Search research publications and outputs

  1. 1991
  2. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  3. 1992
  4. A Failure and Recovery Algebra

    McDermid, J. A., 1992.

    Research output: Working paper

  5. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  6. A HIERARCHICAL EVIDENCE COMBINING EDGE DETECTOR

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, PROGRESS IN IMAGE ANALYSIS AND PROCESSING II. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 494-501 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A RELATIONAL PROGRAMMING SYSTEM WITH INFERRED REPRESENTATIONS

    Cattrall, D. & Runciman, C., 1992, PROGRAMMING LANGUAGE IMPLEMENTATION AND LOGIC PROGRAMMING. Bruynooghe, M. & Wirsing, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 475-476 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  9. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  10. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

Previous 1...7 8 9 10 11 12 13 14 ...201 Next