Search research publications and outputs

  1. "Devices are people too" - Using process patterns to elicit security requirements in novel domains: A ubiquitous healthcare example

    Liu, Y., Clark, J. A. & Stepney, S., 2005, SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS. Hutter, D. & Ullmann, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 31-45 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. (True) polymorphism in SPARK2000

    Lin, T. M. & McDermid, J. A., 2000, RELIABLE SOFTWARE TECHNOLOGIES ADA-EUROPE 2000. Keller, HB. & Plodereder, E. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 252-265 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 09381 Extended Abstracts Collection - Refinement Based Methods for the Construction of Dependable Systems

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009, Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009. Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, Vol. 09381. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 1st international workshop on assurance cases for software-intensive systems (ASSURE 2013)

    Denney, E., Pai, G., Habli, I., Kelly, T. & Knight, J. C., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1505-1506 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 1st international workshop on combining modelling and search-based software engineering (CMSBSE 2013)

    Harman, M., Paige, R. F. & Williams, J. R., 2013, 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. p. 1513-1514 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 3-D terrain from synthetic aperture radar images

    Bors, A. G., Hancock, E. R. & Wilson, R. C., 2000, IEEE WORKSHOP ON COMPUTER VISION BEYOND THE VISIBLE SPECTRUM: METHODS AND APPLICATIONS, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 3D Face Recognition

    Mian, A. & Pears, N. E., 2012, 3D Imaging, Analysis and Applications. Springer, p. 311-366 55 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. 3D Facial Landmark Localisation by Matching Simple Descriptors

    Romero-Huertas, M. & Pears, N., 2008, 2008 IEEE SECOND INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS). NEW YORK: IEEE, p. 346-351 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 3D Landmark Model Discovery from a Registered Set of Organic Shapes

    Creusot, C., Pears, N. & Austin, J., 16 Jun 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) . p. 57-64 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 3D Morphable Face Models Revisited

    Patel, A. & Smith, W. A. P., 2009, CVPR: 2009 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-4. NEW YORK: IEEE, p. 1327-1334 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...180 Next