Search research publications and outputs

  1. "Devices are people too" - Using process patterns to elicit security requirements in novel domains: A ubiquitous healthcare example

    Liu, Y., Clark, J. A. & Stepney, S., 2005, SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS. Hutter, D. & Ullmann, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 31-45 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. (True) polymorphism in SPARK2000

    Lin, T. M. & McDermid, J. A., 2000, RELIABLE SOFTWARE TECHNOLOGIES ADA-EUROPE 2000. Keller, HB. & Plodereder, E. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 252-265 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 09381 Extended Abstracts Collection - Refinement Based Methods for the Construction of Dependable Systems

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009, Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009. Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, Vol. 09381. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 1st international workshop on assurance cases for software-intensive systems (ASSURE 2013)

    Denney, E., Pai, G., Habli, I., Kelly, T. & Knight, J. C., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1505-1506 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 1st international workshop on combining modelling and search-based software engineering (CMSBSE 2013)

    Harman, M., Paige, R. F. & Williams, J. R., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1513-1514 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2nd International Workshop on Software Engineering Methods in Spreadsheets (SEMS 2015)

    Hermans, F., Paige, R. F. & Sestoft, P., 2015, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. Bertolino, A. (ed.). IEEE, Vol. 2. p. 1005-1006 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  8. 3-D terrain from synthetic aperture radar images

    Bors, A. G., Hancock, E. R. & Wilson, R. C., 2000, IEEE WORKSHOP ON COMPUTER VISION BEYOND THE VISIBLE SPECTRUM: METHODS AND APPLICATIONS, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 3D Face Recognition

    Mian, A. & Pears, N. E., 2012, 3D Imaging, Analysis and Applications. Springer, p. 311-366 55 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. 3D Facial Landmark Localisation by Matching Simple Descriptors

    Romero-Huertas, M. & Pears, N., 2008, 2008 IEEE SECOND INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS). NEW YORK: IEEE, p. 346-351 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. 3D Imaging, Analysis and Applications

    Pears, N. E. (ed.), Liu, Y. (ed.) & Bunting, P. (ed.), 2012, Springer. 500 p.

    Research output: Book/ReportBook

  12. 3D Landmark Model Discovery from a Registered Set of Organic Shapes

    Creusot, C., Pears, N. & Austin, J., 16 Jun 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) . p. 57-64 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 3D Morphable Face Models Revisited

    Patel, A. & Smith, W. A. P., 2009, CVPR: 2009 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-4. NEW YORK: IEEE, p. 1327-1334 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 3D Object Recognition Using Hyper-Graphs and Ranked Local Invariant Features

    Xia, S. & Hancock, E. R., 2008, STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION. DaVitoria Lobo, N., Kasparis, T., Roli, F., Kwok, JT., Georgiopoulos, M., Anagnostopoulos, GC. & Loog, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, Vol. 5342 LNCS. p. 117-126 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. 3D Shape Classification Using Commute Time

    Haseeb, M. & Hancock, E., 2012, Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, SSPRSPR 2012, Hiroshima, Japan, November 7-9, 2012. Proceedings. Gimel'farb, G. L., Hancock, E. R., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T. & Yamada, K. (eds.). Springer Berlin/Heidelberg, Vol. 7626. p. 208-215 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. 3D scene correction using disparities with its projections

    Grum, M. & Bors, A. G., Jun 2013, Proc. IEEE Workshop on Image, Video and Multidimensional Signal Processing, Seoul, Korea, . IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. 5th international workshop on modeling in software engineering (MiSE 2013)

    Atlee, J. M., Baillargeon, R., Chechik, M., France, R. B., Gray, J., Paige, R. F. & Rumpe, B., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1531-1532 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. 7th International Workshop on Modeling in Software Engineering (MiSE 2015)

    Gray, J., Chechik, M., Kulkarni, V. & Paige, R. F., 2015, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. Bertolino, A. (ed.). IEEE, Vol. 2. p. 985-986 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 30 Nov 2017.

    Research output: Contribution to conferencePaper

  20. A BAYESIAN INTERPRETATION FOR THE HOPFIELD NETWORK

    HANCOCK, E. R. & KITTLER, J., 1993, 1993 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-3. NEW YORK: I E E E, COMPUTER SOC PRESS, p. 341-346 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. A Bailout Protocol for Mixed Criticality Systems

    Bate, I., Burns, A. & Davis, R. I., 1 Jul 2015, Proceedings, 27th Euromicro Conference on Real-Time Systems: ECRTS 2015. IEEE, p. 259-268 10 p. (Euromicro Conference on Real-Time Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. A Bayesian Analysis of Algorithms for Learning Finite Functions

    Cussens, J., 1995, Machine Learning: Proceedings of the Twelfth International Conference (ML95). Prieditis, A. & Russell, S. (eds.). San Francisco, CA: Morgan Kaufmann Publishers, p. 142-149 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. A Bayesian approach to 3D surface fitting and refinement.

    Turner, M. & Hancock, E. R., 1995, PROCEEDINGS OF THE 6TH BRITISH MACHINE VISION CONFERENCE 1995, VOLS 1 AND 2. Pycock, D. (ed.). GUILDFORD: B M V A PRESS, p. 67-76 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  25. A Candid Industrial Evaluation of Formal Software Verification using Model Checking

    Bennion, M. & Habli, I., 2014, ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering. ACM, p. 175-184 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  27. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  28. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  29. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  30. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  31. A Characterisation of the Workload on an Engineering Design Grid

    Burkimsher, A., Bate, I. J. & Indrusiak, L. S., 2014, Proceedings of the 22nd High Performance Computing Symposium (HPC). San Diego: Society for Computer Simulation International, p. 639-646 8 p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  33. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  34. A Circus semantics for Ravenscar protected objects

    Atiya, D. A., King, S. & Woodcock, J. C. P., 2003, FME 2003: FORMAL METHODS, PROCEEDINGS. Araki, K., Gnesi, S. & Mandrioli, D. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 617-635 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  36. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  37. A Comparison of CS Student Backgrounds at Two Universities

    Pedroni, M. & Oriol, M., 2009.

    Research output: Working paper

  38. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  39. A Comparison of Model Migration Tools

    Rose, L., Herrmannsdoerfer, M., Williams, J., Kolovos, D., Garces, K., Paige, R., Polack, F., Petriu, D. (ed.), Rouquette, N. (ed.) & Haugen, Ã. (ed.), 2010, Model Driven Engineering Languages and Systems. PART 1 ed. Springer Berlin / Heidelberg, Vol. 6394. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  41. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  42. A Computational Model of Degeneracy in a Lymph Node

    Andrews, P. & Timmis, J., 2006, p. 164-177.

    Research output: Contribution to conferenceOther

  43. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  44. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  45. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  46. A Continuous-Time Quantum Walk Kernel for Unattributed Graphs

    Rossi, L., Torsello, A. & Hancock, E. R., 2013, Graph-Based Representations in Pattern Recognition. Kropatsch, W., Artner, N., Haxhimusa, Y. & Jiang, X. (eds.). Springer Berlin / Heidelberg, Vol. 7877. p. 101-110 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  47. A Contract-based Approach to Designing Safe Systems

    Bate, I., Hawkins, R., McDermid, J., Lindsay, P. A. & Cant, A., 2003, Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software. p. 25-36 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. A Control Theoretic Approach for Workflow Management

    Ghazzawi, H. A., Bate, I. & Indrusiak, L. S., 1 Jul 2012, In Proceedings of 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems. p. 280-289 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  50. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  51. A Cross-Cultural Study of Motivations to Participate in a Crowdsourcing Project to Support People with Disabilities

    Layas, F., Petrie, H. & Power, C. D., 2015, Third AAAI Conference on Human Computation and Crowdsourcing.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. A DETAILED INVESTIGATION INTO THE EFFECTIVENESS OF EARCONS

    Brewster, S. A., Wright, P. C. & Edwards, A. D. N., 1994, AUDITORY DISPLAY. Kramer, G. (ed.). READING: ADDISON-WESLEY PUBL CO, p. 471-498 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE-DESIGN

    McDermid, J. A. & Pumfrey, D. J., 1994, COMPASS '94 - PROCEEDINGS OF THE NINTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE. NEW YORK: I E E E, p. 17-25 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  55. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  56. A Database and Evaluation for Classification of RNA Molecules Using Graph Methods

    Algul, E. & Wilson, R. C., 13 Jun 2019, Graph-Based Representations in Pattern Recognition - 12th IAPR-TC-15 International Workshop, GbRPR 2019, Tours, France, June 19-21, 2019, Proceedings. Springer, p. 78-87 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. A Demonstrably Correct Compiler

    Stepney, S., Whitely, D., Cooper, D. & Grant, C., 1991

    Article in Formal Asp. Comput.

  58. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  59. A Deployment Value Model for Intrusion Detection Sensors

    Shaikh, S. A., Chivers, H., Nobles, P., Clark, J. A. & Chen, H., 2009, Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 200. Vol. 5576 LNCS. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  61. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  62. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  63. A Failure and Recovery Algebra

    McDermid, J. A., 1992.

    Research output: Working paper

  64. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  65. A Fast Jensen-Shannon Subgraph Kernel

    Bai, L. & Hancock, E. R., 2013, Image Analysis and Processing – ICIAP 2013. Petrosino, A. (ed.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8156. p. 181-190 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  66. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  67. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  68. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  69. A Formal Model for Natural-Language Timed Requirements of Reactive Systems

    Carvalho, G., Carvalho, A., Rocha, E., Cavalcanti, A. L. C. & Sampaio, A. C. A., 2014, Formal Methods and Software Engineering: 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings. Merz, S. & Pang, J. (eds.). SPRINGER, p. 43-58 16 p. (Lecture Notes in Computer Science; vol. 8829).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  71. A Formal Model of the Safety-Critical Java Level 2 Paradigm

    Luckcuck, M. S., Cavalcanti, A. L. C. & Wellings, A. J., 24 May 2016, Integrated Formal Methods. Springer, p. 226-241 (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...54 Next