Search research publications and outputs

  1. 1989
  2. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  3. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  4. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  5. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  6. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  7. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  8. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  9. 1988
  10. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  11. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  12. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  13. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  14. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  15. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  16. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  17. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  18. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  19. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  20. 1987
  21. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  22. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  23. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  24. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  25. 1985
  26. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  27. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  28. 1983
  29. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  30. 1982
  31. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper