Search research publications and outputs

  1. 2010
  2. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  3. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  4. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  5. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  6. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  7. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  8. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  9. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  10. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  11. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  12. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  13. Sonification Strategies for Examination of Biological Cells

    Edwards, A., Hunt, A., Hines, G., Jackson, V., Podvoiskis, A., Roseblade, R. & Stammers, J., 1 Jun 2010.

    Research output: Contribution to conferencePaper

  14. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  15. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  16. The Phish in the Pond: scam emails as literature

    Clark, J. A. & Blythe, M., 10 Apr 2010.

    Research output: Contribution to conferencePaper

  17. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  18. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  19. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaper

  20. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  21. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  22. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  23. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  24. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  25. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  26. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...49 Next