fitzgerald, J. S., Larsen, P. G., Woodcock, J. C. P. & Dams, D., 2009, p. 810-813.

    Research output: Contribution to conferencePaper

  231. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  232. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  233. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  234. Innovations in measuring accessibility: theoretical and practical perspectives

    Petrie, H., Power, C., Adams, R., Hwang, F., Weber, G., Darzentas, J. S. & Velasco, C. A., 2008, p. 197-198.

    Research output: Contribution to conferencePaper

  235. Instruction level parallelism of stack-code under varied issue widths, and one-level branch prediction

    Bailey, C. & Shi, H., 2005, p. 23-30.

    Research output: Contribution to conferencePaper

  236. Integrated Analysis of Cache Related Preemption Delays and Cache Persistence Reload Overheads

    Rashid, S. A., Nelissen, G., Altmeyer, S., Davis, R. I. & Tovar, E., 6 Dec 2017. 11 p.

    Research output: Contribution to conferencePaper

  237. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  238. Integrating Priority Inheritance Algorithms in the Real-Time Specification for Java

    Wellings, A. J., Burns, A., Santos, O. M. D. & Brosgol, B. M., 2007, p. 115-123.

    Research output: Contribution to conferencePaper

  239. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  240. Integrative Hybrid Modelling of Plant Shoot Branching

    Garnett, P., Stepney, S. & Leyser, O., 1 Nov 2007, p. 9.1-9.5.

    Research output: Contribution to conferencePaper

  241. Intelligent Car Park Routeing for Road Traffic

    Hodge, V. J., Smith, M. & Austin, J., 22 Jun 2009, p. 326-333.

    Research output: Contribution to conferencePaper

  242. Inter-boundary scheduling of stack operands, a preliminary approach

    Crispin-Bailey, C., Nov 2000, p. 3-11. 9 p.

    Research output: Contribution to conferencePaper

  243. Inter-modelling: From Theory to Practice

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 376-391.

    Research output: Contribution to conferencePaper

  244. Interactions Between Stereotypes

    Lock, Z. P. & Kudenko, D., 2006, p. 172-181.

    Research output: Contribution to conferencePaper

  245. Interplay between Language, Navigation and Kin selection

    Kazakov, D., 2010.

    Research output: Contribution to conferencePaper

  246. Investigating Available Instruction Level Parallelism for Stack Based Machine Architectures

    Shi, H. & Bailey, C., 2004, p. 112-120.

    Research output: Contribution to conferencePaper

  247. Investigating and Formalising the Development of HIS Within PSEEs

    Gimenes, I. M. D. S., McDermid, J. A. & Schäfer, W., 1993, p. 90-94.

    Research output: Contribution to conferencePaper

  248. Investigating computer game immersion and the component real world dissociation

    Jennett, C., Cox, A. L. & Cairns, P. A., 2009, p. 3407-3412.

    Research output: Contribution to conferencePaper

  249. Investigating the Correctness and Efficiency of MrsP in Fully Partitioned Systems

    Zhao, S. & Wellings, A. J., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  250. Investigation of Stack Machine Design for Efficient High Level Language Support

    Crispin-Bailey, C. & Sotudeh, R., 1993. 4 p.

    Research output: Contribution to conferencePaper

  251. Investigation of cultural dependency in mobile technology and older adults

    Abd Malik, S. & Edwards, A. D. N., 2010, p. 3835-3840.

    Research output: Contribution to conferencePaper

  252. Isoradius Contours: New Representations and Techniques for 3D Face Registration and Matching

    Pears, N. & Heseltine, T., 2006, p. 176-183.

    Research output: Contribution to conferencePaper

  253. Issues in the Conduct of PSSA

    Dawkins, S. K., Kelly, T. P., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 1999.

    Research output: Contribution to conferencePaper

  254. Issues with using Ravenscar and the ada Distributed Systems Annex for high-integrity systems

    Audsley, N. & Wellings, A., 1 Apr 2001, p. 33-39. 7 p.

    Research output: Contribution to conferencePaper

  255. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  256. KAOS: A Goal-oriented Process Model for EIS

    Tabatabaie, M., Polack, F. A. C. & Paige, R. F., 2010, p. 40-49.

    Research output: Contribution to conferencePaper

  257. Knowledge Engineering Using the UML Profile - Adopting the Model-Driven Architecture for Knowledge-Based System Development

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 74-81.

    Research output: Contribution to conferencePaper

  258. Knowledge Modelling Using The UML Profile

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 70-77. 7 p.

    Research output: Contribution to conferencePaper

  259. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  260. Knowledge-Based Reinforcement Learning for Data Mining

    Kudenko, D. & Grzes, M., 2009, p. 21-22.

    Research output: Contribution to conferencePaper

  261. LIU H, SOTUDEH R, BAILEY C. On improving the Quality of Service for multimedia transmission in ATM networks

    Crispin-Bailey, C., Hong, L. & Sotudeh, R., 1998, p. 412-415. 4 p.

    Research output: Contribution to conferencePaper

  262. Landmark Localisation in 3D Face Data

    Romero, M. & Pears, N., 2009, p. 73-78.

    Research output: Contribution to conferencePaper

  263. Latent Distribution Preserving Deep Subspace Clustering

    Zhou, L., Xiao, B., wang, D., Liu, X., Zhou, J. & Hancock, E. R., May 2019, p. 4440-4446. 7 p.

    Research output: Contribution to conferencePaper

  264. Layout indexing of trademark images

    Leuken, R. H. V., Demirci, M. F., Hodge, V. J., Austin, J. & Veltkamp, R. C., 2007, p. 525-532.

    Research output: Contribution to conferencePaper

  265. Lazy Exploration and Checking of CSP Models with CSPsim

    Brooke, P. J. & Paige, R. F., 2007, p. 33-49.

    Research output: Contribution to conferencePaper

  266. Learning Autonomic Security Reconfiguration Policies

    Tapiador, J. E. & Clark, J. A., 2010, p. 902-909. 8 p.

    Research output: Contribution to conferencePaper

  267. Learning Binary Preference Relations: Analysis of Logic-based versus Statistical Approaches

    Qomariyah, N. N. & Kazakov, D. L., 27 Aug 2017, p. 30-34. 5 p.

    Research output: Contribution to conferencePaper

  268. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  269. Learning Electronic Systems Design with a Project Based Course on the Web

    Donzellini, G., Ponta, D., Crispin-Bailey, C., Pears, N. E. & Xu, D., Jun 1999, p. 114-121. 8 p.

    Research output: Contribution to conferencePaper

  270. Learning Multilingual Morphology with CLOG

    Manandhar, S., Dzeroski, S. & Erjavec, T., 1998, p. 135-144.

    Research output: Contribution to conferencePaper

  271. Learning Word Segmentation Rules for Tag Prediction

    Kazakov, D., Manandhar, S. & Erjavec, T., 1999, p. 152-161.

    Research output: Contribution to conferencePaper

  272. Learning to Coordinate Using Commitment Sequences in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2005, p. 106-118.

    Research output: Contribution to conferencePaper

  273. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  274. Like a DNA string: Sequence-based Player Profiling in Tom Clancy’s The Division

    Makarovych, S., Canossa, A., Togelius, J. & Drachen, A., 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  275. Linking VDM and Z

    Woodcock, J. & Freitas, L., 2008, p. 143-152.

    Research output: Contribution to conferencePaper

  276. Literate Formal Development of Ada from Z for Safety Critical Applications

    Jordan, D. T., Locke, C. J., McDermid, J. A., Parker, C., Sharpe, B. A. P. & Toyn, I., 1994.

    Research output: Contribution to conferencePaper

  277. Literate Proving: Presenting and Documenting Formal Proofs

    Cairns, P. A. & Gow, J., 2005, p. 159-173.

    Research output: Contribution to conferencePaper

  278. Local Binary Patterns for Graph Characterization

    Jawad, M., Aziz, F. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  279. Logitboost weka classifier speech segmentation

    Ziólko, B., Manandhar, S., Wilson, R. C. & Ziólko, M., 23 Jun 2008, p. 1297-1300. 4 p.

    Research output: Contribution to conferencePaper

  280. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  281. LuckyJ : an Asynchronous Evolution Platform for Component-Based Applications

    Oriol, M., 2003, p. 1-10.

    Research output: Contribution to conferencePaper

  282. MESSI: Mutant Evaluation by Static Semantic Interpretation

    Patrick, M. T., Oriol, M. Y. A. & Clark, J. A., 17 Apr 2012, (Accepted/In press).

    Research output: Contribution to conferencePaper

  283. Machine Learning and Inductive Logic Programming for Multi-agent Systems

    Kazakov, D. & Kudenko, D., 2001, p. 246-272.

    Research output: Contribution to conferencePaper

  284. Machine Learning for Logic-Based Multi-agent Systems

    Alonso, E. & Kudenko, D., 2000, p. 306-307.

    Research output: Contribution to conferencePaper

  285. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  286. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  287. Managing Architectural Design Decisions for Safety-Critical Software Systems

    Wu, W. & Kelly, T., 2006, p. 59-77.

    Research output: Contribution to conferencePaper

  288. Managing Automatically Formed Mathematical Theories

    Colton, S., Torres, P., Cairns, P. A. & Sorge, V., 2006, p. 237-250.

    Research output: Contribution to conferencePaper

  289. Mapping Correlation Matrix Memory Applications onto a Beowulf Cluster

    Weeks, M., Austin, J., Moulds, A., Turner, A., Ulanowski, Z. & Young, J., 2001, p. 156-163.

    Research output: Contribution to conferencePaper

  290. Matching Point-sets using Procrustes Alignment and the EM Algorithm

    Luo, B. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  291. Mathematics of Surfaces XIII, 13th IMA International Conference, York, UK, September 7-9, 2009

    Hancock, E. R., Martin, R. R. & Sabin, M. A., 2009.

    Research output: Contribution to conferencePaper

  292. Measuring user experience of websites: think aloud protocols and an emotion word prompt list

    Petrie, H. & Precious, J., 2010, p. 3673-3678.

    Research output: Contribution to conferencePaper

  293. Mechanised Translation of Control Law Diagrams into Circus

    Zeyda, F. & Cavalcanti, A., 2009, p. 151-166.

    Research output: Contribution to conferencePaper

  294. Mechanising a Unifying Theory

    Nuka, G. & Woodcock, J., 2006, p. 217-235.

    Research output: Contribution to conferencePaper

  295. Medical diagnostic based on encrypted medical data

    Gribov, A., Horan, K., Gryak, J., Najarian, K., Shpilrain, V., Soroushmehr, S. M. R. & Kahrobaei, D., 2019, p. 98-111. 14 p.

    Research output: Contribution to conferencePaper

  296. Merging Models with the Epsilon Merging Language (EML)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 215-229.

    Research output: Contribution to conferencePaper

  297. Metamodelling and Conformance Checking with PVS

    Paige, R. F. & Ostroff, J. S., 2001, p. 2-16. 14 p.

    Research output: Contribution to conferencePaper

  298. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  299. Migrating Activity Diagrams with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  300. Migrating Mixed Criticality Tasks within a Cyclic Executive Framework

    Burns, A. & Baruah, S., 2017, p. 203-216. 14 p.

    Research output: Contribution to conferencePaper

  301. Miniature Untethered EEG Recorder Improves Advanced Neuroscience Methodologies

    Crispin-Bailey, C., Austin, J., Moulds, A., Platt, B. & Crouch, B., 14 Aug 2019, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  302. Minimal distortion 3-D watermarking using statistics of geodesic distances

    Luo, M. & Bors, A. G., Aug 2012, p. 1683-1687.

    Research output: Contribution to conferencePaper

  303. Mixed Criticality Systems with Varying Context Switch Costs

    Davis, R. I., Altmeyer, S. & Burns, A., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  304. Mobile Phone Preferences and Values: the U.K. vs. Korea

    Cha, H., Oshlyansky, L. & Cairns, P. A., 2005, p. 29-41.

    Research output: Contribution to conferencePaper

  305. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  306. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  307. Model Migration Case

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  308. Model Migration with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010, p. 184--198.

    Research output: Contribution to conferencePaper

  309. Model-based design flow for NoC-based MPSoCs

    Ost, L., Indrusiak, L. S., Maatta, S., Mandelli, M., Nurmi, J. & Moraes, F., 1 Dec 2010, p. 750 -753.

    Research output: Contribution to conferencePaper

  310. Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems

    Mahmood, T., Kazmierczak, E., Kelly, T. & Plunkett, D., 2007, p. 175-182.

    Research output: Contribution to conferencePaper

  311. Modeling of Dual-Route Fear Conditioning Paradigm in the Auditory Cortex

    Sengupta, B., Austin, J. & Green, G., 2005, p. 3632-3644.

    Research output: Contribution to conferencePaper

  312. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  313. Modelling Complex Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999.

    Research output: Contribution to conferencePaper

  314. Modelling Incremental Learning With The Batch SOM Training Method

    Baez-Monroy, V. O. & O'Keefe, S., 2005, p. 542-544.

    Research output: Contribution to conferencePaper

  315. Modelling and Implementing Complex Systems with Timebands

    Woodcock, J., Oliveira, M., Burns, A. & Wei, K., 2010, p. 1-13.

    Research output: Contribution to conferencePaper

  316. Modelling and simulation of granuloma formation in visceral leishmaniasis

    Flugge, A. J., Timmis, J., Andrews, P. S., Moore, J. W. J. & Kaye, P. M., 2009, p. 3052-3059.

    Research output: Contribution to conferencePaper

  317. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  318. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  319. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  320. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  321. Motion information combination for fast human action recognition

    Meng, H., Pears, N. & Bailey, C., 2007, p. 21-28.

    Research output: Contribution to conferencePaper

  322. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  323. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  324. Moving Virtual Source Perception in 3D Space

    Hughes, S. S. & Kearney, G. C., 30 Sep 2016.

    Research output: Contribution to conferencePaper

  325. Multi-Agent Potential-based Reward Shaping for RoboCup KeepAway

    Devlin, S., Grzes, M. & Kudenko, D., May 2011.

    Research output: Contribution to conferencePaper

  326. Multi-Agent Reinforcement Learning for Intrusion Detection: A case study and evaluation

    Servin, A. & Kudenko, D., 2008, p. 873-874.

    Research output: Contribution to conferencePaper

  327. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  328. Multi-agent Reinforcement Learning for Intrusion Detection

    Servin, A. & Kudenko, D., 2007, p. 211-223.

    Research output: Contribution to conferencePaper

  329. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaper

  330. Multigrid Reinforcement Learning with Reward Shaping

    Grzes, M. & Kudenko, D., 2008, p. 357-366.

    Research output: Contribution to conferencePaper

  331. Multiple image disparity correction for 3-D scene representation

    Grum, M. & Bors, A. G., Oct 2008, p. 209-212. 4 p.

    Research output: Contribution to conferencePaper

  332. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  333. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  334. Net4lap: Neural Laplacian Regularization for Ranking and Re-Ranking

    Curado, M., Escolano, F., Lozano, M. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  335. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  336. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  337. NoCScope: A graphical interface to improve Networks-on-Chip monitoring and design space exploration

    Moller, L., Indrusiak, L. S. & Glesner, M., 1 Nov 2009, p. 1 -6.

    Research output: Contribution to conferencePaper

  338. Non-rigid 3D Shape Registration using an Adaptive Template

    Dai, H., Pears, N. E. & Smith, W. A. P., 14 Sep 2018. 15 p.

    Research output: Contribution to conferencePaper

  339. Nonclassical readout of optical memories under local energy constraint

    Spedalieri, G., Lupo, C. & Pirandola, S., 3 Sep 2015, p. 1-11. 11 p.

    Research output: Contribution to conferencePaper

  340. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  341. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  342. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  343. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  344. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  345. Object distance and its application to adaptive random testing of object-oriented programs

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2006, p. 63.

    Research output: Contribution to conferencePaper

  346. Object-Orientation in the UTP

    Santos, T. L. V. L., Cavalcanti, A. & Sampaio, A., 2006, p. 18-37.

    Research output: Contribution to conferencePaper

  347. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  348. On Homeostasis in Collective Robotic Systems

    Timmis, J. & Tyrrell, A. M., 2010, p. 307-309.

    Research output: Contribution to conferencePaper

  349. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  350. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  351. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  352. On modelling user observations in the UTP

    Banks, M. J. & Jacob, J. L., 2010, p. 101--119.

    Research output: Contribution to conferencePaper

  353. On the Accuracy of Tactile Displays

    Power, C., 2006, p. 1155-1162.

    Research output: Contribution to conferencePaper

  354. On the Digital Certificate Management in Advanced Metering Infrastructure Networks

    Vasilakis, V., Moscholios, I., Vardakas, J. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 5 p.

    Research output: Contribution to conferencePaper

  355. On the Effectiveness of Test Extraction without Overhead

    Leitner, A., Pretschner, A., Mori, S., Meyer, B. & Oriol, M., 1 Apr 2009, p. 416--425.

    Research output: Contribution to conferencePaper

  356. On the Predictability of Random Tests for Object-Oriented Software

    Ciupa, I., Pretschner, A., Leitner, A., Oriol, M. & Meyer, B., 1 Apr 2008, p. 72--81.

    Research output: Contribution to conferencePaper

  357. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  358. On the meaning of modes in uniprocessor real-time systems

    Martins, P. & Burns, A., 2008, p. 324-325.

    Research output: Contribution to conferencePaper

  359. Open source projects in programming courses

    Pedroni, M., Bay, T., Oriol, M. & Pedroni, A., 2007, p. 454.

    Research output: Contribution to conferencePaper

  360. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  361. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  362. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaper

  363. Origins of the Grid Architectural Style

    Cakic, J. & Paige, R. F., 2006, p. 227-235. 8 p.

    Research output: Contribution to conferencePaper

  364. POSIX and the Verification Grand Challenge: A Roadmap

    Freitas, L., Woodcock, J. & Butterfield, A., 2008, p. 153-162.

    Research output: Contribution to conferencePaper

  365. POSIX file store in Z/Eves: an experiment in the verified software repository

    Freitas, L., Fu, Z. & Woodcock, J., 2007, p. 3-14.

    Research output: Contribution to conferencePaper

  366. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  367. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  368. Parallel reinforcement learning with linear function approximation

    Grounds, M. & Kudenko, D., 2007, p. 45.

    Research output: Contribution to conferencePaper

  369. Parameter Optimisation in the Receptor Density Algorithm

    Hilder, J. A., Owens, N. D. L., Timmis, J., Hickey, P., Kilgour, S. & Tyrrell, A., Jun 2011, p. 226-239. 13 p.

    Research output: Contribution to conferencePaper

  370. Particle Swarm Optimization of Bollinger Bands

    Butler, M. & Kazakov, D., 2010, p. 504-511.

    Research output: Contribution to conferencePaper

  371. Parts based generative models for graphs

    White, D. & Wilson, R. C., 8 Dec 2008, p. 1-4.

    Research output: Contribution to conferencePaper

  372. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  373. People with Disabilities: Automatic and Manual Evaluation of Web Sites

    Petrie, H. & Weber, G., 2006, p. 152-155.

    Research output: Contribution to conferencePaper

  374. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  375. Performance of second order particle-in-cell methods on modern many-core architectures

    Brown, D., Bettencourt, M. T., Wright, S. A., Jones, J. P. & Jarvis, S. A., 1 Oct 2017, (Accepted/In press).

    Research output: Contribution to conferencePaper

  376. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  377. Personalization of Interactive Systems: Introduction to the Special Thematic Session

    Petrie, H. & Weber, G., 2004, p. 117-120.

    Research output: Contribution to conferencePaper

  378. Persuasive Technology for Leisure and Health: Development of a Personal Navigation Tool

    McCreadie, C., Raper, J., Gunesh, A., Wood, J., Carey, K., Petrie, H., Wood, L., Survey, O., Tyler, S. & Biggs, S., 2006, p. 187-190.

    Research output: Contribution to conferencePaper

  379. Phoneme segmentation of speech

    Ziólko, B., Manandhar, S. & Wilson, R. C., 1 Sep 2006, p. 282-285. 4 p.

    Research output: Contribution to conferencePaper

  380. Pointers and Records in the Unifying Theories of Programming

    Cavalcanti, A., Harwood, W. & Woodcock, J., 2006, p. 200-216.

    Research output: Contribution to conferencePaper

  381. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  382. Practical Formal Specification for Embedded Control Systems

    Iwu, F., Galloway, A. J., Toyn, I. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  383. Practical single view metrology for cuboids

    Pears, N., Wright, P. & Bailey, C., 2007, p. 85-90.

    Research output: Contribution to conferencePaper

  384. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  385. Primitives for the dynamic evolution of component-based applications

    Oriol, M., 2007, p. 1122.

    Research output: Contribution to conferencePaper

  386. Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks

    Shi, Z. & Burns, A., 2008, p. 421-430.

    Research output: Contribution to conferencePaper

  387. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  388. Probabilistic Analysis for Mixed Criticality Systems using Fixed Priority Preemptive Scheduling

    Maxim, D., Davis, R. I., Cucu-Grosjean, L. & Easwaran, A., 4 Oct 2017. 10 p.

    Research output: Contribution to conferencePaper

  389. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  390. Proc. British Machine Vision Conference (BMVC), vol II: Navier-Stokes Formulation for Modelling Turbulent Optical Flow

    Doshi, A. & Bors, A. G., Sep 2007, p. 640-649.

    Research output: Contribution to conferencePaper

  391. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  392. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  393. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  394. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  395. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  396. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  397. Proving Theorems About JML Classes

    Freitas, L. & Woodcock, J., 2007, p. 255-279.

    Research output: Contribution to conferencePaper

  398. Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation

    Aydal, E. G., Paige, R. F., Utting, M. & Woodcock, J., 2009, p. 131-140.

    Research output: Contribution to conferencePaper

  399. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  400. Quantum Teleportation of Wavepackets in a Non-Gaussian State

    Lee, N., Takeno, Y., Benichi, H., Yonezawa, H., Webb, J., Huntington, E., Mista, Jr., L., Filip, R., van Loock, P., Braunstein, S. L. & Furusawa, A., 2009, p. 2221-2222.

    Research output: Contribution to conferencePaper

  401. Quantum algorithms in group theory

    Batty, M., Braunstein, SL., Duncan, AJ. & Rees, S., 2004, p. 1-62.

    Research output: Contribution to conferencePaper

  402. Quantum cryptography with an ideal local relay

    Spedalieri, G., Ottaviani, C., Braunstein, S. L., Gehring, T., Jacobsen, C. S., Andersen, U. L. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  403. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  404. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  405. Qubus computation - art. no. 63050D

    Munro, W. J., Nemoto, K., Spiller, T. P., van Loock, P., Braunstein, S. L. & Milburn, G. J., 2006, p. D3050.

    Research output: Contribution to conferencePaper

  406. RBF shape histograms and their application to 3D face processing

    Pears, N., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  407. RBN-World: The hunt for a rich AChem

    Faulconbridge, A., Stepney, S. & Miller, J. F., 2010, p. 261--268.

    Research output: Contribution to conferencePaper

  408. Radiance function estimation for object classification

    Robles-Kelly, A. & Hancock, E. R., 2004, p. 67-75. 9 p.

    Research output: Contribution to conferencePaper

  409. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  410. Re-evaluation of the role of the processor within embedded multiprocessor systems

    Freeman, M. & Bailey, C., 2009, p. 181-188. 8 p.

    Research output: Contribution to conferencePaper

  411. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  412. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  413. Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching

    Shi, Z. & Burns, A., 1 Apr 2008, p. 161 -170.

    Research output: Contribution to conferencePaper

  414. Real-Time Communication Analysis with a Priority Share Policy in On-Chip Networks

    Shi, Z. & Burns, A., 2009, p. 3-12.

    Research output: Contribution to conferencePaper

  415. Real-Time Utilities for Ada 2005

    Wellings, A. J. & Burns, A., 2007, p. 1-14.

    Research output: Contribution to conferencePaper

  416. Realism in Statistical Analysis of Worst Case Execution Times

    Griffin, D. & Burns, A., 2010, p. 44-53.

    Research output: Contribution to conferencePaper

  417. Recognising Facial Expressions Using Spherical Harmonics

    Sharpe, J. & Hancock, E. R., 2008, p. 157-166.

    Research output: Contribution to conferencePaper

  418. Recovering 3D Shape Using an Improved Fast Marching Method

    Zou, C. & Hancock, E. R., 2010, p. 1678-1681.

    Research output: Contribution to conferencePaper

  419. Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 3324-3327.

    Research output: Contribution to conferencePaper

  420. Refinement: An overview

    Cavalcanti, A., Sampaio, A. & Woodcock, J., 2004, p. 1-17.

    Research output: Contribution to conferencePaper

  421. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  422. Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009.

    Research output: Contribution to conferencePaper

  423. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  424. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  425. Refining Implicit Function Representations of 3-D Scenes: Proc. British Machine Vision Conference(BMVC), vol. II

    Grum, M. & Bors, A. G., Sep 2007, p. 710-719.

    Research output: Contribution to conferencePaper

  426. Reflective Grammatical Evolution

    Timperley, C. & Stepney, S., 2014, p. 71–78.

    Research output: Contribution to conferencePaper

  427. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaper

  428. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  429. Regularising the Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 579-588.

    Research output: Contribution to conferencePaper

  430. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  431. Reinforcement Learning in RoboCup KeepAway with Partial Observability

    Devlin, S., Grzes, M. & Kudenko, D., 2009, p. 201-208.

    Research output: Contribution to conferencePaper

  432. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  433. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  434. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  435. Reputation Attacks in Mediated and Automated Systems

    Rabaiotti, JR., Chivers, H. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  436. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  437. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  438. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  439. Requirements for Performing Safety Analysis on Operating Systems

    Conmy, P. M. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  440. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  441. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  442. Research methods for HCI

    Cox, A. L., Cairns, P. A., Thimbleby, H. W. & Webb, N., 2008, p. 221-222.

    Research output: Contribution to conferencePaper

  443. Reservoir Computing in materio with LEDs

    Dale, M. N., Miller, J. F., Stepney, S. & Trefzer, M. A., 2017.

    Research output: Contribution to conferencePaper

  444. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaper

  445. Resource sharing in RTSJ and SCJ systems

    Wellings, A., Lin, S. & Burns, A., Oct 2011.

    Research output: Contribution to conferencePaper

  446. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaper

  447. Response Time Analysis of Synchronous Data Flow Programs on a Many-Core Processor

    Rihani, H., Moy, M., Maiza, C., Davis, R. I. & Altmeyer, S., Oct 2016.

    Research output: Contribution to conferencePaper

  448. Restoring broken entanglement by separable correlations

    Spedalieri, G. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  449. Retrenching the Purse: Finite Exception Logs, and Validating the Small

    Banach, R., Poppleton, M. & Stepney, S., 2006, p. 234-248.

    Research output: Contribution to conferencePaper

  450. Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2006, p. 82-90.

    Research output: Contribution to conferencePaper

  451. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  452. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  453. Reviewing and Evaluating Automatic Term Recognition Techniques

    Korkontzelos, I., Klapaftis, I. P. & Manandhar, S., 2008, p. 248-259.

    Research output: Contribution to conferencePaper

  454. Rewriting History to Exploit Gain Time

    Bernat, G., Broster, I. & Burns, A., 2004, p. 328-335.

    Research output: Contribution to conferencePaper

  455. Robust Computation of the Polarisation Image

    Saman, G. & Hancock, E. R., 2010, p. 971-974.

    Research output: Contribution to conferencePaper

  456. Robust Diffusion of Structural Flows for Volumetric Image Interpolation

    Doshi, A. & Bors, A. G., Sep 2006, p. 1225-1228. 4 p.

    Research output: Contribution to conferencePaper

  457. Robust Shape from Polarisation and Shading

    Huynh, C. P., Robles-Kelly, A. & Hancock, E. R., 2010, p. 810-813.

    Research output: Contribution to conferencePaper

  458. Robustness Analysis of SARSA(lambda): Different Models of Reward and Initialisation

    Grzes, M. & Kudenko, D., 2008, p. 144-156.

    Research output: Contribution to conferencePaper

  459. Role Identification for Accurate Analysis in Dota 2

    Demediuk, S. P., York, P. J., Block, F. O., Walker, J. A. & Drachen, A., 8 Oct 2019.

    Research output: Contribution to conferencePaper

  460. SAT Encodings of the AT-Most-k Constraint: Some Old, Some New, Some Fast, Some Slow

    Frisch, A. M. & Giannaros, P. A., 2010.

    Research output: Contribution to conferencePaper

  461. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  462. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaper

  463. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  464. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  465. Safety Analysis of Software Architectures - "LIghtweight PSSA"

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  466. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  467. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  468. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  469. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  470. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  471. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  472. Safety Tactics for Software Architecture Design

    Wu, W. & Kelly, T., 2004, p. 368-375.

    Research output: Contribution to conferencePaper

  473. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  474. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  475. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  476. Schemas in Directed Emergent Drama

    Arinbjarnar, M. & Kudenko, D., 2008, p. 180-185.

    Research output: Contribution to conferencePaper

  477. Screening the parameters affecting heuristic performance

    Ridge, E. & Kudenko, D., 2007, p. 180.

    Research output: Contribution to conferencePaper