Search research publications and outputs

  1. A Worst-Case Behavior Analysis for Hard Real-Time Transactions

    Byun, J., Burns, A., Davis, R. & Wellings, A. J., 1997, Real-Time Database Systems. Vol. 396. p. 235-249

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. A Z Patterns Catalogue I: specification and refactorings, v0.1

    Stepney, S., Polack, F. & Toyn, I., 1 Jan 2003, Department of Computer Science, University of York. (Department of Computer Science Technical Report series; vol. YCS-2003-349)

    Research output: Book/ReportOther report

  3. A Z Patterns Catalogue II: definitions and laws, v0.1

    Valentine, S. H., Stepney, S. & Toyn, I., 1 Oct 2004, Department of Computer Science, University of York. (Department of Computer Science Technical Report; vol. YCS-2004-383)

    Research output: Book/ReportOther report

  4. A Z Subset for Direct Implementation and Code Generation

    Shi, F. G., McDermid, J. A. & Armstrong, J. M., 17 Nov 2001.

    Research output: Working paper

  5. A behavioural intervention improved cognitive function and depression in elderly people in residential homes

    Proctor, R., Stratton-Powell, H., Burns, A., Tarrier, N., Richardson, G., Davies, L., South, B. & Farragher, B., 2000

    Article in Evidence Based Nursing

  6. A behavioural notion of subtyping for object-oriented programming in SPARK95.

    Lin, T. M. & McDermid, J. A., 2003, RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2003. Rosen, JP. & Strohmeier, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 309-321 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A case study for a WWW based CAD framework

    Indrusiak, L. S. & Reis, R. A. D., 1998, XI BRAZILIAN SYMPOSIUM ON INTEGRATED CIRCUIT DESIGN, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 116-119 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  9. A cellular system for pattern recognition using associative neural networks

    Orovas, C. & Austin, J., 1998, CNNA 98 - 1998 FIFTH IEEE INTERNATIONAL WORKSHOP ON CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS - PROCEEDINGS. Tavsanoglu, V. (ed.). NEW YORK: IEEE, p. 143-148 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  11. A coevolutionary model for the virus game

    Cowling, P. I., Naveed, M. H. & Hossain, M. A., 2006, Computational Intelligence and Games, 2006 IEEE Symposium on. p. 45-51 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. A compact fiducial for affine augmented reality

    Parnham, D. J., Robinson, J. A. & Zhao, Y., 1 Apr 2005, p. 347-352.

    Research output: Contribution to conferenceOther

  13. A comparative study of real-valued negative selection to statistical anomaly detection techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS. Jacob, C., Pilat, ML., Bentley, PJ. & Timmis, J. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 262-275 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  15. A comparison of major issues for the development of forensics in cloud computing

    Jacob, J. L. & Aydin, M., Dec 2013, Proceedings 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). p. 77--82

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. A comparison of rule inheritance in model-to-model transformation languages

    Wimmer, M., Kappel, G., Kusel, A., Retschitzegger, W., Schönböck, J., Schwinger, W., Kolovos, D., Paige, R., Lauder, M., Schürr, A. & Wagelaar, D., 18 Jul 2011, Theory and Practice of Model Transformations - 4th International Conference, ICMT 2011, Proceedings. p. 31-46 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6707 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...7 8 9 10 11 12 13 14 ...201 Next