Search research publications and outputs

  1. Chapter (peer-reviewed) › Research › Peer-reviewed
  2. A Survey of Outlier Detection Methodologies

    Hodge, V. J. & Austin, J., 26 Sep 2013, Fundamentals of Regression Modeling. Babones, S. (ed.). (SAGE Benchmarks in Social Research Methods).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  3. Checking Graph-Transformation Systems for Confluence

    Plump, D., 2010, Manipulation of Graphs, Algebras and Pictures: Essays Dedicated to Hans-Jörg Kreowski on the Occasion of His 60th Birthday. Drewes, F., Habel, A., Hoffmann, B. & Plump, D. (eds.). Technische Universität Berlin, 16 p. (Electronic Communications of the EASST; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  4. Confluence of Graph Transformation Revisited

    Plump, D., 2005, Processes, Terms and Cycles: Steps on the Road to Infinity: Essays Dedicated to Jan Willem Klop on the Occasion of His 60th Birthday. Middledorp, A., VanOostrom, V., VanRaamsdonk, F. & DeVrijer, R. (eds.). BERLIN: Springer, p. 280-308 29 p. (Lecture Notes in Computer Science; vol. 3838).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  5. Hypergraph Rewriting: Critical Pairs and Undecidability of Confluence

    Plump, D., 1993, Term Graph Rewriting: Theory and Practice. Sleep, R., Plasmeijer, R. & van Eekelen, M. (eds.). John Wiley, p. 201-213 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  6. Term Graph Rewriting

    Plump, D., 1999, Handbook of Graph Grammars and Computing by Graph Transformation, Volume 2: Applications, Languages and Tools. Ehrig, H., Engels, G., Kreowski, H-J. & Rozenberg, G. (eds.). World Scientific Publishing, Vol. 2. p. 3-61

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  7. Chapter (peer-reviewed) › Research › Not peer-reviewed
  8. An Information Theoretic Approach to Gender Feature Selection

    Zhang, Z., Hancock, E. R. & Wu, J., 2011, 2011 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCV WORKSHOPS). NEW YORK: IEEE, p. - 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  9. Information Theoretic Methods for Learning Generative Models for Relational Structures

    Hancock, E. R., Han, L. & Wilson, R. C., 2011, 2011 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCV WORKSHOPS). NEW YORK: IEEE, p. - 2 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  10. System Safety Engineering: The Benefits and Practicalities of Globalization

    McDermid, J. A., 2011, 29th International System Safety Conference Proceedings, Las Vegas, Nevada. 8-12 August 2011. The International System Safety Society

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Tensor-based Total Bregman Divergences between Graphs

    Escolano, F., Liu, M. & Hancock, E. R., 2011, 2011 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCV WORKSHOPS). NEW YORK: IEEE, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  12. Using Compositional Verification to Manage Change in Large-Scale Systems

    Calinescu, R. C., Kikuchi, S. & Johnson, K. H. A., 2012, Large-Scale Complex IT Systems - Development, Operation and Management. Vol. 7539.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  13. Other chapter contribution › Research
  14. A Continuous-Time Quantum Walk Kernel for Unattributed Graphs

    Rossi, L., Torsello, A. & Hancock, E. R., 2013, Graph-Based Representations in Pattern Recognition. Kropatsch, W., Artner, N., Haxhimusa, Y. & Jiang, X. (eds.). Springer Berlin / Heidelberg, Vol. 7877. p. 101-110 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  15. A Fast Jensen-Shannon Subgraph Kernel

    Bai, L. & Hancock, E. R., 2013, Image Analysis and Processing – ICIAP 2013. Petrosino, A. (ed.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8156. p. 181-190 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  16. A Graph Embedding Method Using the Jensen-Shannon Divergence

    Bai, L., Hancock, E. R. & Han, L., 2013, Computer Analysis of Images and Patterns. Wilson, R., Hancock, E., Bors, A. & Smith, W. (eds.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8047. p. 102-109 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  17. A Quantum Jensen-Shannon Graph Kernel Using the Continuous-Time Quantum Walk

    Bai, L., Hancock, E. R., Torsello, A. & Rossi, L., 2013, Graph-Based Representations in Pattern Recognition. Kropatsch, W., Artner, N., Haxhimusa, Y. & Jiang, X. (eds.). Springer Berlin / Heidelberg, Vol. 7877. p. 121-131 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  18. Abstraction and reformulation in the generation of constraint models - (Extended abstract)

    Frisch, A. M., 2007, Abstraction, Reformulation, and Approximation, Proceedings. Miguel, I. & Ruml, W. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 23 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  19. Analysing System Failure Behaviours with PRISM

    Ge, X., Paige, R. F. & McDermid, J. A., Jun 2010, Proceedings of the 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C). p. 130-136 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  20. Analysis of Wave Packet Signature of a Graph

    Aziz, F., Wilson, R. C. & Hancock, E. R., 2013, Computer Analysis of Images and Patterns. Wilson, R., Hancock, E., Bors, A. & Smith, W. (eds.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8047. p. 128-136 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  21. Analysis of the Schrödinger Operator in the Context of Graph Characterization

    Suau, P., Hancock, E. R. & Escolano, F., 2013, Similarity-Based Pattern Recognition. Hancock, E. & Pelillo, M. (eds.). Springer Berlin / Heidelberg, Vol. 7953. p. 190-203 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  22. Assurance in High-Integrity Software

    McDermid, J. A. & Sennett, C. T. (ed.), 1989, High-integrity software. Pitman, p. 226-273 48 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  23. Attributed Graph Similarity from the Quantum Jensen-Shannon Divergence

    Rossi, L., Torsello, A. & Hancock, E. R., 2013, Similarity-Based Pattern Recognition. Hancock, E. & Pelillo, M. (eds.). Springer Berlin / Heidelberg, Vol. 7953. p. 204-218 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  24. Birds of a feather Group on Safety Critical Systems

    Cullyer, W. J., McDermid, J. A., Halang, W. A. (ed.) & Stoyenko, A. D. (ed.), 1993, Real-Time Computing. Springer-verlag, p. 755-756 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  25. Complexity Fusion for Indexing Reeb Digraphs

    Escolano, F., Hancock, E. R. & Biasotti, S., 2013, Computer Analysis of Images and Patterns. Wilson, R., Hancock, E., Bors, A. & Smith, W. (eds.). PART 1 ed. Springer Berlin / Heidelberg, Vol. 8047. p. 120-127 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  26. Deductive Reasoning and Statistical Inference

    Cussens, J., 2005, Encyclopedia of Statistics in Behavioral Science. Chichester: John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  27. Development of High Integrity Software Product Lines using Model Transformation

    Hutchesson, S. G. & McDermid, J. A., 2010, Computer Safety, Reliability and Security: SAFECOMP'10 Proceedings of the 29th International Conference on Computer Safety, Reliability, and Security. Heidelberg: Springer, Vol. 6351. p. 389-401 13 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  28. Domain Analysis of an Electronic Health records System

    Ge, X., Paige, R. F. & McDermid, J. A., 2009, FOSD '09 Proceedings of the First International Workshop on Feature-Oriented Software Development . New York: ACM, p. 49-54 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Previous 1 2 3 4 5 6 7 8 ...65 Next