Search research publications and outputs

  1. 2021
  2. 2020
  3. Learning Safe Neural Network Controllers with Barrier Certificates

    Zhao, H., Zeng, X., Chen, T., Liu, Z. & Woodcock, J., 18 Sep 2020, (CoRR).

    Research output: Working paper

  4. 2019
  5. Entropic Dynamic Time Warping Kernels for Co-evolving Financial Time Series Analysis

    Bai, L., Cui, L., Xu, L., Wang, Y., Zhang, Z. & Hancock, E. R., 21 Oct 2019, Arxiv (Cornell University).

    Research output: Working paper

  6. Learning Aligned-Spatial Graph Convolutional Networks for Graph Classification

    Bai, L., Jiao, Y., Cui, L. & Hancock, E. R., 6 Apr 2019, (arXiv).

    Research output: Working paper

  7. Learning Vertex Convolutional Networks for Graph Classification

    Bai, L., Cui, L., Wu, S., Jiao, Y. & Hancock, E. R., 26 Feb 2019, (arXiv).

    Research output: Working paper

  8. 2018
  9. Graph Convolutional Neural Networks based on Quantum Vertex Saliency

    Bai, L., Jiao, Y., Rossi, L., Cui, L., Cheng, J. & Hancock, E. R., 4 Sep 2018, (arXiv).

    Research output: Working paper

  10. 2017
  11. Evidence of coupling between magnon excitation and the Gilbert damping in half-metallic oxides

    Lu, X., Atkinson, L. J., Kuerbanjiang, B., Liu, B., Li, G., Wang, Y., Wang, J., Ruan, X., Wu, J., Evans, R. F. L., Lazarov, V. K., Chantrell, R. W. & Xu, Y., 30 Oct 2017, Arxiv (Cornell University).

    Research output: Working paper

  12. 2016
  13. Super-Additivity and Entanglement Assistance in Quantum Reading

    Lupo, C. & Pirandola, S., 4 Mar 2016.

    Research output: Working paper

  14. Thermal Quantum Metrology

    Spedalieri, G., Braunstein, S. L. & Pirandola, S., 18 Feb 2016.

    Research output: Working paper

  15. Automatic Modelling of 3D Craniofacial Form

    Pears, N. E. & Duncan, C., 22 Jan 2016, p. 1-57, 57 p.

    Research output: Working paper

  16. Optimal Performance of a Quantum Network

    Pirandola, S., 5 Jan 2016.

    Research output: Working paper

  17. 2015
  18. General Benchmarks for Quantum Repeaters

    Pirandola, S. & Laurenza, R., 15 Dec 2015, p. 1-12, 12 p.

    Research output: Working paper

  19. Fundamental Limits of Repeaterless Quantum Communications

    Pirandola, S., Laurenza, R., Ottaviani, C. & Banchi, L., 29 Oct 2015, p. 1-34, 34 p.

    Research output: Working paper

  20. Non-Markovian Reactivation of Quantum Relays

    Pirandola, S., Ottaviani, C., Jacobsen, C. S., Spedalieri, G., Braunstein, S. L., Gehring, T. & Andersen, U. L., 27 May 2015, p. 1-7, 7 p.

    Research output: Working paper

  21. Modular Dynamics of Financial Market Networks

    Silva, F. N., Comin, C. H., Peron, T. K. D., Rodrigues, F. A., Ye, C., Wilson, R. C., Hancock, E. & Costa, L. . F., 21 Jan 2015, p. 1-13, 13 p.

    Research output: Working paper

  22. 2013
  23. How Discord underlies the Noise Resilience of Quantum Illumination

    Weedbrook, C., Pirandola, S., Thompson, J., Vedral, V. & Gu, M., 11 Dec 2013, p. 1-7.

    Research output: Working paper

  24. Interpreting the von Neumann entropy of graph Laplacians, and coentropic graphs

    de Beaudrap, N., Giovannetti, V., Severini, S. & Wilson, R., 30 Apr 2013, p. 1-7.

    Research output: Working paper

  25. Metrics for Computing Trust in a Multi-Agent Environment

    Bista, S. K., Dahal, K. P., Cowling, P. I. & Tuladhar, B. M., 2013.

    Research output: Working paper

  26. Unraveling the Evolution of Defectors in Online Business Games

    Bista, S. K., Dahal, K. P., Cowling, P. I. & Tuladhar, B. M., 2013.

    Research output: Working paper

  27. 2011
  28. Cryptanalysis of Song's advanced smart card based password authentication protocol

    Tapiador, J. E., Hernandez-Castro, J. C., Peris-Lopez, P. & Clark, J. A., 11 Nov 2011.

    Research output: Working paper

  29. 2010
  30. 2009
  31. Further Inductive Mercury Programming and IMP0.5

    Fisher, B. & Cussens, J., 1 Mar 2009.

    Research output: Working paper

  32. A Comparison of CS Student Backgrounds at Two Universities

    Pedroni, M. & Oriol, M., 2009.

    Research output: Working paper

  33. Security Threats in Mobile Ad Hoc Networks

    Sen, S. & Clark, JA., 2009.

    Research output: Working paper

  34. 2006
  35. Asynchronous Patterns for Dynamic Maintenance

    Oriol, M., 2006, Zurich: Citeseer.

    Research output: Working paper

  36. 2005
  37. Toward Practical Dynamic Software Updating

    Neamtiu, I., Stoyle, G., Oriol, M. & Hicks, M., 2005, College Park: Citeseer.

    Research output: Working paper

  38. 2003
  39. The Language of Causation for Describing the Behaviour of Systems

    Moffett, J. D., Hall, J. G. & McDermid, J. A., 19 Oct 2003.

    Research output: Working paper

  40. 2002
  41. Comparative Data Mining for Microarrays: A Case Study Based on Multiple Myeloma

    Page, D., Zhan, F., Cussens, J., Waddell, M., Hardin, J., Barlogie, B. & Shaughnessy, Jr., J., 1 Nov 2002.

    Research output: Working paper

  42. An Introduction to ZedCharts and Its Applications

    Shi, F., McDermid, J. A. & Armstrong, J. M., 17 Jan 2002.

    Research output: Working paper

  43. 2001
  44. A Z Subset for Direct Implementation and Code Generation

    Shi, F. G., McDermid, J. A. & Armstrong, J. M., 17 Nov 2001.

    Research output: Working paper

  45. A Safe Subset of Statecharts for Safety-Critical Applications

    Shi, F. G., Armstrong, J. M. & McDermid, J. A., 17 Aug 2001.

    Research output: Working paper

  46. 2000
  47. Dependability Measurement of Safety Critical Systems: Models and Data Refinement

    Jackson, T. O., McDermid, J. A., Wand, I. C. & Wilikens, M., 15 Sep 2000.

    Research output: Working paper

  48. An Electronic Purse: Specification, Refinement, and Proof

    Stepney, S., Cooper, D. & Woodcock, J., 1 Jul 2000, Oxford: Oxford University Computing Laboratory.

    Research output: Working paper

  49. 1999
  50. ASAM II Concepts: Principles Underlying the Construction of Safety Cases Using SAM

    McDermid, J. A., Fenelon, P. & Wilson, S. P., 16 Apr 1999.

    Research output: Working paper

  51. 1994
  52. Dependability Measurement of Safety Critical Systems

    Jackson, T. O., McDermid, J. A., Wand, I. C. & Wilikens, M., 1994.

    Research output: Working paper

  53. 1993
  54. An Examination of the Efficiency of Sorted Deduction

    Abrams, C. B. & Frisch, A. M., Mar 1993.

    Research output: Working paper

  55. 1992
  56. An Evaluation of the Ten15 Persistent Store

    Blanchard, T. D. & McDermid, J. A., 1 Dec 1992.

    Research output: Working paper

  57. Handling Composition of Systems Using Matrices

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1 Jan 1992.

    Research output: Working paper

  58. A Failure and Recovery Algebra

    McDermid, J. A., 1992.

    Research output: Working paper

  59. Guiding Reuse with Risk Assessments

    Burd, E. L. & McDermid, J. A., 1992.

    Research output: Working paper

  60. Reuse as a Project Management Tool

    Burd, E. L. & McDermid, J. A., 1992.

    Research output: Working paper

  61. The Probe Project

    Blanchard, T. D. & McDermid, J. A., 1992.

    Research output: Working paper

  62. 1991
  63. What is Integration and do IPSEs Provide It?

    Brown, A. W. & McDermid, J. A., 1991.

    Research output: Working paper

  64. 1990
  65. On the Trustworthiness of Computing Systems

    Dobson, J. E., McDermid, J. A. & Randell, B., 1990.

    Research output: Working paper

  66. Requirements and Constraints on Software Engineering Environments for Dependable Systems

    McDermid, J. A., Hocking, E. S., Shi, Q. & Dobson, J. E., 1990.

    Research output: Working paper

  67. Specification and Design for Timeliness

    Kopetz, H., Fohler, G., Kantz, H., Schuetz, W., Zainlinger, R., Burns, A., McDermid, J. A. & Bhattacharyya, A., 1990.

    Research output: Working paper

  68. The Analysis of Safety Arguments in the Specification of a Motor Speed Control Loop

    Clarke, S. J., Coombes, A. & McDermid, J. A., 1990.

    Research output: Working paper

  69. XVDM - Exercise and Execute VDM Directly

    Heping, H., Mander, K. C. & McDermid, J. A., 1990.

    Research output: Working paper

  70. 1989
  71. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1989.

    Research output: Working paper

  72. Some Issues in The Formal Design of Redundant Systems

    McDermid, J. A. & Morgan, G., 1989.

    Research output: Working paper

  73. 1987
  74. Assurance in High Integrity Software

    McDermid, J. A., 1987.

    Research output: Working paper

  75. 1982
  76. Ada on multiple processors

    McDermid, J. A., 1982, Royal Signals and Radar Establishment, 9 p.

    Research output: Working paper

  77. 1980
  78. Production of Hierarchic Checkpoint Structures

    McDermid, J. A., 1980, Royal Signals and Radar Establishment.

    Research output: Working paper

  79. 1979
  80. An introduction to the FLEX computer system

    Foster, J. M., Moir, C. I., Currie, I. F., McDermid, J. A., Edwards, P. W., Morison, J. D. & Pygott, C. H., 1979, Defense Technical Information Center, 22 p.

    Research output: Working paper

  81. Fault Tolerant Computing

    McDermid, J. A., 1979, Royal Signals and Radar Establishment, 25 p.

    Research output: Working paper

  82. 1977