Search research publications and outputs

  1. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  2. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  3. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  4. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  5. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  6. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  7. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  8. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  9. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  10. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  11. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  12. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  13. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  14. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  15. A Computational Model of Degeneracy in a Lymph Node

    Andrews, P. & Timmis, J., 2006, p. 164-177.

    Research output: Contribution to conferenceOther

  16. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  17. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  18. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  19. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  20. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  21. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  22. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  23. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  24. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  25. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  26. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  27. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  28. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  29. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  30. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  31. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  32. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  33. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  34. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  35. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  36. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaper

  37. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  38. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  39. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  40. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  41. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  42. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  43. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  44. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaper

  45. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  46. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  47. A JAVA bread-board simulator digital circuit simulation with an extensible e-learning tool

    Bailey, C. & Freeman, M. J., 2009, p. 299-306. 8 p.

    Research output: Contribution to conferencePaper

  48. A Layered Behavioural Model of Platelets

    Schneider, S., Treharne, H., Cavalcanti, A. & Woodcock, J., 2006, p. 98-106.

    Research output: Contribution to conferencePaper

  49. A Markov Chain Model of the B-cell Algorithm

    Clarke, E., Hone, A. N. W. & Timmis, J., 2005, p. 318-330.

    Research output: Contribution to conferenceOther

  50. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  51. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  52. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  53. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  54. A Model-Based Approach to Support the Automatic Safety Analysis of Multiple Product Line Products: Computing Systems Engineering (SBESC), 2014 Brazilian Symposium on

    de Oliveira, A. L., Braga, R. T. V., Masiero, P. C., Papadopoulos, Y., Habli, I. & Kelly, T., 2014, p. 7-12. 6 p.

    Research output: Contribution to conferenceOther

  55. A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems

    Mokhtar, M., Bi, R., Timmis, J. & Tyrrell, A. M., May 2009, p. 2055-2062. 8 p.

    Research output: Contribution to conferencePaper

  56. A Multi-Layered Immune Inspired Approach to Data Mining

    Knight, T. & Timmis, J., 2002, p. 266-271.

    Research output: Contribution to conferenceOther

  57. A Navigation-based Algorithm for Matching Scenario Patterns

    Ma, J., Zhao, G. & Hancock, E. R., 2007, p. 151-157.

    Research output: Contribution to conferencePaper

  58. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  59. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  60. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  61. A New Framework for Grayscale and Colour Non-lambertian Shape-from-Shading

    Smith, W. A. P. & Hancock, E. R., 2007, p. 869-880.

    Research output: Contribution to conferencePaper

  62. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  63. A New Paradigm for SpeckNets: Inspiration from Fungal Colonies

    Falconer, R., Bown, J., Hart, E. & Timmis, J., 2008, p. 90-95.

    Research output: Contribution to conferencePaper

  64. A Note on Traces Refinement and the it onf Relation in the Unifying Theories of Programming

    Cavalcanti, A. & Gaudel, M-C., 2008, p. 42-61.

    Research output: Contribution to conferencePaper

  65. A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Laurens, P., Paige, R. F., Brooke, P. J. & Chivers, H., 2007, p. 97-106.

    Research output: Contribution to conferencePaper

  66. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  67. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  68. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  69. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  70. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  71. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  72. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  73. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  74. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  75. A Resource Limited Artificial Immune System for Data Analysis

    Timmis, J. & Neal., M. J., 2000, p. 19-32.

    Research output: Contribution to conferenceOther

  76. A Rigorous Evaluation of Crossover and Mutation in Genetic Programming

    White, D. & Poulding, S., 2009, p. 220-231. 12 p.

    Research output: Contribution to conferencePaper

  77. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  78. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  79. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  80. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  81. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  82. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  83. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  84. A Static Checker for Safe Pattern Matching in Haskell

    Mitchell, N., Runciman, C. & Eekelen, M. V., 2007, p. 15-30.

    Research output: Contribution to conferencePaper

  85. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  86. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  87. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  88. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  89. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  90. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  91. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  92. A Theory of Pointers for the UTP

    Harwood, W., Cavalcanti, A. & Woodcock, J., 2008, p. 141-155.

    Research output: Contribution to conferencePaper

  93. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  94. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  95. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  96. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  97. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  98. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  99. A UML Profile for Knowledge-Based Systems Modelling

    Abdullah, M. S., Paige, R. F., Kimble, C. & Benest, I. D., 20 Aug 2007, p. 871-878.

    Research output: Contribution to conferencePaper

  100. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  101. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  102. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  103. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  104. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  105. A compact fiducial for affine augmented reality

    Parnham, D. J., Robinson, J. A. & Zhao, Y., 1 Apr 2005, p. 347-352.

    Research output: Contribution to conferenceOther

  106. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  107. A framework for describing and comparing courses and curricula

    Pedroni, M., Oriol, M. & Meyer, B., 1 Jun 2007, p. 131.

    Research output: Contribution to conferencePaper

  108. A functional-logic library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, p. 37--48.

    Research output: Contribution to conferencePaper

  109. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  110. A high abstraction, high accuracy power estimation model for networks-on-chip

    Ost, L., Guindani, G., Indrusiak, L. S., Reinbrecht, C., Raupp, T. & Moraes, F., 2009, p. 31:1--31:6.

    Research output: Contribution to conferencePaper

  111. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  112. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  113. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  114. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  115. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  116. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  117. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  118. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  119. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  120. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  121. A unified model of specular and diffuse reflectance for rough, glossy surfaces

    Smith, W. A. P. & Hancock, E. R., 2009, p. 643-650.

    Research output: Contribution to conferencePaper

  122. ABZ2008 VSR-Net Workshop

    Woodcock, J. & Boca, P., 2008, p. 378-379.

    Research output: Contribution to conferencePaper

  123. AISEC: An Artificial Immune System for E-mail Classification

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  124. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data

    Ting, I-H., Clark, L., Kimble, C., Kudenko, D. & Wright, P., 2007, p. 66-73.

    Research output: Contribution to conferencePaper

  125. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  126. Abstracting Complex Languages through Transformation and Composition

    Johannes, J., Zschaler, S., Fernández, M. A., Castillo, A., Kolovos, D. S. & Paige, R. F., 2009, p. 546-550.

    Research output: Contribution to conferencePaper

  127. Abstraction and Reformulation in the Generation of Constraint Models

    Frisch, A. M., 2007, p. 2-3.

    Research output: Contribution to conferencePaper

  128. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  129. Accessibility 2.0: people, policies and processes

    Kelly, B., Sloan, D., Brown, S., Seale, J., Petrie, H., Lauke, P. & Ball, S., 2007, p. 138-147.

    Research output: Contribution to conferencePaper

  130. Accessibility in non-professional web authoring tools: a missed web 2.0 opportunity?

    Power, C. & Petrie, H., 2007, p. 116-119.

    Research output: Contribution to conferencePaper

  131. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  132. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  133. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  134. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  135. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  136. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  137. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  138. Adaptable Lymphocytes for Artificial Immune Systems

    Andrews, P. S. & Timmis, J., 2008, p. 376-386.

    Research output: Contribution to conferencePaper

  139. Adaptive Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  140. Adaptivity in Question Answering with User Modelling and a Dialogue Interface

    Quarteroni, S. & Manandhar, S., 2006.

    Research output: Contribution to conferencePaper

  141. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  142. Advanced Structural Representations for Question Classification and Answer Re-ranking

    Quarteroni, S., Moschitti, A., Manandhar, S., Basili, R., Amati, G., Carpineto, C. & Romano, G., 2007, p. 234-245.

    Research output: Contribution to conferencePaper

  143. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  144. Aggregation of Information leaked by a MANET

    Murdoch, J., Clark, J. A., McDermid, J. A., Chivers, H. R. & Worthington, O., 2007.

    Research output: Contribution to conferencePaper

  145. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  146. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  147. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  148. Agile development of secure web applications

    Ge, X., Paige, R. F., Polack, F., Chivers, H. & Brooke, P. J., 2006, p. 305-312. 7 p.

    Research output: Contribution to conferencePaper

  149. Aine: an immunological approach to data mining

    Knight, T. & Timmis, J., 2001, p. 297-304.

    Research output: Contribution to conferenceOther

  150. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  151. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  152. An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks

    Ochirsuren, E., Indrusiak, L. S. & Glesner, M., 1 Jun 2008, p. 174 -179.

    Research output: Contribution to conferencePaper

  153. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  154. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  155. An Analysis of Approaches to Model Migration

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  156. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  157. An Analysis of Problem Difficulty for a Class of Optimisation Heuristics

    Ridge, E. & Kudenko, D., 2007, p. 198-209.

    Research output: Contribution to conferencePaper

  158. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  159. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  160. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  161. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction

    Secker, A., Davies, M. N., Freitas, A. A., Timmis, J., Clark, E. & Flower, D. R., 2008, p. 242-253.

    Research output: Contribution to conferencePaper

  162. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  163. An Associative Memory for Association Rule Mining

    Baez-Monroy, V. O. & O'Keefe, S., 2007, p. 2227-2232.

    Research output: Contribution to conferencePaper

  164. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  165. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  166. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  167. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  168. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  169. An Empirical Analysis of the Impact of Prioritised Sweeping on the DynaQ's Performance

    Grzes, M. & Kudenko, D., 2008, p. 1041-1051.

    Research output: Contribution to conferencePaper

  170. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  171. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  172. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  173. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  174. An FPGA-based system for development of real-time embedded vision applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 2007, p. 33-40. 8 p.

    Research output: Contribution to conferencePaper

  175. An IDE-based, Integrated Solution to Schema Evolution of Object-Oriented Software

    Piccioni, M., Oriol, M., Meyer, B. & Schneider, T., 1 Nov 2009, p. 650--654. 4 p.

    Research output: Contribution to conferencePaper

  176. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  177. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  178. An Investigation on the Compression Quality of aiNet

    Stibor, T. & Timmis, J., 2007, p. 495-502.

    Research output: Contribution to conferencePaper

  179. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  180. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  181. An Operational Semantics in UTP for a Language of Reactive Designs

    Woodcock, J., 2006, p. 84-84.

    Research output: Contribution to conferenceAbstract

  182. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  183. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  184. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  185. An action semantics for MOF 2.0

    Paige, R. F., Kolovos, D. S., Polack, F. & Haddad, H., 2006, p. 1304-1305.

    Research output: Contribution to conferencePaper

  186. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  187. An artificial immune network for multimodal optimisation

    Castro, L. N. D. & Timmis, J., 2002, p. 699-704.

    Research output: Contribution to conferenceOther

  188. An improved speaker diarization system

    Fu, R. & Benest, I. D., 2007, p. 2605-2608.

    Research output: Contribution to conferencePaper

  189. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  190. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  191. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  192. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  193. Analogue Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  194. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  195. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  196. Analysis of Hierarchical EDF Pre-emptive Scheduling

    Zhang, F. & Burns, A., 2007, p. 423-434.

    Research output: Contribution to conferencePaper

  197. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  198. Anisotropic fluid solver for robust optical flow smoothing

    Doshi, A. & Bors, A. G., 6 May 2009, p. 117-120.

    Research output: Contribution to conferencePaper

  199. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  200. Application Areas of AIS: Past, Present and Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferenceOther

  201. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  202. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  203. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  204. Applying UML Interactions and Actor-Oriented Simulation to the Design Space Exploration of Network-on-Chip Interconnects

    Indrusiak, L. S., Ost, L., Moller, L., Moraes, F. & Glesner, M., 1 Apr 2008, p. 491 -494.

    Research output: Contribution to conferencePaper

  205. Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, p. 929-930.

    Research output: Contribution to conferencePaper

  206. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  207. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  208. Approximating 3D facial shape from photographs using coupled statistical models

    Castelan, M., Smith, W. A. P. & Hancock, E. R., 2006, p. 89-98. 10 p.

    Research output: Contribution to conferencePaper

  209. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  210. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  211. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  212. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  213. Artificial Immune Recognition System (AIRS): Revisions and Refinements

    Watkins, A. & Timmis, J., 2002, p. 173-181.

    Research output: Contribution to conferenceOther

  214. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  215. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  216. Assessing the Performance of Two Immune Inspired Algorithms and a Hybrid Genetic Algorithm for Function Optimisation

    Timmis, J., Edmonds, C. & Kelsey, J., 2004, p. 1044-1051.

    Research output: Contribution to conferenceOther

  217. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  218. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  219. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  220. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  221. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  222. Augmenting an artificial immune network

    Neal, M., Hunt, J. & Timmis, J., 1998, p. 3821-3826.

    Research output: Contribution to conferenceOther

  223. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  224. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  225. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  226. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  227. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  228. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  229. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  230. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  231. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  232. Automatic Generation of Information-seeking Questions Using Concept Clusters

    Li, S. & Manandhar, S., 2009, p. 93-96.

    Research output: Contribution to conferencePaper

  233. Automatic Generation of Integrated Formal Models Corresponding to UML System Models

    Treharne, H., Turner, E., Paige, R. F. & Kolovos, D. S., 2009, p. 357-367.

    Research output: Contribution to conferencePaper

  234. Automatic Generation of Verified Concurrent Hardware

    Oliveira, M. & Woodcock, J., 2007, p. 286-306.

    Research output: Contribution to conferencePaper

  235. Automatic Multilingual Lexicon Generation using Wikipedia as a Resource

    Shahid, A. R. & Kazakov, D., 2009, p. 357-360.

    Research output: Contribution to conferencePaper

  236. Automatic Test Data Generation for Multiple Condition and MCDC Coverage

    Ghani, K., Clark, J. A., Boness, K., Fernandes, J. M., Hall, J. G., Machado, R. J. & Oberhauser, R., 2009, p. 152-157. 6 p.

    Research output: Contribution to conferencePaper

  237. Automatic Translation from it ircus to Java

    Freitas, A. & Cavalcanti, A., 2006, p. 115-130.

    Research output: Contribution to conferencePaper

  238. Automatic extraction of notions from course material

    Pedroni, M., Oriol, M., Meyer, B. & Angerer, L., 2008, p. 251.

    Research output: Contribution to conferencePaper

  239. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  240. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  241. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  242. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  243. Automorphisms of transition graphs for a linear cellular automaton

    Powley, E. J. & Stepney, S., 2008, p. 55-68.

    Research output: Contribution to conferencePaper

  244. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity

    Amálio, N., Polack, F. & Zhang, J., 2008, p. 323-336.

    Research output: Contribution to conferencePaper

  245. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  246. Background Subtraction in Video Using Recursive Mixture Models, Spatio-Temporal Filtering and Shadow Removal

    Chen, Z., Pears, N., Freeman, M. & Austin, J., 2009, p. 1141-1150.

    Research output: Contribution to conferencePaper

  247. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  248. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  249. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  250. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

  251. Binary neural network based 3D facial feature localization

    Ju, Q., O'Keefe, S. & Austin, J., 2009, p. 1462-1469.

    Research output: Contribution to conferencePaper

  252. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  253. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  254. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  255. Blind and robust mesh watermarking using manifold harmonics

    Wang, K., Luo, M., Bors, A. G. & Denis, F., Nov 2009, p. 3657-3660. 4 p.

    Research output: Contribution to conferencePaper

  256. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  257. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  258. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  259. Building for Users not for Experts: Designing a Visualization of the Literature Domain

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 707-712.

    Research output: Contribution to conferencePaper

  260. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  261. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  262. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  263. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  264. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  265. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  266. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  267. Can Secure Systems be Built Using Today's Development Processes?

    Woody, C., Hall, A. & Clark, J. A., 2004.

    Research output: Contribution to conferenceOther

  268. Can we Remove the Human from Hazard Analysis?

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  269. Capturing player experiences with post-game commentaries.

    Gow, J., Cairns, P. A., Colton, S., Baumgarten, R. & Miller, P., 2010.

    Research output: Contribution to conferencePaper

  270. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  271. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  272. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  273. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  274. Certification of Autonomous Systems

    R Alexander, M. H-M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  275. Certification of Autonomous Systems under UK Military Safety Standards

    Alexander, R., Hall-May, M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  276. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  277. Challenges for Artificial Immune Systems

    Timmis, J., 2005, p. 355-367.

    Research output: Contribution to conferenceOther

  278. Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System

    Habli, I. & Kelly, T., 2007, p. 193-202.

    Research output: Contribution to conferencePaper

  279. Challenges of evaluating the information visualisation experience

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 167-170.

    Research output: Contribution to conferencePaper

  280. Challenges when using Model-Driven Architecture in the development of Safety Critical Software

    Conmy, P. & Paige, R. F., 31 Mar 2007, p. 127-136. 9 p.

    Research output: Contribution to conferencePaper

  281. Character Education Using Pedagogical Agents and Socratic Voice

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  282. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  283. Characterising Facial Gender Difference Using Fisher-Rao Metric

    Ceolin, S. & Hancock, E. R., 2010, p. 4308-4311.

    Research output: Contribution to conferencePaper

  284. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  285. Characterising embedded applications using a UML profile

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Oct 2009, p. 172 -175.

    Research output: Contribution to conferencePaper

  286. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  287. Chasing Chaos.

    Kelsy, J., Timmis, J. & Hone, A., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  288. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  289. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  290. Clustering Morphological Paradigms Using Syntactic Categories

    Can, B. & Manandhar, S., 2009, p. 641-648.

    Research output: Contribution to conferencePaper

  291. Co-ordinating Knowledge in Pervasive Environments

    Nixon, L., Tolksdorf, R., Wood, A. M. & Menezes, R., 2007, p. to appear.

    Research output: Contribution to conferencePaper

  292. CoSMoS: Complex Systems Modelling and Simulation Infrastructure (extended abstract)

    Stepney, S. & Welch, P. H., 2009.

    Research output: Contribution to conferenceAbstract

  293. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  294. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  295. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  296. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  297. Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005

    Burns, A., Wellings, A. J. & Zhang, F., 2009, p. 119-133.

    Research output: Contribution to conferencePaper

  298. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  299. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  300. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

  301. Combining Reinforcement Learning with Symbolic Planning

    Grounds, M. & Kudenko, D., 2007, p. 75-86.

    Research output: Contribution to conferencePaper

  302. Combining Simulation with Machine Learning to Build Accident Models

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  303. Combining shape-from-shading and stereo using Gaussian-Markov random fields

    Haines, T. S. F. & Wilson, R. C., 8 Dec 2008, p. 1-4. 4 p.

    Research output: Contribution to conferencePaper

  304. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  305. Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM

    Stibor, T. & Timmis, J., 2007, p. 3727-3734.

    Research output: Contribution to conferencePaper

  306. Communicating Complex Systems

    Welch, P. H., Barnes, F. R. M. & Polack, F., 2006, p. 107-120.

    Research output: Contribution to conferencePaper

  307. Communication Systems in ClawZ

    Vernon, M., Zeyda, F. & Cavalcanti, A., 2010, p. 334-348.

    Research output: Contribution to conferencePaper

  308. Commute-Time Convolution Kernels for Graph Clustering

    Rahman, N. A. & Hancock, E. R., 2010, p. 316-323.

    Research output: Contribution to conferencePaper

  309. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  310. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  311. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  312. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  313. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  314. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  315. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  316. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  317. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  318. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  319. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  320. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  321. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  322. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  323. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  324. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  325. Concordance: A Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 245-260.

    Research output: Contribution to conferencePaper

  326. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  327. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  328. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  329. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  330. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  331. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  332. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  333. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  334. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  335. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  336. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  337. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  338. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  339. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  340. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  341. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  342. Coordination of Collaborative Engineering: State of the Art and Future Challenges

    Pawlak, A., Sandkuhl, K., Cholewa, W. & Indrusiak, L. S., 2007.

    Research output: Contribution to conferencePaper

  343. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  344. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  345. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  346. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  347. Cotranslational Protein Folding with L-systems

    Danks, G. B., Stepney, S., Caves, L. S. D., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 289-296.

    Research output: Contribution to conferencePaper

  348. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  349. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  350. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  351. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  352. Data analysis with artificial immune systems and cluster analysis and kohonen networks: some comparisons

    Timmis, J., Neal, M. & Hunt, J., 2000, p. 922-927.

    Research output: Contribution to conferenceOther

  353. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  354. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  355. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  356. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  357. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  358. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  359. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  360. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  361. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  362. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  363. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  364. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  365. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  366. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  367. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  368. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  369. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  370. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  371. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  372. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  373. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  374. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  375. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  376. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  377. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  378. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  379. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  380. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  381. Developing user requirements for visualizations of literature knowledge domains

    Faisal, S., Cairns, P. & Blandford, A., 2006, p. 264-269.

    Research output: Contribution to conferencePaper

  382. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  383. Deviational Analyses for Validating Regulations on Real Systems

    Polack, F., Srivatanakul, T., Kelly, T., Clark, J. A., Laleau, R. & Lemoine, M., 2006.

    Research output: Contribution to conferencePaper

  384. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  385. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  386. Dispatching Domains for Multiprocessor Platforms and Their Representation in Ada

    Burns, A. & Wellings, A. J., 2010, p. 41-53.

    Research output: Contribution to conferencePaper

  387. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  388. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  389. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  390. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  391. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  392. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  393. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  394. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  395. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  396. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  397. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  398. Ecore to GenModel Case

    Kolovos, D. S., Rose, L. M., Paige, R. F. & de Lara, J., 2010.

    Research output: Contribution to conferencePaper

  399. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  400. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  401. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  402. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  403. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  404. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  405. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  406. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  407. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  408. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  409. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  410. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  411. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  412. Enforcing Behaviour with Anonymity

    Wright, J. & Stepney, S., 2008.

    Research output: Contribution to conferencePaper

  413. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  414. Engineering Emergence

    Stepney, S., Polack, F. & Turner, H. R., 2006, p. 89-97.

    Research output: Contribution to conferencePaper

  415. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  416. Ensuring Dependable Systems of Systems

    Kelly, T., Hall-May, M. & Alexander, R., 2007.

    Research output: Contribution to conferencePaper

  417. Environment orientation: an architecture for simulating complex systems

    Hoverd, T. & Stepney, S., 2009, p. 67-82.

    Research output: Contribution to conferencePaper

  418. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  419. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  420. Equivalence Arguments for Complex Systems Simulations: A Case-Study

    Ghetiu, T., Alexander, R., Andrews, P., Polack, F. & Bown, J., 2009.

    Research output: Contribution to conferencePaper

  421. Escaping the Non-Quantitative Trap

    Alexander, R. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  422. Establishing Private Communications in Open Systems using Multicapabilities

    Udzir, N. I. & Wood, A., 1 Apr 2006.

    Research output: Contribution to conferencePaper

  423. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  424. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  425. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  426. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  427. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  428. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  429. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  430. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  431. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  432. Evolutionary search applied to reconfigurable analogue control

    Clegg, K., Stepney, S. & Clarke, T., 1 Aug 2007, p. 593-6.

    Research output: Contribution to conferenceOther

  433. Evolvable Hardware: a Fundamental Technology for Homeostasis

    Tyrrell, A. M., Timmis, J., Greensted, A. J. & Owens, N., 1 Apr 2007, p. 40-45.

    Research output: Contribution to conferenceOther

  434. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  435. Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks

    Zuhily, A. & Burns, A., 2008, p. 410-424.

    Research output: Contribution to conferencePaper

  436. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  437. Experience Report: Visualizing Data through Functional Pipelines

    Duke, D., Borgo, R., Runciman, C. & Wallace, M., 1 Sep 2008, p. 379--382.

    Research output: Contribution to conferencePaper

  438. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  439. Experimental assessment of random testing for object-oriented software

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2007, p. 84.

    Research output: Contribution to conferencePaper

  440. Experiments in Object Trouve browsing

    Colton, S., Torres, P., Gow, J. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  441. Exploiting Immunological Properties for Ubiqitous Computing Systems

    Mohr, P., Ryan, N. & Timmis, J., 2004, p. 277-289.

    Research output: Contribution to conferenceOther

  442. Exploiting Loose Horizontal Coupling in Evolutionary Swarm Robotics

    Owen, J., Stepney, S., Timmis, J. & Winfield, A. F. T., 2010, p. 432-439.

    Research output: Contribution to conferencePaper

  443. Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier

    Watkins, A. & Timmis, J., 2004, p. 427-438.

    Research output: Contribution to conferenceOther

  444. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  445. Extending Argumentation to Goal-Oriented Requirements Engineering

    Habli, I., Wu, W., Attwood, K. & Kelly, T., 2007, p. 306-316.

    Research output: Contribution to conferencePaper

  446. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  447. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  448. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  449. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  450. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  451. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  452. Extending the safety case concept to address dependability

    Despotou, G. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  453. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  454. Extreme Programming Security Practices

    Ge, X., Paige, R. F., Polack, F. & Brooke, P. J., 2007, p. 226-230. 4 p.

    Research output: Contribution to conferencePaper

  455. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  456. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  457. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  458. FPTC: Automated Safety Analysis for Domain-Specific Languages

    Paige, R. F., Rose, L. M., Ge, X., Kolovos, D. S. & Brooke, P. J., 2009, p. 229-242.

    Research output: Contribution to conferencePaper

  459. FSF: A Real-Time Scheduling Architecture Framework

    Aldea, M., Bernat, G., Broster, I., Burns, A., Dobrin, R., Drake, J. M., Fohler, G., Gai, P., Harbour, M. G., Guidi, G., Gutiérrez, J. J., Lennvall, T., Lipari, G., Martínez, J. M., Medina, J. L. & Trimarchi, M., 2006, p. 113-124.

    Research output: Contribution to conferencePaper

  460. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  461. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  462. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  463. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  464. Facial Shape Estimation in the Presence of Cast Shadows

    Smith, W. A. P. & Hancock, E. R., 2006, p. 779-788.

    Research output: Contribution to conferencePaper

  465. Facial Shape Spaces from Surface Normals and Geodesic Distance

    Ceolin, S., Smith, W. A. P. & Hancock, E. R., 2007, p. 416-423.

    Research output: Contribution to conferencePaper

  466. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  467. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  468. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  469. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  470. Finding Inputs that Reach a Target Expression

    Naylor, M. & Runciman, C., 2007, p. 133-142.

    Research output: Contribution to conferencePaper

  471. First Steps in the Verified Software Grand Challenge

    Woodcock, J., 2006, p. 203-206.

    Research output: Contribution to conferencePaper

  472. Flexibility and Manageability of IMS Projects

    Stephenson, Z., Nicholson, M. & McDermid, J. A., 2006.

    Research output: Contribution to conferencePaper

  473. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  474. Folding Protein-Like Structures with Open L-Systems

    Danks, G. B., Stepney, S. & Caves, L. S. D., 2007, p. 1100-1109.

    Research output: Contribution to conferencePaper

  475. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  476. Formal Analysis in Model Management: Exploiting the Power of CZT

    Williams, J. R., Polack, F. A. C. & Paige, R. F., 2010, p. 414.

    Research output: Contribution to conferencePaper

  477. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  478. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  479. Formalising Flash Memory: First Steps

    Butterfield, A. & Woodcock, J., 2007, p. 251-260.

    Research output: Contribution to conferencePaper

  480. Formalising Harmony Seeking Rules of Morphogenesis

    Hoverd, T. & Stepney, S., 2010, p. 386-393.

    Research output: Contribution to conferencePaper

  481. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next