Search research publications and outputs

  1. A 65nm CMOS lossless bio-signal compression circuit with 250 femtoJoule performance per bit.

    Crispin-Bailey, C., Dai, C. & Austin, J., 30 Aug 2019, p. 1-14. 14 p.

    Research output: Contribution to conferencePaper

  2. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  3. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  4. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  5. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaper

  6. A Deep Hybrid Graph Kernel through Deep Learning Networks

    Cui, L., Bai, L., Rossi, L. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  7. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol

    Avizheh, S., Safavi-Naini, R. & Shahandashti, S. F., Dec 2018, p. 369-387. 19 p.

    Research output: Contribution to conferencePaper

  8. A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Menon, C. & Alexander, R. D., 1 Nov 2017.

    Research output: Contribution to conferencePaper

  9. A Secure Scheme for Group Communication of Wireless IoT Devices

    Alohali, B., Vasilakis, V., Moscholios, I. & Logothetis, M., 27 Sep 2018. 6 p.

    Research output: Contribution to conferencePaper

  10. A Signature-based Intrusion Detection System for the Internet of Things

    Ioulianou, P., Vasilakis, V., Moscholios, I. & Logothetis, M., 8 Jun 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  11. A Strategic Roadmap for Business Model Change for the Video-games Industry

    Goumagias, N., Purvis, K., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. & Kudenko, D., 3 May 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  12. A Systematic Approach for Designing Mutation Operators for MDE languages

    Alhwikem, F. H. M., Paige, R. F., Rose, L. M. & Alexander, R. D., Oct 2016.

    Research output: Contribution to conferencePaper

  13. A Unified Neighbor Reconstruction Method for Embeddings

    Hancock, E. R., Zhang, Z. H. & Bai, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  14. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  15. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaper

  16. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaper

  17. AI and Automatic Music Generation for Mindfulness

    Williams, D., Hodge, V. J., Gega, L., Murphy, D., Cowling, P. I. & Drachen, A., 17 Mar 2019. 10 p.

    Research output: Contribution to conferencePaper

  18. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  19. An Investigation into the Use of Mutation Analysis for Automated Program Repair

    Timperley, C. S., Stepney, S. & Le Goues, C., 17 Aug 2017, p. 99-114. 16 p.

    Research output: Contribution to conferencePaper

  20. BookLeaf: An Unstructured Hydrodynamics Mini-application

    Truby, D., Wright, S. A., Kevis, R., Maheswaran, S., Herdman, A. & Jarvis, S. A., 10 Sep 2018. 8 p.

    Research output: Contribution to conferencePaper

  21. Co-designing the computational model and the computing substrate

    Stepney, S., 2019, p. 5–14. 10 p.

    Research output: Contribution to conferencePaper

  22. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  23. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaper

  24. Depth-Based Subgraph Convolutional Neural Networks

    Zhang, Z., Hancock, E. R., Bai, L. & Cui, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  25. Directed Graph Evolution from Euler-Lagrange Dynamics

    Wang, J., Wilson, R. C. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  26. Discriminative Features Matter: Multi-layer Bilinear Pooling for Camera Localization

    Wang, X., Wang, X., Wang, C., Bai, X., Wu, J. & Hancock, E. R., 23 Jul 2019, (Accepted/In press). 12 p.

    Research output: Contribution to conferencePaper

  27. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaper

  28. Ethics and the safety of autonomous systems

    Menon, C. & Alexander, R. D., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  29. Evolving Test Environments to Identify Faults in Swarm Robotics Algorithms

    Wei, H., Timmis, J. I. & Alexander, R. D., 6 Jun 2017.

    Research output: Contribution to conferencePaper

  30. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaper

  31. From Safety Cases to Security Cases

    Alexander, R. D., Hawkins, R. D. & Kelly, T. P., Feb 2017.

    Research output: Contribution to conferencePaper

  32. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  33. Functional grouping analysis of varying reactor types in the Spiky-RBN AChem

    Krastev, M. S., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 247-254.

    Research output: Contribution to conferencePaper

  34. Hazard and Risk Analysis of Health Informatics: Fundamental Challenges and New Directions

    Habli, I. & White, S. P., 2018.

    Research output: Contribution to conferencePaper

  35. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaper

  36. Identifying Perceptual Structures In Trademark Images

    Hodge, V. J., Hollier, G. P., Austin, J. & Eakins, J., 13 Feb 2008, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  37. Implicit mapping of pointers inside C++ Lambda closure objects in OpenMP target offload regions

    Truby, D. R., Bertolli, C., Wright, S. A., Bercea, G-T., O'Brien, K. & Jarvis, S. A., 1 Feb 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  38. Improving efficiency of persistent storage access in embedded Linux

    Joyce, R. A. & Audsley, N. C., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  39. Incorporating epistemic uncertainty into the safety assurance of socio-technical systems

    Leong, C. W. K., Kelly, T. P. & Alexander, R. D., 29 Apr 2017.

    Research output: Contribution to conferencePaper

  40. Intelligent Car Park Routeing for Road Traffic

    Hodge, V. J., Smith, M. & Austin, J., 22 Jun 2009, p. 326-333.

    Research output: Contribution to conferencePaper

  41. Investigating the Correctness and Efficiency of MrsP in Fully Partitioned Systems

    Zhao, S. & Wellings, A. J., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  42. Latent Distribution Preserving Deep Subspace Clustering

    Zhou, L., Xiao, B., wang, D., Liu, X., Zhou, J. & Hancock, E. R., May 2019, p. 4440-4446. 7 p.

    Research output: Contribution to conferencePaper

  43. Like a DNA string: Sequence-based Player Profiling in Tom Clancy’s The Division

    Makarovych, S., Canossa, A., Togelius, J. & Drachen, A., 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  44. Local Binary Patterns for Graph Characterization

    Jawad, M., Aziz, F. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  45. MESSI: Mutant Evaluation by Static Semantic Interpretation

    Patrick, M. T., Oriol, M. Y. A. & Clark, J. A., 17 Apr 2012, (Accepted/In press).

    Research output: Contribution to conferencePaper

  46. Migrating Mixed Criticality Tasks within a Cyclic Executive Framework

    Burns, A. & Baruah, S., 2017, p. 203-216. 14 p.

    Research output: Contribution to conferencePaper

  47. Miniature Untethered EEG Recorder Improves Advanced Neuroscience Methodologies

    Crispin-Bailey, C., Austin, J., Moulds, A., Platt, B. & Crouch, B., 14 Aug 2019, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  48. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaper

  49. Net4lap: Neural Laplacian Regularization for Ranking and Re-Ranking

    Curado, M., Escolano, F., Lozano, M. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  50. On the Digital Certificate Management in Advanced Metering Infrastructure Networks

    Vasilakis, V., Moscholios, I., Vardakas, J. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 5 p.

    Research output: Contribution to conferencePaper

  51. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaper

  52. Performance of second order particle-in-cell methods on modern many-core architectures

    Brown, D., Bettencourt, M. T., Wright, S. A., Jones, J. P. & Jarvis, S. A., 1 Oct 2017, (Accepted/In press).

    Research output: Contribution to conferencePaper

  53. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaper

  54. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaper

  55. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaper

  56. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaper

  57. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  58. Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols

    Vasilakis, V., Alohali, B., Moscholios, I. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  59. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaper

  60. Semi-Clairvoyance in Mixed-Criticality Scheduling

    Agrawa, K., Baruah, S. & Burns, A., 7 Oct 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  61. Semi-Supervised Graph Rewiring with the Dirichlet Principle

    Curado, M., Escolano, F., Lozano, M. A. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  62. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaper

  63. Supporting Nested Resources in MrsP

    Garrido, J., Zhao, S., Burns, A. & Wellings, A. J., 2017, p. 73-86. 14 p.

    Research output: Contribution to conferencePaper

  64. The Moral Responsibility Gap and the Increasing Autonomy of Systems

    Porter, Z. L. M., Habli, I., Monkhouse, H. E. & Bragg, J. E., 18 Sep 2018.

    Research output: Contribution to conferencePaper

  65. The Pi-puck extension board: a Raspberry Pi interface for the e-puck robot platform

    Millard, A. G., Joyce, R. A., Hilder, J. A., Fleseriu, C., Newbrook, L., Li, W., McDaid, L. & Halliday, D. M., Sep 2017.

    Research output: Contribution to conferencePaper

  66. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaper

  67. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  68. The role of structure and complexity on Reservoir Computing quality

    Dale, M., Dewhirst, J. D., O'Keefe, S. E. M., Sebald, A. A-M., Stepney, S. & Trefzer, M. A., 2019, p. 52–64. 13 p.

    Research output: Contribution to conferencePaper

  69. The role of the representational entity in physical computing

    Stepney, S. & Kendon, V., 2019, p. 219–231. 13 p.

    Research output: Contribution to conferencePaper

  70. Toward Information-Centric Software-Defined Cellular Networks

    Vasilakis, V., Moscholios, I., Alzahrani, B. & Logothetis, M., 24 May 2017, (Accepted/In press). 7 p.

    Research output: Contribution to conferencePaper

  71. Towards bio-responsive control for music

    Williams, D. A. H., Murphy, D. T. & Fazenda, B., 19 Dec 2017.

    Research output: Contribution to conferencePaper

  72. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaper

  73. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaper

  74. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaper

  75. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaper