Search research publications and outputs

  1. 2006
  2. Retrenching the Purse: Finite Exception Logs, and Validating the Small

    Banach, R., Poppleton, M. & Stepney, S., 2006, p. 234-248.

    Research output: Contribution to conferencePaper

  3. Structuring Safety Policy Decomposition

    Hall-May, M. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  4. Sustainable Scheduling Analysis

    Baruah, S. K. & Burns, A., 2006, p. 159-168.

    Research output: Contribution to conferencePaper

  5. Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking

    Freitas, L., Cavalcanti, A. & Woodcock, J., 2006, p. 697-716.

    Research output: Contribution to conferencePaper

  6. Tensor MRI Regularization via Graph Diffusion

    Zhang, F. & Hancock, E. R., 2006, p. 589-598.

    Research output: Contribution to conferencePaper

  7. Test Case Management Tools for Accessibility Testing

    Herramhof, S., Petrie, H., Strobbe, C., Vlachogiannis, E., Weimann, K., Weber, G. & Velasco, C. A., 2006, p. 215-222.

    Research output: Contribution to conferencePaper

  8. The Epsilon Object Language (EOL)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 128-142.

    Research output: Contribution to conferencePaper

  9. The Fading Concept in Tuple-Space Systems

    Menezes, R. & Wood, A. M., 2006, p. 440--444.

    Research output: Contribution to conferencePaper

  10. The View Glue

    Radjenovic, A. & Paige, R. F., 2006, p. 66-88. 22 p.

    Research output: Contribution to conferencePaper

  11. The identification and extraction of itemset support defined by the weight matrix of a Self-Organising Map

    Baez-Monroy, V. O. & O'Keefe, S., 2006, p. 3518-3525.

    Research output: Contribution to conferencePaper

  12. Towards Evidence-Based Architectural Design for Safety-Critical Software Applications

    Wu, W. & Kelly, T., 2006, p. 383-408.

    Research output: Contribution to conferencePaper

  13. Towards a Practical Process for Automated Safety Analysis

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2006.

    Research output: Contribution to conferencePaper

  14. Towards an Agile Process for Building Software Product Lines

    Paige, R. F., Wang, X., Stephenson, Z. R., Brooke, P. J., Abrahamsson, P., Marchesi, M. & Succi, G., 2006, p. 198-199. 11 p.

    Research output: Contribution to conferencePaper

  15. Unifying Theories in ProofPower-Z

    Oliveira, M., Cavalcanti, A. & Woodcock, J., 2006, p. 123-140.

    Research output: Contribution to conferencePaper

  16. Unsupervised Word Sense Disambiguation Using The WWW

    Klapaftis, I. P. & Manandhar, S., 2006, p. 174-183.

    Research output: Contribution to conferencePaper

  17. User Modeling for Adaptive Question Answering and Information Retrieval

    Quarteroni, S. & Manandhar, S., 2006, p. 776-781.

    Research output: Contribution to conferencePaper

  18. Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2006, p. 330-343.

    Research output: Contribution to conferencePaper

  19. Using a Model Merging Language for Reconciling Model Versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, p. 143-157.

    Research output: Contribution to conferencePaper

  20. Verification of Control Systems using Circus

    Cavalcanti, A. & Clayton, P., 2006, p. 269-278.

    Research output: Contribution to conferencePaper

  21. Verified Software Grand Challenge

    Woodcock, J., 2006, p. 617-617.

    Research output: Contribution to conferencePaper

  22. Voronoi diagrams, vectors and the visually impaired

    Power, C., Gill, D. & Daley, M., 2006, p. 1247-1252.

    Research output: Contribution to conferencePaper

  23. Z/Eves and the Mondex Electronic Purse

    Woodcock, J. & Freitas, L., 2006, p. 15-34.

    Research output: Contribution to conferencePaper

  24. 2005
  25. High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A. & Stephenson, Z. R., 1 Dec 2005, p. 1518-1523. 6 p.

    Research output: Contribution to conferencePaper

  26. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  27. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  28. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaper

  29. Improving the Performance of Embedded Superscalatr Microprocessors by Adding Partial Pipeline

    Crispin-Bailey, C., Shi, H., Hastie, N. & Farrel, G., 31 Aug 2005, p. 15-20. 6 p.

    Research output: Contribution to conferencePaper

  30. The PISA architecture, a Viable platform for the Superscalar Execution of Statically Scheduled Stack Code

    Crispin-Bailey, C. & Alli, S., 31 Aug 2005, p. 23-26. 4 p.

    Research output: Contribution to conferencePaper

  31. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  32. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  33. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  34. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  35. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  36. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  37. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  38. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  39. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  40. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  41. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  42. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  43. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  44. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  45. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  46. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  47. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  48. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  49. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  50. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  51. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  52. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  53. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  54. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  55. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  56. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  57. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  58. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  59. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  60. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  61. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  62. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  63. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  64. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  65. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  66. Goal-Based Safety Standards: Opportunities and Challenges

    Kelly, T. P., McDermid, J. A. & Weaver, R. A., 2005.

    Research output: Contribution to conferencePaper

  67. Growing Music: Musical Interpretations of L-Systems

    Worth, P. & Stepney, S., 2005, p. 545-550.

    Research output: Contribution to conferencePaper

  68. Hardware implementation of similarity functions

    Freeman, M., Weeks, M. & Austin, J., 2005, p. 329-332.

    Research output: Contribution to conferencePaper

  69. Image Segmentation using Commute Times

    Qiu, H., Hancock, E. R., Clocksin, W. F., Fitzgibbon, A. W. & Torr, P. H. S., 2005.

    Research output: Contribution to conferencePaper

  70. Instruction level parallelism of stack-code under varied issue widths, and one-level branch prediction

    Bailey, C. & Shi, H., 2005, p. 23-30.

    Research output: Contribution to conferencePaper

  71. Learning to Coordinate Using Commitment Sequences in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2005, p. 106-118.

    Research output: Contribution to conferencePaper

  72. Literate Proving: Presenting and Documenting Formal Proofs

    Cairns, P. A. & Gow, J., 2005, p. 159-173.

    Research output: Contribution to conferencePaper

  73. Mobile Phone Preferences and Values: the U.K. vs. Korea

    Cha, H., Oshlyansky, L. & Cairns, P. A., 2005, p. 29-41.

    Research output: Contribution to conferencePaper

  74. Modeling of Dual-Route Fear Conditioning Paradigm in the Auditory Cortex

    Sengupta, B., Austin, J. & Green, G., 2005, p. 3632-3644.

    Research output: Contribution to conferencePaper

  75. Modelling Incremental Learning With The Batch SOM Training Method

    Baez-Monroy, V. O. & O'Keefe, S., 2005, p. 542-544.

    Research output: Contribution to conferencePaper

  76. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  77. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  78. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  79. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  80. Penrose Life: Ash and Oscillators

    Hill, M., Stepney, S. & Wan, F., 2005, p. 471-480.

    Research output: Contribution to conferencePaper

  81. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  82. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  83. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  84. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  85. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  86. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  87. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  88. Rule Migration: Exploring a design framework for modelling emergence in CA-like systems

    Turner, H. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  89. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  90. Tagged sets: A secure and transparent coordination medium

    Oriol, M. & Hicks, M., 2005, p. 252--267.

    Research output: Contribution to conferencePaper

  91. The Temporal Knapsack Problem and Its Solution

    Bartlett, M., Frisch, A. M., Hamadi, Y., Miguel, I., Tarim, A. & Unsworth, C., 2005, p. 34-48.

    Research output: Contribution to conferencePaper

  92. Towards Using Simulation to Evaluate Safety Policy for Systems of Systems

    Alexander, R., Hall-May, M., Despotou, G. & Kelly, T., 2005.

    Research output: Contribution to conferencePaper

  93. Towards the Systematic Generation of Channelling Constraints

    Hernández, B. M. & Frisch, A. M., 2005, p. 859.

    Research output: Contribution to conferencePaper

  94. Transforming and Refining Abstract Constraint Specifications

    Frisch, A. M., Hnich, B., Miguel, I., Smith, B. M. & Walsh, T., 2005, p. 76-91.

    Research output: Contribution to conferencePaper

  95. UBB Mining: Finding Unexpected Browsing Behaviour in Clickstream Data to Improve a Web Site's Design

    Ting, I-H., Kimble, C. & Kudenko, D., 2005, p. 179-185.

    Research output: Contribution to conferencePaper

  96. Unified Modeling Language for Knowledge Modelling

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2005, p. 952-957.

    Research output: Contribution to conferencePaper

  97. Unifying Program Refinement Calculi

    Woodcock, J., 2005, p. 76.

    Research output: Contribution to conferencePaper

  98. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  99. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaper

  100. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaper

  101. 2004
  102. Lazy Assertions

    Chitil, O., McNeill, D. & Runciman, C., 1 Nov 2004, p. 1--19.

    Research output: Contribution to conferencePaper

  103. Multicapabilities for Distributed Resource Management in Open Systems

    Udzir, N. I., Wood, A. & Gonzalez, T., 1 Nov 2004, p. 157-162.

    Research output: Contribution to conferencePaper

  104. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  105. Implementing Contract Net in Tuple Space Models

    Udzir, N. I., Wood, A. & Hamza, M. H., 1 Feb 2004, p. 325-330.

    Research output: Contribution to conferencePaper

  106. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  107. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  108. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  109. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  110. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  111. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  112. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  113. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  114. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  115. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  116. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  117. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  118. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  119. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  120. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  121. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  122. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  123. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  124. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  125. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  126. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  127. Extending the safety case concept to address dependability

    Despotou, G. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  128. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  129. From Circus to JCSP

    Oliveira, M. & Cavalcanti, A., 2004, p. 320-340.

    Research output: Contribution to conferencePaper

  130. Improving knowledge discovery by combining text-mining and link analysis techniques

    Ben-Dov, M., Wu, W., Feldman, R., Cairns, P. A. & House, R., 2004.

    Research output: Contribution to conferencePaper

  131. Informalising Formal Mathematics: searching the mizar library with Latent Semantics

    Cairns, P., 2004, p. 58--72.

    Research output: Contribution to conferencePaper

  132. Investigating Available Instruction Level Parallelism for Stack Based Machine Architectures

    Shi, H. & Bailey, C., 2004, p. 112-120.

    Research output: Contribution to conferencePaper

  133. Metrics Are Fitness Functions Too

    Harman, M. & Clark, J. A., 2004, p. 58-69.

    Research output: Contribution to conferencePaper

  134. Personalization of Interactive Systems: Introduction to the Special Thematic Session

    Petrie, H. & Weber, G., 2004, p. 117-120.

    Research output: Contribution to conferencePaper

  135. Practical Formal Specification for Embedded Control Systems

    Iwu, F., Galloway, A. J., Toyn, I. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  136. Product Line Analysis and the System Safety Process

    Stephenson, Z., Souza, S. D., McDermid, J. A. & Ward, A., 2004, p. 790-799.

    Research output: Contribution to conferencePaper

  137. Quantum algorithms in group theory

    Batty, M., Braunstein, SL., Duncan, AJ. & Rees, S., 2004, p. 1-62.

    Research output: Contribution to conferencePaper

  138. Radiance function estimation for object classification

    Robles-Kelly, A. & Hancock, E. R., 2004, p. 67-75. 9 p.

    Research output: Contribution to conferencePaper

  139. Refine and Gabriel: Support for Refinement and Tactics

    Oliveira, M., Xavier, M. & Cavalcanti, A., 2004, p. 310-319.

    Research output: Contribution to conferencePaper

  140. Refinement: An overview

    Cavalcanti, A., Sampaio, A. & Woodcock, J., 2004, p. 1-17.

    Research output: Contribution to conferencePaper

  141. Requirements for Performing Safety Analysis on Operating Systems

    Conmy, P. M. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  142. Rewriting History to Exploit Gain Time

    Bernat, G., Broster, I. & Burns, A., 2004, p. 328-335.

    Research output: Contribution to conferencePaper

  143. Safety Analysis of Software Architectures - "LIghtweight PSSA"

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  144. Safety Tactics for Software Architecture Design

    Wu, W. & Kelly, T., 2004, p. 368-375.

    Research output: Contribution to conferencePaper

  145. Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Ge, X., Polack, F. & Laleau, R., 2004, p. 234-247.

    Research output: Contribution to conferencePaper

  146. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  147. Specification-Driven Design with Eiffel and Agents for Teaching Lightweight Formal Methods

    Paige, R. F. & Ostroff, J. S., 2004, p. 107-123.

    Research output: Contribution to conferencePaper

  148. Supporting Deadlines and EDF Scheduling in Ada

    Burns, A. & Wellings, A. J., 2004, p. 156-165.

    Research output: Contribution to conferencePaper

  149. Symmetry Breaking as a Prelude to Implied Constraints: A Constraint Modelling Pattern

    Frisch, A. M., Jefferson, C. & Miguel, I., 2004, p. 171-175. 4 p.

    Research output: Contribution to conferencePaper

  150. Teaching post-classical computation: extended abstract

    Stepney, S., 2004, p. 3.

    Research output: Contribution to conferencePaper

  151. Tension, what tension? Website accessibility and visual design

    Petrie, H., Hamilton, F. & King, N., 2004, p. 13-18.

    Research output: Contribution to conferencePaper

  152. The HEAT/ACT Preliminary Safety Case: A Case Study in the Use of Goal Structuring Notation

    Chinneck, P., Pumfrey, D. J., McDermid, J. A. & Cant, T., 2004.

    Research output: Contribution to conferencePaper

  153. The Simulink/Stateflow Analyser

    Galloway, A. J., Toyn, I., Iwu, F. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  154. The design of S-boxes by simulated annealing

    Clark, J. A., Jacob, J. L. & Stepney, S., 2004, p. 1533--1537.

    Research output: Contribution to conferencePaper

  155. Three Dimensional Auditory Display: Issues in Applications for Visually Impaired Students

    Cooper, M. & Petrie, H., 2004.

    Research output: Contribution to conferencePaper

  156. Three-Dimensional Face Recognition: A Fishersurface Approach

    Heseltine, T., Pears, N. & Austin, J., 2004, p. 684-691.

    Research output: Contribution to conferencePaper

  157. Towards Mobile Processes in Unifying Theories

    Tang, X. & Woodcock, J., 2004, p. 44-53.

    Research output: Contribution to conferencePaper

  158. Uncalibrated Two-View Metrology

    Liang, B., Chen, Z. & Pears, N., 2004, p. 96-99.

    Research output: Contribution to conferencePaper

  159. User Centred Design and the Japanese User

    Oshlyansky, L., Cairns, P. A. & Foy, K., 2004, p. 9-20.

    Research output: Contribution to conferencePaper

  160. Using Document Dimensions for Enhanced Information Retrieval

    Jayasooriya, T. & Manandhar, S., 2004, p. 145-152.

    Research output: Contribution to conferencePaper

  161. Using Fuzzy Self-Organising Maps for Safety Critical Systems

    Kurd, Z. & Kelly, T., 2004, p. 17-30.

    Research output: Contribution to conferencePaper

  162. 2003
  163. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  164. Pattern Matching in DAME using Grid Enabled AURA Technology

    Davis, R., Liang, B., Jessop, M. D., Pasley, A. & Austin, J., Sep 2003.

    Research output: Contribution to conferencePaper

  165. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  166. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  167. Testing and Tracing Lazy Functional Programs using QuickCheck and Hat

    Claessen, K., Runciman, C., Chitil, O., Hughes, R. J. M. & Wallace, M., 1 Feb 2003, p. 59--99.

    Research output: Contribution to conferencePaper

  168. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  169. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  170. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  171. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  172. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  173. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  174. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  175. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  176. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  177. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  178. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  179. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  180. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  181. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  182. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  183. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  184. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  185. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  186. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  187. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  188. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  189. Identifying safety dependencies in modular computer systems

    Conmy, P., Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  190. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 207-218.

    Research output: Contribution to conferencePaper

  191. LuckyJ : an Asynchronous Evolution Platform for Component-Based Applications

    Oriol, M., 2003, p. 1-10.

    Research output: Contribution to conferencePaper

  192. Modular UML Semantics: Interpretations in Z Based on Templates and Generics

    Amálio, N., Stepney, S. & Polack, F., 2003.

    Research output: Contribution to conferencePaper

  193. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  194. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  195. Problems and solutions for markup for mathematical examples and exercises

    Goguadze, G., Melis, E., Ullrich, C. & Cairns, P., 2003, p. 80--92.

    Research output: Contribution to conferencePaper

  196. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  197. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  198. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  199. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  200. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  201. Smart Devices and Software Agents: The Basics of Good Behaviour

    Chivers, H., Clark, J. A., Stepney, S., Hutter, D., Müller, G., Stephan, W. & Ullmann, M., 2003, p. 39-52.

    Research output: Contribution to conferencePaper

  202. Social Learning through Evolution of Language

    Kazakov, D. & Bartlett, M., 2003, p. 397-408.

    Research output: Contribution to conferencePaper

  203. Software Vaccination: An Artificial Immune System Approach to Mutation Testing

    May, P., Mander, K. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferencePaper

  204. The Interaction Between Inference and Branching Heuristics

    Drake, L. & Frisch, A. M., 2003, p. 370-382.

    Research output: Contribution to conferencePaper

  205. The Use of Sentence Similarity as a Semantic Relevance Metric for Question Answering

    Boni, M. D. & Manandhar, S., 2003, p. 138-144.

    Research output: Contribution to conferencePaper

  206. Transforming Haskell for Tracing

    Chitil, O., Runciman, C. & Wallace, M., 2003, p. 165--181.

    Research output: Contribution to conferencePaper

  207. 2002
  208. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  209. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  210. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  211. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  212. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  213. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  214. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  215. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  216. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  217. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  218. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  219. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  220. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  221. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  222. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  223. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  224. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  225. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  226. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  227. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  228. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  229. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  230. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  231. Global Constraints for Lexicographic Orderings

    Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. & Walsh, T., 2002, p. 93-108.

    Research output: Contribution to conferencePaper

  232. Hazard Analysis for Security Protocol Requirements

    Foster, N. & Jacob, J. L., 2002, p. 75-92.

    Research output: Contribution to conferencePaper

  233. High frequency forecasting with associative memories

    Pasley, A. & Austin, J., 2002, p. 433-438.

    Research output: Contribution to conferencePaper

  234. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  235. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  236. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  237. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  238. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  239. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  240. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  241. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  242. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  243. Software Safety Arguments: Towards a Systematic Categorsation of Evidence

    Weaver, R., McDermid, J. A. & Kelly, T. P., 2002.

    Research output: Contribution to conferencePaper

  244. TeDUB: A System for Presenting and Exploring Technical Drawings for Blind People

    Petrie, H., Schlieder, C., Blenkhorn, P., Evans, D. G., King, A., O'Neill, A-M., Ioannidis, G. T., Gallagher, B., Crombie, D., Mager, R. & Alafaci, M., 2002, p. 537-539.

    Research output: Contribution to conferencePaper

  245. The Design of a Tool-Supported Graphical Notation for Timed CSP

    Brooke, P. J. & Paige, R. F., 2002, p. 299-318.

    Research output: Contribution to conferencePaper

  246. The Semantics of Circus

    Woodcock, J. & Cavalcanti, A., 2002, p. 184-203.

    Research output: Contribution to conferencePaper

  247. The YorkQA Prototype Question Answering System

    Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2002.

    Research output: Contribution to conferencePaper

  248. Towards an Integrated Model Checker for Railway Signalling Data

    Huber, M. & King, S., 2002, p. 204-223.

    Research output: Contribution to conferencePaper

  249. Trends in Systems Safety

    McDermid, J. A. & Lindsay, P. A., 2002, p. 3-8.

    Research output: Contribution to conferencePaper

  250. Unifying Theories of Parallel Programming

    Woodcock, J., Hughes, A. P. & George, C., 2002, p. 24-37.

    Research output: Contribution to conferencePaper

  251. Universal Interfaces to Multimedia Documents

    Petrie, H., Fisher, W., Langer, I., Weber, G., Gladstone, K., Rundle, C. & Pyfers, L., 2002, p. 319-324.

    Research output: Contribution to conferencePaper

  252. User Requirements for Technologies for Personal Communication and Information Use for Deafblind People

    Fisher, W. & Petrie, H., 2002, p. 583-584.

    Research output: Contribution to conferencePaper

  253. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  254. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaper

  255. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaper

  256. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaper

  257. 2001
  258. The Role-based Access Control System of a European Bank: a case study and discussion

    Schaad, A., Moffett, J., Jacob, J. & Jaeger, T., 1 May 2001, p. 3--9.

    Research output: Contribution to conferencePaper

  259. Issues with using Ravenscar and the ada Distributed Systems Annex for high-integrity systems

    Audsley, N. & Wellings, A., 1 Apr 2001, p. 33-39. 7 p.

    Research output: Contribution to conferencePaper

  260. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  261. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  262. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  263. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  264. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  265. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  266. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  267. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  268. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  269. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  270. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  271. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  272. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  273. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  274. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  275. Freja, Hat and Hood: a comparative evaluation of three systems for tracing and debugging lazy functional programs

    Chitil, O., Runciman, C. & Wallace, M., 2001, p. 176--193.

    Research output: Contribution to conferencePaper

  276. Graph Matching using Adjacency Matrix Markov Chains

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  277. High Level Failure Analysis for Integrated Modular Avionics

    Conmy, P., McDermid, J. A. & Lindsay, P. A., 2001, p. 13-22.

    Research output: Contribution to conferencePaper

  278. Machine Learning and Inductive Logic Programming for Multi-agent Systems

    Kazakov, D. & Kudenko, D., 2001, p. 246-272.

    Research output: Contribution to conferencePaper

  279. Mapping Correlation Matrix Memory Applications onto a Beowulf Cluster

    Weeks, M., Austin, J., Moulds, A., Turner, A., Ulanowski, Z. & Young, J., 2001, p. 156-163.

    Research output: Contribution to conferencePaper

  280. Metamodelling and Conformance Checking with PVS

    Paige, R. F. & Ostroff, J. S., 2001, p. 2-16. 14 p.

    Research output: Contribution to conferencePaper

  281. Multiple-View Tracing for Haskell: a New Hat

    Wallace, M., Chitil, O., Brehm, T. & Runciman, C., 2001, p. 151--170.

    Research output: Contribution to conferencePaper

  282. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  283. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  284. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  285. Self-Similar Convolution Image Distribution Histograms as Invariant Identifiers

    Tuke, C. E., O'Keefe, S. E. M. & Austin, J., 2001, p. 501-510. 10 p.

    Research output: Contribution to conferencePaper

  286. Separating Lambertian and Specular Reflectance Components using Iterated Conditional Modes

    Ragheb, H. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  287. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2001.

    Research output: Contribution to conferencePaper

  288. Solving Non-Boolean Satisfiability Problems with Stochastic Local Search

    Frisch, A. M., Peugniez, T. J., Doggett, A. & Nightingale, P., 2001, p. 282-290.

    Research output: Contribution to conferencePaper

  289. The Single Model Principle

    Paige, R. F. & Ostroff, J. S., 2001, p. 292-293.

    Research output: Contribution to conferencePaper

  290. The Steam Boiler in a Unified Theory of Z and CSP

    Woodcock, J. & Cavalcanti, A., 2001, p. 291-298.

    Research output: Contribution to conferencePaper

  291. The generation of speech for a search guide

    Cook, N. J. & Benest, I. D., 2001, p. 1739-1742.

    Research output: Contribution to conferencePaper

  292. Universal quantum gates for single cooper pair box based quantum computing

    Echternach, P., Williams, CP., Dultz, SC., Braunstein, S. & Dowling, JP., 2001, p. 111-120.

    Research output: Contribution to conferencePaper

  293. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaper

  294. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaper

  295. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaper

  296. 2000
  297. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  298. Inter-boundary scheduling of stack operands, a preliminary approach

    Crispin-Bailey, C., Nov 2000, p. 3-11. 9 p.

    Research output: Contribution to conferencePaper

  299. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  300. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  301. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  302. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  303. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  304. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  305. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  306. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  307. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  308. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  309. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  310. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  311. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  312. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  313. Grouping Line-segments using Eigenclustering

    Robles-Kelly, A. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  314. Hierarchical growing cell structures: TreeGCS

    Hodge, V. J. & Austin, J., 2000, p. 553-556.

    Research output: Contribution to conferencePaper

  315. Machine Learning for Logic-Based Multi-agent Systems

    Alonso, E. & Kudenko, D., 2000, p. 306-307.

    Research output: Contribution to conferencePaper

  316. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  317. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  318. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  319. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  320. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  321. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  322. Scoped Coordination in Open Distributed Systems

    Merrick, I. & Wood, A. M., 2000, p. 311-316.

    Research output: Contribution to conferencePaper

  323. Segregation with Communication

    Cooper, D. & Stepney, S., 2000, p. 451-470.

    Research output: Contribution to conferencePaper

  324. Systematic Anticipation and Validation of Scenarios of Failure Propagation and Mitigation in PLC Controlled Processes

    Papadopoulos, Y., Mauri, G. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  325. Testing, Proof and Automation: An Integrated Approach

    Burton, S., Clark, J. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  326. The Haptic Perception of Texture in Virtual Environments: An Investigation with Two Devices

    Penn, P., Petrie, H., Colwell, C., Kornbrot, D., Furner, S. & Hardwick, A., 2000, p. 25-30.

    Research output: Contribution to conferencePaper

  327. The Space Usage Problem: An Evaluation Kit for Graph-Reduction Semantics

    Bakewell, A., Runciman, C. & Gilmore, S., 2000, p. 115--128.

    Research output: Contribution to conferencePaper

  328. Type-Constrained Generics for Z

    Valentine, S. H., Toyn, I., Stepney, S. & King, S., 2000, p. 250-263.

    Research output: Contribution to conferencePaper

  329. Typechecking Z

    Toyn, I., Valentine, S. H., Stepney, S., King, S. & King, S., 2000, p. 264-285.

    Research output: Contribution to conferencePaper

  330. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaper

  331. 1999
  332. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  333. Haskell and XML: Generic Combinators or Type-Based Translation?

    Wallace, M. & Runciman, C., 1 Sep 1999.

    Research output: Contribution to conferencePaper

  334. Learning Electronic Systems Design with a Project Based Course on the Web

    Donzellini, G., Ponta, D., Crispin-Bailey, C., Pears, N. E. & Xu, D., Jun 1999, p. 114-121. 8 p.

    Research output: Contribution to conferencePaper

  335. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  336. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  337. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  338. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  339. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  340. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  341. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  342. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  343. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  344. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  345. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  346. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  347. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  348. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  349. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  350. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  351. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  352. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  353. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  354. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  355. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  356. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  357. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  358. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  359. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  360. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  361. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  362. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y., McDermid, J. A., Felici, M., Kanoun, K. & Pasquini, A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  363. Issues in the Conduct of PSSA

    Dawkins, S. K., Kelly, T. P., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 1999.

    Research output: Contribution to conferencePaper

  364. Learning Word Segmentation Rules for Tag Prediction

    Kazakov, D., Manandhar, S. & Erjavec, T., 1999, p. 152-161.

    Research output: Contribution to conferencePaper

  365. Matching Point-sets using Procrustes Alignment and the EM Algorithm

    Luo, B. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  366. Modelling Complex Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999.

    Research output: Contribution to conferencePaper

  367. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  368. Performance modelling

    Charles, N., Runciman, C., Hammond, K. & Michaelson, G., 1999, p. 233--246.

    Research output: Contribution to conferencePaper

  369. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  370. Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication

    Paige, R. F., 1999, p. 353-372.

    Research output: Contribution to conferencePaper

  371. Systems Development Using Z Generics

    Polack, F. & Stepney, S., 1999, p. 1048-1067.

    Research output: Contribution to conferencePaper

  372. Tailoring Generic Systems Engineering Processes: An Agent-Oriented Method

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999, p. 1011-1020.

    Research output: Contribution to conferencePaper

  373. The Rigorous Generation of Java Mutation Operators using HAZOP

    Kim, S-W., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  374. The Value of Verification: Positive Experience of Industrial Proof

    King, S., Hammond, J., Chapman, R. & Pryor, A., 1999, p. 1527-1545.

    Research output: Contribution to conferencePaper

  375. Two Accounts of Scope Availability and Semantic Underspecification

    Willis, A. & Manandhar, S., 1999.

    Research output: Contribution to conferencePaper

  376. Unsupervised Lexical Learning with Categorical Grammars Using the LLL Corpus

    Watkinson, S. & Manandhar, S., 1999, p. 218-236.

    Research output: Contribution to conferencePaper

  377. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaper

  378. 1998
  379. The bits between the lambdas: binary data in a lazy functional language

    Wallace, M. & Runciman, C., 1 Oct 1998, p. 107--117.

    Research output: Contribution to conferencePaper

  380. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  381. Improved local buffering schemes for ATM-based multimedia servers

    Crispin-Bailey, C., Maierhofer, M. & Sotudeh, R., Sep 1998, p. 302-306. 5 p.

    Research output: Contribution to conferencePaper

  382. Improving Multimedia Server Efficiency in ATM Networks

    Crispin-Bailey, C., Maierhofer, M. & sotudeh, R., Jul 1998.

    Research output: Contribution to conferencePaper

  383. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  384. Generic Operations for Concurrent Knowledge Manipulation Architectures

    Wood, A. M. & Campbell, D. K. G., 1 Feb 1998.

    Research output: Contribution to conferencePaper

  385. Incorporating Input/Output Operations in sc Linda

    Menezes, R. & Wood, A., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  386. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  387. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  388. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  389. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  390. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  391. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  392. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  393. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  394. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  395. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  396. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  397. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  398. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  399. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  400. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  401. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  402. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  403. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  404. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  405. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  406. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  407. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  408. Garbage Collection in Linda using Tuple Monitoring and Process Registration

    Menezes, R. & Wood, A., 1998, p. 490--495.

    Research output: Contribution to conferencePaper

  409. Haptic Virtual Reality for Blind Computer Users

    Colwell, C., Petrie, H., Kornbrot, D., Hardwick, A. & Furner, S., 1998, p. 92-99.

    Research output: Contribution to conferencePaper

  410. Increased Extent of Characteristic Views using Shape-from-Shading for Object Recognition

    Worthington, P. L., Huet, B. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  411. Incremental Development of a High Integrity Compiler: Experience from an Industrial Development

    Stepney, S., 1998, p. 142-149.

    Research output: Contribution to conferencePaper

  412. LIU H, SOTUDEH R, BAILEY C. On improving the Quality of Service for multimedia transmission in ATM networks

    Crispin-Bailey, C., Hong, L. & Sotudeh, R., 1998, p. 412-415. 4 p.

    Research output: Contribution to conferencePaper

  413. Learning Multilingual Morphology with CLOG

    Manandhar, S., Dzeroski, S. & Erjavec, T., 1998, p. 135-144.

    Research output: Contribution to conferencePaper

  414. Modelling Engineering Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A., Astley, K. & Wilkinson, P., 1998.

    Research output: Contribution to conferencePaper

  415. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  416. On Defining a "HURT" Metric to Measure Dissatisfaction with Products

    Prasad, D. K., Atkins, M. C., McDermid, J. A. & Wand, I. C., 1998.

    Research output: Contribution to conferencePaper

  417. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  418. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  419. 1997
  420. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  421. Heap compression and binary I/O in Haskell

    Wallace, M. & Runciman, C., 1 Jun 1997.

    Research output: Contribution to conferencePaper

  422. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  423. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  424. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  425. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  426. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  427. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  428. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  429. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  430. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  431. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  432. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  433. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  434. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  435. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  436. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  437. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  438. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  439. Structurally Gated Pairwise Geometric Histograms for Shape Indexing

    Huet, B. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  440. System Modelling for Concurrent Safety Analysis

    Murdoch, J., McDermid, J. A., Wilkinson, P. & Reid, S., 1997.

    Research output: Contribution to conferencePaper

  441. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  442. The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data

    Austin, J., Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G. & Wilkinson, G., 1997, p. 765-772.

    Research output: Contribution to conferencePaper

  443. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  444. Transferring and Retraining Learned Information Filters

    Cohen, W. W. & Kudenko, D., 1997, p. 583-590.

    Research output: Contribution to conferencePaper

  445. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaper

  446. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaper

  447. 1996
  448. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  449. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  450. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  451. Heap profiling for space efficiency

    Runciman, C., Röjemo, N., Launchbury, J., Meijer, E. & Sheard, T., 1 Aug 1996, p. 159--183.

    Research output: Contribution to conferencePaper

  452. Lag, drag, void and use: heap profiling and space-efficient compilation revisited

    Röjemo, N. & Runciman, C., 1 May 1996, p. 34-41.

    Research output: Contribution to conferencePaper

  453. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  454. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  455. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  456. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  457. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  458. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  459. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  460. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  461. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  462. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  463. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  464. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  465. Technology Transfer by Case Study: an Experience Report

    Whittle, B. R., Vickers, A. J. & McDermid, J. A., 1996, p. 211-218.

    Research output: Contribution to conferencePaper

  466. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  467. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  468. 1995
  469. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  470. Lambdas in the Liftshaft: functional programming and an embedded architecture

    Wallace, M. & Runciman, C., 1 Jun 1995, p. 249--258.

    Research output: Contribution to conferencePaper

  471. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  472. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  473. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  474. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  475. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  476. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  477. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  478. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  479. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  480. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  481. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  482. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  483. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  484. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  485. Implementing Mathematical Morphology in \Isetl-sc \Linda

    Rowstron, A. & Wood, A., 1995, p. 847--851.

    Research output: Contribution to conferencePaper

  486. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  487. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  488. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  489. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  490. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  491. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  492. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  493. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  494. Tactile-based direct manipulation in GUIs for blind users

    Petrie, H., Morley, S. & Weber, G., 1995, p. 428-429.

    Research output: Contribution to conferencePaper

  495. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  496. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  497. The Effect of Intra-Block Scheduling on Stack Processor Behaviour

    Crispin-Bailey, C. & Sotudeh, R., 1995. 6 p.

    Research output: Contribution to conferencePaper

  498. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  499. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  500. 1994
  501. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper