Search research publications and outputs

  1. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  2. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  3. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  4. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  5. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  6. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  7. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  8. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  9. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  10. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  11. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  12. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  13. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  14. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  15. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  16. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  17. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  18. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  19. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  20. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  21. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  22. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  23. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  24. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  25. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  26. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  27. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  28. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  29. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  30. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  31. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  32. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  33. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  34. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaper

  35. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  36. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  37. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  38. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  39. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  40. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  41. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  42. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaper

  43. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  44. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  45. A JAVA bread-board simulator digital circuit simulation with an extensible e-learning tool

    Bailey, C. & Freeman, M. J., 2009, p. 299-306. 8 p.

    Research output: Contribution to conferencePaper

  46. A Layered Behavioural Model of Platelets

    Schneider, S., Treharne, H., Cavalcanti, A. & Woodcock, J., 2006, p. 98-106.

    Research output: Contribution to conferencePaper

  47. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  48. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  49. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  50. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  51. A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems

    Mokhtar, M., Bi, R., Timmis, J. & Tyrrell, A. M., May 2009, p. 2055-2062. 8 p.

    Research output: Contribution to conferencePaper

  52. A Navigation-based Algorithm for Matching Scenario Patterns

    Ma, J., Zhao, G. & Hancock, E. R., 2007, p. 151-157.

    Research output: Contribution to conferencePaper

  53. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  54. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  55. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  56. A New Framework for Grayscale and Colour Non-lambertian Shape-from-Shading

    Smith, W. A. P. & Hancock, E. R., 2007, p. 869-880.

    Research output: Contribution to conferencePaper

  57. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  58. A New Paradigm for SpeckNets: Inspiration from Fungal Colonies

    Falconer, R., Bown, J., Hart, E. & Timmis, J., 2008, p. 90-95.

    Research output: Contribution to conferencePaper

  59. A Note on Traces Refinement and the it onf Relation in the Unifying Theories of Programming

    Cavalcanti, A. & Gaudel, M-C., 2008, p. 42-61.

    Research output: Contribution to conferencePaper

  60. A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Laurens, P., Paige, R. F., Brooke, P. J. & Chivers, H., 2007, p. 97-106.

    Research output: Contribution to conferencePaper

  61. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  62. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  63. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  64. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  65. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  66. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  67. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  68. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  69. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  70. A Rigorous Evaluation of Crossover and Mutation in Genetic Programming

    White, D. & Poulding, S., 2009, p. 220-231. 12 p.

    Research output: Contribution to conferencePaper

  71. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  72. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  73. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  74. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  75. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  76. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  77. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  78. A Static Checker for Safe Pattern Matching in Haskell

    Mitchell, N., Runciman, C. & Eekelen, M. V., 2007, p. 15-30.

    Research output: Contribution to conferencePaper

  79. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  80. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  81. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  82. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  83. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  84. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  85. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  86. A Theory of Pointers for the UTP

    Harwood, W., Cavalcanti, A. & Woodcock, J., 2008, p. 141-155.

    Research output: Contribution to conferencePaper

  87. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  88. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  89. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  90. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  91. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  92. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  93. A UML Profile for Knowledge-Based Systems Modelling

    Abdullah, M. S., Paige, R. F., Kimble, C. & Benest, I. D., 20 Aug 2007, p. 871-878.

    Research output: Contribution to conferencePaper

  94. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  95. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  96. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  97. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  98. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  99. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  100. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  101. A framework for describing and comparing courses and curricula

    Pedroni, M., Oriol, M. & Meyer, B., 1 Jun 2007, p. 131.

    Research output: Contribution to conferencePaper

  102. A functional-logic library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, p. 37--48.

    Research output: Contribution to conferencePaper

  103. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  104. A high abstraction, high accuracy power estimation model for networks-on-chip

    Ost, L., Guindani, G., Indrusiak, L. S., Reinbrecht, C., Raupp, T. & Moraes, F., 2009, p. 31:1--31:6.

    Research output: Contribution to conferencePaper

  105. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  106. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  107. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  108. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  109. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  110. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  111. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  112. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  113. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  114. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  115. A unified model of specular and diffuse reflectance for rough, glossy surfaces

    Smith, W. A. P. & Hancock, E. R., 2009, p. 643-650.

    Research output: Contribution to conferencePaper

  116. ABZ2008 VSR-Net Workshop

    Woodcock, J. & Boca, P., 2008, p. 378-379.

    Research output: Contribution to conferencePaper

  117. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data

    Ting, I-H., Clark, L., Kimble, C., Kudenko, D. & Wright, P., 2007, p. 66-73.

    Research output: Contribution to conferencePaper

  118. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  119. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  120. Abstracting Complex Languages through Transformation and Composition

    Johannes, J., Zschaler, S., Fernández, M. A., Castillo, A., Kolovos, D. S. & Paige, R. F., 2009, p. 546-550.

    Research output: Contribution to conferencePaper

  121. Abstraction and Reformulation in the Generation of Constraint Models

    Frisch, A. M., 2007, p. 2-3.

    Research output: Contribution to conferencePaper

  122. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  123. Accessibility 2.0: people, policies and processes

    Kelly, B., Sloan, D., Brown, S., Seale, J., Petrie, H., Lauke, P. & Ball, S., 2007, p. 138-147.

    Research output: Contribution to conferencePaper

  124. Accessibility in non-professional web authoring tools: a missed web 2.0 opportunity?

    Power, C. & Petrie, H., 2007, p. 116-119.

    Research output: Contribution to conferencePaper

  125. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  126. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  127. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  128. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  129. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  130. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  131. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  132. Adaptable Lymphocytes for Artificial Immune Systems

    Andrews, P. S. & Timmis, J., 2008, p. 376-386.

    Research output: Contribution to conferencePaper

  133. Adaptive Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  134. Adaptivity in Question Answering with User Modelling and a Dialogue Interface

    Quarteroni, S. & Manandhar, S., 2006.

    Research output: Contribution to conferencePaper

  135. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  136. Advanced Structural Representations for Question Classification and Answer Re-ranking

    Quarteroni, S., Moschitti, A., Manandhar, S., Basili, R., Amati, G., Carpineto, C. & Romano, G., 2007, p. 234-245.

    Research output: Contribution to conferencePaper

  137. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  138. Aggregation of Information leaked by a MANET

    Murdoch, J., Clark, J. A., McDermid, J. A., Chivers, H. R. & Worthington, O., 2007.

    Research output: Contribution to conferencePaper

  139. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  140. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  141. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  142. Agile development of secure web applications

    Ge, X., Paige, R. F., Polack, F., Chivers, H. & Brooke, P. J., 2006, p. 305-312. 7 p.

    Research output: Contribution to conferencePaper

  143. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  144. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  145. An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks

    Ochirsuren, E., Indrusiak, L. S. & Glesner, M., 1 Jun 2008, p. 174 -179.

    Research output: Contribution to conferencePaper

  146. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  147. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  148. An Analysis of Approaches to Model Migration

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  149. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  150. An Analysis of Problem Difficulty for a Class of Optimisation Heuristics

    Ridge, E. & Kudenko, D., 2007, p. 198-209.

    Research output: Contribution to conferencePaper

  151. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  152. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  153. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  154. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction

    Secker, A., Davies, M. N., Freitas, A. A., Timmis, J., Clark, E. & Flower, D. R., 2008, p. 242-253.

    Research output: Contribution to conferencePaper

  155. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  156. An Associative Memory for Association Rule Mining

    Baez-Monroy, V. O. & O'Keefe, S., 2007, p. 2227-2232.

    Research output: Contribution to conferencePaper

  157. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  158. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  159. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  160. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  161. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  162. An Empirical Analysis of the Impact of Prioritised Sweeping on the DynaQ's Performance

    Grzes, M. & Kudenko, D., 2008, p. 1041-1051.

    Research output: Contribution to conferencePaper

  163. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  164. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  165. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  166. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  167. An FPGA-based system for development of real-time embedded vision applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 2007, p. 33-40. 8 p.

    Research output: Contribution to conferencePaper

  168. An IDE-based, Integrated Solution to Schema Evolution of Object-Oriented Software

    Piccioni, M., Oriol, M., Meyer, B. & Schneider, T., 1 Nov 2009, p. 650--654. 4 p.

    Research output: Contribution to conferencePaper

  169. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  170. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  171. An Investigation on the Compression Quality of aiNet

    Stibor, T. & Timmis, J., 2007, p. 495-502.

    Research output: Contribution to conferencePaper

  172. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  173. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  174. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  175. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  176. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  177. An action semantics for MOF 2.0

    Paige, R. F., Kolovos, D. S., Polack, F. & Haddad, H., 2006, p. 1304-1305.

    Research output: Contribution to conferencePaper

  178. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  179. An improved speaker diarization system

    Fu, R. & Benest, I. D., 2007, p. 2605-2608.

    Research output: Contribution to conferencePaper

  180. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  181. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  182. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  183. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  184. Analogue Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  185. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  186. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  187. Analysis of Hierarchical EDF Pre-emptive Scheduling

    Zhang, F. & Burns, A., 2007, p. 423-434.

    Research output: Contribution to conferencePaper

  188. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  189. Anisotropic fluid solver for robust optical flow smoothing

    Doshi, A. & Bors, A. G., 6 May 2009, p. 117-120.

    Research output: Contribution to conferencePaper

  190. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  191. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  192. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  193. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  194. Applying UML Interactions and Actor-Oriented Simulation to the Design Space Exploration of Network-on-Chip Interconnects

    Indrusiak, L. S., Ost, L., Moller, L., Moraes, F. & Glesner, M., 1 Apr 2008, p. 491 -494.

    Research output: Contribution to conferencePaper

  195. Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, p. 929-930.

    Research output: Contribution to conferencePaper

  196. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  197. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  198. Approximating 3D facial shape from photographs using coupled statistical models

    Castelan, M., Smith, W. A. P. & Hancock, E. R., 2006, p. 89-98. 10 p.

    Research output: Contribution to conferencePaper

  199. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  200. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  201. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  202. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  203. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  204. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  205. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  206. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  207. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  208. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  209. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  210. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  211. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  212. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  213. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  214. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  215. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  216. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  217. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  218. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  219. Automatic Generation of Information-seeking Questions Using Concept Clusters

    Li, S. & Manandhar, S., 2009, p. 93-96.

    Research output: Contribution to conferencePaper

  220. Automatic Generation of Integrated Formal Models Corresponding to UML System Models

    Treharne, H., Turner, E., Paige, R. F. & Kolovos, D. S., 2009, p. 357-367.

    Research output: Contribution to conferencePaper

  221. Automatic Generation of Verified Concurrent Hardware

    Oliveira, M. & Woodcock, J., 2007, p. 286-306.

    Research output: Contribution to conferencePaper

  222. Automatic Multilingual Lexicon Generation using Wikipedia as a Resource

    Shahid, A. R. & Kazakov, D., 2009, p. 357-360.

    Research output: Contribution to conferencePaper

  223. Automatic Test Data Generation for Multiple Condition and MCDC Coverage

    Ghani, K., Clark, J. A., Boness, K., Fernandes, J. M., Hall, J. G., Machado, R. J. & Oberhauser, R., 2009, p. 152-157. 6 p.

    Research output: Contribution to conferencePaper

  224. Automatic Translation from it ircus to Java

    Freitas, A. & Cavalcanti, A., 2006, p. 115-130.

    Research output: Contribution to conferencePaper

  225. Automatic extraction of notions from course material

    Pedroni, M., Oriol, M., Meyer, B. & Angerer, L., 2008, p. 251.

    Research output: Contribution to conferencePaper

  226. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  227. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  228. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  229. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  230. Automorphisms of transition graphs for a linear cellular automaton

    Powley, E. J. & Stepney, S., 2008, p. 55-68.

    Research output: Contribution to conferencePaper

  231. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity

    Amálio, N., Polack, F. & Zhang, J., 2008, p. 323-336.

    Research output: Contribution to conferencePaper

  232. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  233. Background Subtraction in Video Using Recursive Mixture Models, Spatio-Temporal Filtering and Shadow Removal

    Chen, Z., Pears, N., Freeman, M. & Austin, J., 2009, p. 1141-1150.

    Research output: Contribution to conferencePaper

  234. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  235. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  236. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  237. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

  238. Binary neural network based 3D facial feature localization

    Ju, Q., O'Keefe, S. & Austin, J., 2009, p. 1462-1469.

    Research output: Contribution to conferencePaper

  239. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  240. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  241. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  242. Blind and robust mesh watermarking using manifold harmonics

    Wang, K., Luo, M., Bors, A. G. & Denis, F., Nov 2009, p. 3657-3660. 4 p.

    Research output: Contribution to conferencePaper

  243. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  244. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  245. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  246. Building for Users not for Experts: Designing a Visualization of the Literature Domain

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 707-712.

    Research output: Contribution to conferencePaper

  247. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  248. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  249. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  250. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  251. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  252. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  253. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  254. Can we Remove the Human from Hazard Analysis?

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  255. Capturing player experiences with post-game commentaries.

    Gow, J., Cairns, P. A., Colton, S., Baumgarten, R. & Miller, P., 2010.

    Research output: Contribution to conferencePaper

  256. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  257. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  258. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  259. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  260. Certification of Autonomous Systems

    R Alexander, M. H-M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  261. Certification of Autonomous Systems under UK Military Safety Standards

    Alexander, R., Hall-May, M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  262. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  263. Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System

    Habli, I. & Kelly, T., 2007, p. 193-202.

    Research output: Contribution to conferencePaper

  264. Challenges of evaluating the information visualisation experience

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 167-170.

    Research output: Contribution to conferencePaper

  265. Challenges when using Model-Driven Architecture in the development of Safety Critical Software

    Conmy, P. & Paige, R. F., 31 Mar 2007, p. 127-136. 9 p.

    Research output: Contribution to conferencePaper

  266. Character Education Using Pedagogical Agents and Socratic Voice

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  267. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  268. Characterising Facial Gender Difference Using Fisher-Rao Metric

    Ceolin, S. & Hancock, E. R., 2010, p. 4308-4311.

    Research output: Contribution to conferencePaper

  269. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  270. Characterising embedded applications using a UML profile

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Oct 2009, p. 172 -175.

    Research output: Contribution to conferencePaper

  271. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  272. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  273. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  274. Clustering Morphological Paradigms Using Syntactic Categories

    Can, B. & Manandhar, S., 2009, p. 641-648.

    Research output: Contribution to conferencePaper

  275. Co-ordinating Knowledge in Pervasive Environments

    Nixon, L., Tolksdorf, R., Wood, A. M. & Menezes, R., 2007, p. to appear.

    Research output: Contribution to conferencePaper

  276. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  277. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  278. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  279. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  280. Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005

    Burns, A., Wellings, A. J. & Zhang, F., 2009, p. 119-133.

    Research output: Contribution to conferencePaper

  281. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  282. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  283. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

  284. Combining Reinforcement Learning with Symbolic Planning

    Grounds, M. & Kudenko, D., 2007, p. 75-86.

    Research output: Contribution to conferencePaper

  285. Combining Simulation with Machine Learning to Build Accident Models

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  286. Combining shape-from-shading and stereo using Gaussian-Markov random fields

    Haines, T. S. F. & Wilson, R. C., 8 Dec 2008, p. 1-4. 4 p.

    Research output: Contribution to conferencePaper

  287. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  288. Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM

    Stibor, T. & Timmis, J., 2007, p. 3727-3734.

    Research output: Contribution to conferencePaper

  289. Communicating Complex Systems

    Welch, P. H., Barnes, F. R. M. & Polack, F., 2006, p. 107-120.

    Research output: Contribution to conferencePaper

  290. Communication Systems in ClawZ

    Vernon, M., Zeyda, F. & Cavalcanti, A., 2010, p. 334-348.

    Research output: Contribution to conferencePaper

  291. Commute-Time Convolution Kernels for Graph Clustering

    Rahman, N. A. & Hancock, E. R., 2010, p. 316-323.

    Research output: Contribution to conferencePaper

  292. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  293. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  294. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  295. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  296. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  297. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  298. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  299. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  300. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  301. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  302. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  303. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  304. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  305. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  306. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  307. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  308. Concordance: A Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 245-260.

    Research output: Contribution to conferencePaper

  309. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  310. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  311. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  312. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  313. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  314. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  315. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  316. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  317. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  318. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  319. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  320. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  321. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  322. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  323. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  324. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  325. Coordination of Collaborative Engineering: State of the Art and Future Challenges

    Pawlak, A., Sandkuhl, K., Cholewa, W. & Indrusiak, L. S., 2007.

    Research output: Contribution to conferencePaper

  326. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  327. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  328. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  329. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  330. Cotranslational Protein Folding with L-systems

    Danks, G. B., Stepney, S., Caves, L. S. D., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 289-296.

    Research output: Contribution to conferencePaper

  331. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  332. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  333. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  334. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  335. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  336. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  337. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  338. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  339. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  340. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  341. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  342. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  343. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  344. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  345. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  346. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  347. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  348. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  349. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  350. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  351. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  352. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  353. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  354. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  355. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  356. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  357. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  358. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  359. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  360. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  361. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  362. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  363. Developing user requirements for visualizations of literature knowledge domains

    Faisal, S., Cairns, P. & Blandford, A., 2006, p. 264-269.

    Research output: Contribution to conferencePaper

  364. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  365. Deviational Analyses for Validating Regulations on Real Systems

    Polack, F., Srivatanakul, T., Kelly, T., Clark, J. A., Laleau, R. & Lemoine, M., 2006.

    Research output: Contribution to conferencePaper

  366. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  367. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  368. Dispatching Domains for Multiprocessor Platforms and Their Representation in Ada

    Burns, A. & Wellings, A. J., 2010, p. 41-53.

    Research output: Contribution to conferencePaper

  369. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  370. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  371. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  372. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  373. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  374. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  375. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  376. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  377. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  378. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  379. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  380. Ecore to GenModel Case

    Kolovos, D. S., Rose, L. M., Paige, R. F. & de Lara, J., 2010.

    Research output: Contribution to conferencePaper

  381. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  382. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  383. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  384. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  385. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  386. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  387. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  388. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  389. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  390. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  391. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  392. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  393. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  394. Enforcing Behaviour with Anonymity

    Wright, J. & Stepney, S., 2008.

    Research output: Contribution to conferencePaper

  395. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  396. Engineering Emergence

    Stepney, S., Polack, F. & Turner, H. R., 2006, p. 89-97.

    Research output: Contribution to conferencePaper

  397. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  398. Ensuring Dependable Systems of Systems

    Kelly, T., Hall-May, M. & Alexander, R., 2007.

    Research output: Contribution to conferencePaper

  399. Environment orientation: an architecture for simulating complex systems

    Hoverd, T. & Stepney, S., 2009, p. 67-82.

    Research output: Contribution to conferencePaper

  400. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  401. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  402. Equivalence Arguments for Complex Systems Simulations: A Case-Study

    Ghetiu, T., Alexander, R., Andrews, P., Polack, F. & Bown, J., 2009.

    Research output: Contribution to conferencePaper

  403. Escaping the Non-Quantitative Trap

    Alexander, R. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  404. Establishing Private Communications in Open Systems using Multicapabilities

    Udzir, N. I. & Wood, A., 1 Apr 2006.

    Research output: Contribution to conferencePaper

  405. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  406. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  407. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  408. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  409. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  410. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  411. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  412. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  413. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  414. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  415. Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks

    Zuhily, A. & Burns, A., 2008, p. 410-424.

    Research output: Contribution to conferencePaper

  416. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  417. Experience Report: Visualizing Data through Functional Pipelines

    Duke, D., Borgo, R., Runciman, C. & Wallace, M., 1 Sep 2008, p. 379--382.

    Research output: Contribution to conferencePaper

  418. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  419. Experimental assessment of random testing for object-oriented software

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2007, p. 84.

    Research output: Contribution to conferencePaper

  420. Experiments in Object Trouve browsing

    Colton, S., Torres, P., Gow, J. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  421. Exploiting Loose Horizontal Coupling in Evolutionary Swarm Robotics

    Owen, J., Stepney, S., Timmis, J. & Winfield, A. F. T., 2010, p. 432-439.

    Research output: Contribution to conferencePaper

  422. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  423. Extending Argumentation to Goal-Oriented Requirements Engineering

    Habli, I., Wu, W., Attwood, K. & Kelly, T., 2007, p. 306-316.

    Research output: Contribution to conferencePaper

  424. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  425. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  426. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  427. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  428. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  429. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  430. Extending the safety case concept to address dependability

    Despotou, G. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  431. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  432. Extreme Programming Security Practices

    Ge, X., Paige, R. F., Polack, F. & Brooke, P. J., 2007, p. 226-230. 4 p.

    Research output: Contribution to conferencePaper

  433. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  434. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  435. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  436. FPTC: Automated Safety Analysis for Domain-Specific Languages

    Paige, R. F., Rose, L. M., Ge, X., Kolovos, D. S. & Brooke, P. J., 2009, p. 229-242.

    Research output: Contribution to conferencePaper

  437. FSF: A Real-Time Scheduling Architecture Framework

    Aldea, M., Bernat, G., Broster, I., Burns, A., Dobrin, R., Drake, J. M., Fohler, G., Gai, P., Harbour, M. G., Guidi, G., Gutiérrez, J. J., Lennvall, T., Lipari, G., Martínez, J. M., Medina, J. L. & Trimarchi, M., 2006, p. 113-124.

    Research output: Contribution to conferencePaper

  438. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  439. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  440. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  441. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  442. Facial Shape Estimation in the Presence of Cast Shadows

    Smith, W. A. P. & Hancock, E. R., 2006, p. 779-788.

    Research output: Contribution to conferencePaper

  443. Facial Shape Spaces from Surface Normals and Geodesic Distance

    Ceolin, S., Smith, W. A. P. & Hancock, E. R., 2007, p. 416-423.

    Research output: Contribution to conferencePaper

  444. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  445. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  446. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  447. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  448. Finding Inputs that Reach a Target Expression

    Naylor, M. & Runciman, C., 2007, p. 133-142.

    Research output: Contribution to conferencePaper

  449. First Steps in the Verified Software Grand Challenge

    Woodcock, J., 2006, p. 203-206.

    Research output: Contribution to conferencePaper

  450. Flexibility and Manageability of IMS Projects

    Stephenson, Z., Nicholson, M. & McDermid, J. A., 2006.

    Research output: Contribution to conferencePaper

  451. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  452. Folding Protein-Like Structures with Open L-Systems

    Danks, G. B., Stepney, S. & Caves, L. S. D., 2007, p. 1100-1109.

    Research output: Contribution to conferencePaper

  453. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  454. Formal Analysis in Model Management: Exploiting the Power of CZT

    Williams, J. R., Polack, F. A. C. & Paige, R. F., 2010, p. 414.

    Research output: Contribution to conferencePaper

  455. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  456. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  457. Formalising Flash Memory: First Steps

    Butterfield, A. & Woodcock, J., 2007, p. 251-260.

    Research output: Contribution to conferencePaper

  458. Formalising Harmony Seeking Rules of Morphogenesis

    Hoverd, T. & Stepney, S., 2010, p. 386-393.

    Research output: Contribution to conferencePaper

  459. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  460. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  461. Freja, Hat and Hood: a comparative evaluation of three systems for tracing and debugging lazy functional programs

    Chitil, O., Runciman, C. & Wallace, M., 2001, p. 176--193.

    Research output: Contribution to conferencePaper

  462. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  463. From Circus to JCSP

    Oliveira, M. & Cavalcanti, A., 2004, p. 320-340.

    Research output: Contribution to conferencePaper

  464. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  465. From immersion to addiction in videogames

    Seah, M. & Cairns, P. A., 2008, p. 55-63.

    Research output: Contribution to conferencePaper

  466. From the gaming experience to the wider user experience

    Gámez, E. H. C., Cairns, P. A. & Cox, A. L., 2009, p. 520-523.

    Research output: Contribution to conferencePaper

  467. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  468. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  469. Further investigations into post-completion error: the effects of interruption position and duration

    Li, S. Y. W., Cox, A. L., Blandford, A., Cairns, P., Young, R. M. & Abeles, A., 2006.

    Research output: Contribution to conferencePaper

  470. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  471. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  472. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  473. Game Intelligence: Proceedings of the IEEE Conference on Computational Intelligence in Games (CIG)

    Devlin, S., Cowling, P. I., Kudenko, D., Goumagias, N., Nucciarelli, A., Cabras, I., Fernandes, K. J. & Li, F., 2014.

    Research output: Contribution to conferencePaper

  474. Garbage Collection in Linda using Tuple Monitoring and Process Registration

    Menezes, R. & Wood, A., 1998, p. 490--495.

    Research output: Contribution to conferencePaper

  475. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  476. Gene regulation in a particle metabolome

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T. & Young, P., 2009, p. 3024-3031.

    Research output: Contribution to conferencePaper

  477. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  478. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  479. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  480. Generation of Dilemma-Based Narratives: Method and Turing Test Evaluation

    Barber, H. & Kudenko, D., 2008, p. 214-217.

    Research output: Contribution to conferencePaper

  481. Generic Operations for Concurrent Knowledge Manipulation Architectures

    Wood, A. M. & Campbell, D. K. G., 1 Feb 1998.

    Research output: Contribution to conferencePaper

  482. Generic component lookup

    Bay, T., Eugster, P. & Oriol, M., 2006, p. 182-197. 15 p.

    Research output: Contribution to conferencePaper

  483. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next