Search research publications and outputs

  1. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  2. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  3. A Demonstrably Correct Compiler

    Stepney, S., Whitely, D., Cooper, D. & Grant, C., 1991

    Article in Formal Asp. Comput.

  4. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  5. A Deployment Value Model for Intrusion Detection Sensors

    Shaikh, S. A., Chivers, H., Nobles, P., Clark, J. A. & Chen, H., 2009, Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 200. Vol. 5576 LNCS. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  7. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  8. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  9. A Failure and Recovery Algebra

    McDermid, J. A., 1992.

    Research output: Working paper

  10. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  11. A Fast Jensen-Shannon Subgraph Kernel

    Bai, L. & Hancock, E. R., 2013, Image Analysis and Processing – ICIAP 2013. Petrosino, A. (ed.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8156. p. 181-190 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  12. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  13. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  14. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  15. A Formal Model for Natural-Language Timed Requirements of Reactive Systems

    Carvalho, G., Carvalho, A., Rocha, E., Cavalcanti, A. L. C. & Sampaio, A. C. A., 2014, Formal Methods and Software Engineering: 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings. Merz, S. & Pang, J. (eds.). SPRINGER, p. 43-58 16 p. (Lecture Notes in Computer Science; vol. 8829).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  17. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  18. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  19. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  20. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...201 Next