Search research publications and outputs

  1. Applying artificial immune systems to real-time embedded systems

    Lay, N. & Bate, I., 2007, Congress on Evolutionary Computation (CEC). NEW YORK: IEEE, p. 3743-3750 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Applying fixed-priority preemptive scheduling with preemption threshold to asynchronous event handling in the RTSJ

    Kim, M. & Wellings, A. J., 2009, Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, JTRES 2009, Madrid, Spain, September 23-25, 2009. Higuera-Toledano, M. T. & Schoeberl, M. (eds.). ACM, p. 80-89 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Applying web usage mining techniques to discover potential browsing problems of users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, 7th IEEE International Conference on Advanced Learning Technologies, Proceedings. Spector, JM., Sampson, DG., Okamoto, T., Kinshuk, X., Cerri, SA., Ueno, M. & Kashihara, A. (eds.). LOS ALAMITOS: IEEE COMPUTER SOC, p. 929-930 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Approaches to Modelling Security Scenarios with Domain-Specific Languages: 41-54

    Brooke, P. J., Paige, R. F. & Power, C. D., 2012, Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer, Vol. 7622 LNCS. p. 41-54 14 p. (Lecture Notes in Computer Science; vol. 7622).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Appropriate mechanisms for the support of optional processing in hard real-time systems

    Audsley, N. C., Davis, R. I., Burns, A. & Wellings, A. J., May 1994, IEEE Workshop on Real-Time Operating Systems and Software. p. 23-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Approximate Bayesian computation for the parameters of PRISM programs

    Cussens, J., 2011, Proceedings of the 20th International Conference on Inductive Logic Programming. Heidelberg: Springer, Vol. 6489. p. 38-46 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Architectural Considerations in the Certification of Modular Systems

    Bate, I. & Kelly, T., 2002, Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002. Vol. LNCS 2434. p. 321-333 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Architecture Trade-off Analysis and Codesign for Safety-Related Real-Time Embedded Systems

    Bate, I. & Audsley, N., 2002, Proceedings of 1st International Workshop on Embedded Systems Codesign. p. 8-15 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Architecture Trade-off Analysis and the Influence on Component Design

    Bate, I. & Audsley, N., 2002, Proceedings of the Workshop on Component-based Software Engineering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Architecture-awareness for real-time big data systems

    Gray, I., Audsley, N. C., Chan, Y. & Wellings, A., 9 Sep 2014, ACM International Conference Proceeding Series. Association for Computing Machinery (ACM), p. 151-156 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Artificial immune systems and the grand challenge for non-classical computation

    Stepney, S., Clark, J. A., Johnson, C. G., Partridge, D. & Smith, R. E., 2003, ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS. Timmis, J., Bentley, P. & Hart, E. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 204-216 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Assessing complex computer based systems using the goal structuring notation

    Wilson, S. P., McDermid, J. A., Pygott, C. H. & Tombs, D. J., 1996, SECOND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 498-505 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Assessing the safety of integrity level partitioning in software

    McDermid, J. A. & Pumfrey, D. J., 2000, LESSONS IN SYSTEM SAFETY. Redmill, F. & Anderson, T. (eds.). GODALMING: SPRINGER-VERLAG LONDON LTD, p. 134-152 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks

    Bista, S. K., Dahal, K., Cowling, P. & Bouras, A., 2010, Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on. p. 80-87 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Assessment of Trace-Differences in Timing Analysis for Complex Real-Time Embedded Systems

    Lu, Y., Nolte, T., Bate, I., Kraft, J. & Norstrom, C., 2011, Proceedings of the 6th IEEE International Symposium on Industrial Embedded Systems (SIES'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Assigning Semantics to Graphical Concrete Syntaxes

    Zolotas, A., Kolovos, D. S., Matragkas, N. D. & Paige, R. F., 2014, XM 2014: Proceedings of the 3rd Workshop on Extreme Modeling co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages Systems, XM@MoDELS 2014, Valencia, Spain, September 29, 2014.. Di Ruscio, D., de Lara, J. & Pierantonio, A. (eds.). CEUR Workshop Proceedings, p. 12-21 10 p. (CEUR Workshop Proceedings; vol. 1239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Associating Minutiae between Distorted Fingerprints Using Minimal Spanning Tree

    Zhu, E., Hancock, E., Ren, P., Yin, J. & Zhang, J., 2010, IMAGE ANALYSIS AND RECOGNITION, 2010, PT II, PROCEEDINGS. Campilho, A. & Kamel, M. (eds.). PART 2 ed. BERLIN: SPRINGER-VERLAG BERLIN, Vol. 6112 LNCS. p. 235-245 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Assurance of Automotive Safety – A Safety Case Approach

    Habli, I. & Palin, R. A., 2010, 29th International Conference on Computer Safety, Reliability and Security .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Assuring Safety for Component Based Software Engineering

    Conmy, P. & Bate, I., 2014, Proceedings of the 15th International Symposium on High-Assurance Systems Engineering (HASE). p. 121-128 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Asynchronous data sharing in multiprocessor real time systems using process consensus

    Chen, J. & Burns, A., 1998, 10TH EUROMICRO WORKSHOP ON REAL-TIME SYSTEMS, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 29 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Asynchronous event handling and real-time threads in the Real-time Specification for Java

    Wellings, A. J. & Burns, A., 2002, EIGHTH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 81-89 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Asynchronous event handling and safety critical Java

    Wellings, A. J. & Kim, M., 2010, Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems, JTRES 2010, Prague, Czech Republic, August 19-21, 2010. Kalibera, T. & Vitek, J. (eds.). ACM, p. 53-62 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Asynchronous event handling in the real-time specification for Java

    Kim, M. & Wellings, A. J., 2007, Proceedings of the 5th International Workshop on Java Technologies for Real-time and Embedded Systems, JTRES 2007, Institute of Computer Engineering, Vienna University of Technology, 26-28 September 2007, Vienna, Austria. Bollella, G. (ed.). ACM, p. 3-12 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. At the interface of inductive logic programming and statistics

    Cussens, J., 2004, INDUCTIVE LOGIC PROGRAMMING, PROCEEDINGS. Camacho, R., King, R. & Srinivasan, AS. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 23 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Attribute-Value and Relational Learning: A Statistical Viewpoint

    Cussens, J., 2000, Proceedings of the ICML-2000 Workshop on Attribute-Value and Relational Learning: Crossing the Boundaries. De Raedt, L. & Kramer, S. (eds.). p. 35-39 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...8 9 10 11 12 13 14 15 ...65 Next