Search research publications and outputs

  1. 2014
  2. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  3. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  4. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  5. Game Intelligence: Proceedings of the IEEE Conference on Computational Intelligence in Games (CIG)

    Devlin, S., Cowling, P. I., Kudenko, D., Goumagias, N., Nucciarelli, A., Cabras, I., Fernandes, K. J. & Li, F., 2014.

    Research output: Contribution to conferencePaper

  6. Reflective Grammatical Evolution

    Timperley, C. & Stepney, S., 2014, p. 71–78.

    Research output: Contribution to conferencePaper

  7. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  8. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaper

  9. 2013
  10. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  11. The effect of global instructions on think-aloud testing

    McDonald, S. & Petrie, H., 27 Apr 2013, p. 2941 - 2944. 4 p.

    Research output: Contribution to conferencePaper

  12. Searching for Risk in Large Complex Spaces

    Clegg, K. D. & Alexander, R., Apr 2013, p. 753-762 .

    Research output: Contribution to conferencePaper

  13. The Artificial Epigenetic Network

    Turner, A. P., Lones, M. A., Fuente, L. A., Stepney, S., Caves, L. & Tyrrell, A., Apr 2013, p. 66-72.

    Research output: Contribution to conferencePaper

  14. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaper

  15. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  16. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  17. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  18. Theoretical Aspects of Computing - ICTAC 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-455. 455 p.

    Research output: Contribution to conferencePaper

  19. Theories of Programming and Formal Methods - Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-422. 422 p.

    Research output: Contribution to conferencePaper

  20. 2012
  21. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  22. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  23. Minimal distortion 3-D watermarking using statistics of geodesic distances

    Luo, M. & Bors, A. G., Aug 2012, p. 1683-1687.

    Research output: Contribution to conferencePaper

  24. MESSI: Mutant Evaluation by Static Semantic Interpretation

    Patrick, M. T., Oriol, M. Y. A. & Clark, J. A., 17 Apr 2012, (Accepted/In press).

    Research output: Contribution to conferencePaper

  25. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  26. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  27. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  28. Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, SSPRSPR 2012, Hiroshima, Japan, November 7-9, 2012. Proceedings

    Gimel'farb, G. L., Hancock, E. R., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T. & Yamada, K., 2012.

    Research output: Contribution to conferencePaper

  29. 2011
  30. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  31. The Protein Processor Associative Memory on a Robotic Hand-Eye Coordination Task

    Qadir, O., Timmis, J., Tempesti, G. & Tyrrell, A., Dec 2011. 6 p.

    Research output: Contribution to conferencePaper

  32. Resource sharing in RTSJ and SCJ systems

    Wellings, A., Lin, S. & Burns, A., Oct 2011.

    Research output: Contribution to conferencePaper

  33. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

  34. Zero-error subspaces of quantum channels

    Patra, M. K. & Braunstein, S., 5 Aug 2011, p. 104-108.

    Research output: Contribution to conferencePaper

  35. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  36. Splitting Rate Modelling for Intelligent Transport Systems

    Smith, M., Mounce, R., Hollier, G. P., Hodge, V. J. & Austin, J., 22 Jun 2011.

    Research output: Contribution to conferencePaper

  37. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  38. Hardware architecture for a Bidirectional Hetero-Associative Protein Processing Associative Memory

    Qadir, O., Liu, J., Tempesti, G., Timmis, J. & Tyrrell, A., Jun 2011, p. 208-215. 8 p.

    Research output: Contribution to conferencePaper

  39. Parameter Optimisation in the Receptor Density Algorithm

    Hilder, J. A., Owens, N. D. L., Timmis, J., Hickey, P., Kilgour, S. & Tyrrell, A., Jun 2011, p. 226-239. 13 p.

    Research output: Contribution to conferencePaper

  40. Multi-Agent Potential-based Reward Shaping for RoboCup KeepAway

    Devlin, S., Grzes, M. & Kudenko, D., May 2011.

    Research output: Contribution to conferencePaper

  41. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaper

  42. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  43. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  44. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  45. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  46. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  47. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  48. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  49. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  50. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  51. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  52. Reflecting on Open-Ended Evolution

    Stepney, S. & Hoverd, T., 2011.

    Research output: Contribution to conferencePaper

  53. Specifying Confidentiality in Circus

    Banks, M. J. & Jacob, J. L., 2011, p. 215-230.

    Research output: Contribution to conferencePaper

  54. User-defined clocks in the real-time specification for Java

    Wellings, A. & Martin Schoeberl, M., 2011.

    Research output: Contribution to conferencePaper

  55. 2010
  56. Model-based design flow for NoC-based MPSoCs

    Ost, L., Indrusiak, L. S., Maatta, S., Mandelli, M., Nurmi, J. & Moraes, F., 1 Dec 2010, p. 750 -753.

    Research output: Contribution to conferencePaper

  57. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  58. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaper

  59. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  60. The State of Practice in System Safety Research Evaluation

    Rae, A., Alexander, R. & Nicholson, M., Oct 2010.

    Research output: Contribution to conferencePaper

  61. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  62. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  63. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  64. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  65. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  66. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  67. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  68. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  69. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  70. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  71. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  72. Sonification Strategies for Examination of Biological Cells

    Edwards, A., Hunt, A., Hines, G., Jackson, V., Podvoiskis, A., Roseblade, R. & Stammers, J., 1 Jun 2010.

    Research output: Contribution to conferencePaper

  73. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  74. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  75. The Phish in the Pond: scam emails as literature

    Clark, J. A. & Blythe, M., 10 Apr 2010.

    Research output: Contribution to conferencePaper

  76. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  77. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  78. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaper

  79. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  80. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  81. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  82. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  83. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  84. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  85. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  86. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  87. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  88. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  89. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  90. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  91. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  92. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  93. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  94. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...12 Next