Search research publications and outputs

  1. "Devices are people too" - Using process patterns to elicit security requirements in novel domains: A ubiquitous healthcare example

    Liu, Y., Clark, J. A. & Stepney, S., 2005, SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS. Hutter, D. & Ullmann, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 31-45 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. (True) polymorphism in SPARK2000

    Lin, T. M. & McDermid, J. A., 2000, RELIABLE SOFTWARE TECHNOLOGIES ADA-EUROPE 2000. Keller, HB. & Plodereder, E. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 252-265 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 09381 Extended Abstracts Collection - Refinement Based Methods for the Construction of Dependable Systems

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009, Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009. Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, Vol. 09381. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 1st international workshop on assurance cases for software-intensive systems (ASSURE 2013)

    Denney, E., Pai, G., Habli, I., Kelly, T. & Knight, J. C., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1505-1506 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 1st international workshop on combining modelling and search-based software engineering (CMSBSE 2013)

    Harman, M., Paige, R. F. & Williams, J. R., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1513-1514 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2nd International Workshop on Software Engineering Methods in Spreadsheets (SEMS 2015)

    Hermans, F., Paige, R. F. & Sestoft, P., 2015, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. Bertolino, A. (ed.). IEEE, Vol. 2. p. 1005-1006 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 3-D terrain from synthetic aperture radar images

    Bors, A. G., Hancock, E. R. & Wilson, R. C., 2000, IEEE WORKSHOP ON COMPUTER VISION BEYOND THE VISIBLE SPECTRUM: METHODS AND APPLICATIONS, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 3D Facial Landmark Localisation by Matching Simple Descriptors

    Romero-Huertas, M. & Pears, N., 2008, 2008 IEEE SECOND INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS). NEW YORK: IEEE, p. 346-351 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 3D Landmark Model Discovery from a Registered Set of Organic Shapes

    Creusot, C., Pears, N. & Austin, J., 16 Jun 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) . p. 57-64 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 3D Morphable Face Models Revisited

    Patel, A. & Smith, W. A. P., 2009, CVPR: 2009 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-4. NEW YORK: IEEE, p. 1327-1334 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. 3D Object Recognition Using Hyper-Graphs and Ranked Local Invariant Features

    Xia, S. & Hancock, E. R., 2008, STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION. DaVitoria Lobo, N., Kasparis, T., Roli, F., Kwok, JT., Georgiopoulos, M., Anagnostopoulos, GC. & Loog, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, Vol. 5342 LNCS. p. 117-126 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 3D scene correction using disparities with its projections

    Grum, M. & Bors, A. G., Jun 2013, Proc. IEEE Workshop on Image, Video and Multidimensional Signal Processing, Seoul, Korea, . IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 5th international workshop on modeling in software engineering (MiSE 2013)

    Atlee, J. M., Baillargeon, R., Chechik, M., France, R. B., Gray, J., Paige, R. F. & Rumpe, B., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1531-1532 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 7th International Workshop on Modeling in Software Engineering (MiSE 2015)

    Gray, J., Chechik, M., Kulkarni, V. & Paige, R. F., 2015, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. Bertolino, A. (ed.). IEEE, Vol. 2. p. 985-986 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. A BAYESIAN INTERPRETATION FOR THE HOPFIELD NETWORK

    HANCOCK, E. R. & KITTLER, J., 1993, 1993 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-3. NEW YORK: I E E E, COMPUTER SOC PRESS, p. 341-346 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. A Bailout Protocol for Mixed Criticality Systems

    Bate, I., Burns, A. & Davis, R. I., 1 Jul 2015, Proceedings, 27th Euromicro Conference on Real-Time Systems: ECRTS 2015. IEEE, p. 259-268 10 p. (Euromicro Conference on Real-Time Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. A Bayesian Analysis of Algorithms for Learning Finite Functions

    Cussens, J., 1995, Machine Learning: Proceedings of the Twelfth International Conference (ML95). Prieditis, A. & Russell, S. (eds.). San Francisco, CA: Morgan Kaufmann Publishers, p. 142-149 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. A Bayesian approach to 3D surface fitting and refinement.

    Turner, M. & Hancock, E. R., 1995, PROCEEDINGS OF THE 6TH BRITISH MACHINE VISION CONFERENCE 1995, VOLS 1 AND 2. Pycock, D. (ed.). GUILDFORD: B M V A PRESS, p. 67-76 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. A Candid Industrial Evaluation of Formal Software Verification using Model Checking

    Bennion, M. & Habli, I., 2014, ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering. ACM, p. 175-184 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. A Characterisation of the Workload on an Engineering Design Grid

    Burkimsher, A., Bate, I. J. & Indrusiak, L. S., 2014, Proceedings of the 22nd High Performance Computing Symposium (HPC). San Diego: Society for Computer Simulation International, p. 639-646 8 p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. A Circus semantics for Ravenscar protected objects

    Atiya, D. A., King, S. & Woodcock, J. C. P., 2003, FME 2003: FORMAL METHODS, PROCEEDINGS. Araki, K., Gnesi, S. & Mandrioli, D. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 617-635 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. A Comparison of Model Migration Tools

    Rose, L., Herrmannsdoerfer, M., Williams, J., Kolovos, D., Garces, K., Paige, R., Polack, F., Petriu, D. (ed.), Rouquette, N. (ed.) & Haugen, Ã. (ed.), 2010, Model Driven Engineering Languages and Systems. PART 1 ed. Springer Berlin / Heidelberg, Vol. 6394. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. A Contract-based Approach to Designing Safe Systems

    Bate, I., Hawkins, R., McDermid, J., Lindsay, P. A. & Cant, A., 2003, Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software. p. 25-36 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. A Control Theoretic Approach for Workflow Management

    Ghazzawi, H. A., Bate, I. & Indrusiak, L. S., 1 Jul 2012, In Proceedings of 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems. p. 280-289 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. A Cross-Cultural Study of Motivations to Participate in a Crowdsourcing Project to Support People with Disabilities

    Layas, F., Petrie, H. & Power, C. D., 2015, Third AAAI Conference on Human Computation and Crowdsourcing.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...71 Next