Search research publications and outputs

  1. Conference contribution › Research
  2. A Binary Neural Shape Matcher using Johnson Counters and Chain Codes

    Hodge, V., O'Keefe, S. & Austin, J., 10 Mar 2006, BICS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. A Comparison Framework for Spectrogram Track Detection Algorithms

    Lampert, T. & O'Keefe, S., 1 May 2009, Computer Recognition Systems . Kurzynski, M. & Wozniak, M. (eds.). Springer, Vol. 3. p. 119 126 p. (Advances in Intelligent and Soft Computing ; vol. 57/2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. A Multi-Scale Piecewise-Linear Feature Detector for Spectrogram Tracks

    Lampert, T., Pears, N. & O'Keefe, S., 2009, AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE. NEW YORK: IEEE, p. 330-335 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. A Tool for Development and Evaluation of Accessible Web 2.0 Applications

    Kervina, D., Pustisek, M., Ackermann, P., Velasco, C. A. & Power, C. D., 2012, 21st International Electrotechnical and Computer Science Conference. IEEE COMPUTER SOC, p. 89-92 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A Verified Protocol to Implement Multi-way Synchronisation and Interleaving in CSP

    Oliveira, M. V. M., Júnior, I. S. D. M. & Woodcock, J., 2013, Software Engineering and Formal Methods : 11th International Conference, SEFM 2013, Madrid, Spain, September 25-27, 2013. Proceedings. Hierons, R. M., Merayo, M. G. & Bravetti, M. (eds.). SPRINGER, Vol. 8137. p. 46-60 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A taxonomy of attacks on secure devices

    Rae, A. & Wildman, L., 2003, Proceedings of the Australia Information Warfare and Security Conference 2003. p. 251-264

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Active Contour Detection of Linear Patterns in Spectrogram Images

    Lampert, T. & O'Keefe, S., 2008, 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6. NEW YORK: IEEE, p. 3350-3353 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. An incremental verification framework for component-based software systems

    Johnson, K. H. A., Calinescu, R. C. & Kikuchi, S., 2013, CBSE '13 : Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering. New York: ACM, p. 33-42 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Automatically Improving Constraint Models in Savile Row through Associative-Commutative Common Subexpression Elimination

    Nightingale, P., Akgun, O., Gent, I. P., Jefferson, C. & Miguel, I., 8 Sep 2014, Principles and Practice of Constraint Programming. Cham: SPRINGER, p. 590-605 16 p. (Lecture Notes in Computer Science; vol. 8656).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Bayesian network learning by compiling to weighted MAX-SAT

    Cussens, J., 2008, Proceedings of the 24th Conference on Uncertainty in Artificial Intelligence (UAI 2008). McAllester, D. & Myllymaki, P. (eds.). Corvallis, Oregon: AUAI Press, p. 105-112 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 Next