Search research publications and outputs

  1. Other › Research › Peer-reviewed
  2. 1st International workshop on assurance cases for software-intensive systems (ASSURE 2013): Software Engineering (ICSE), 2013 35th International Conference on

    Denney, E., Pai, G., Habli, I., Kelly, T. & Knight, J., 2013, p. 1505-1506. 2 p.

    Research output: Contribution to conferenceOtherpeer-review

  3. A Model-Based Approach to Support the Automatic Safety Analysis of Multiple Product Line Products: Computing Systems Engineering (SBESC), 2014 Brazilian Symposium on

    de Oliveira, A. L., Braga, R. T. V., Masiero, P. C., Papadopoulos, Y., Habli, I. & Kelly, T., 2014, p. 7-12. 6 p.

    Research output: Contribution to conferenceOtherpeer-review

  4. An evidential reasoning approach for assessing confidence in safety evidence: Software Reliability Engineering (ISSRE), 2015 IEEE 26th International Symposium on

    Nair, S., Walkinshaw, N., Kelly, T. & de la Vara, J. L., 2015, p. 541-552. 12 p.

    Research output: Contribution to conferenceOtherpeer-review

  5. Can Secure Systems be Built Using Today's Development Processes?

    Woody, C., Hall, A. & Clark, J. A., 2004.

    Research output: Contribution to conferenceOtherpeer-review

  6. Computation with Neural Systems - Papers from the 1999 AAAI Workshop: Technical Report WS-99-04

    Hodge, V. J. & Austin, J., 18 Jul 1999. 63 p.

    Research output: Contribution to conferenceOtherpeer-review

  7. Goal-Based Safety Standards and COTS Software

    Menon, C., McDermid, J. A. & Hubbard, P., 2009.

    Research output: Contribution to conferenceOtherpeer-review

  8. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferenceOtherpeer-review

  9. On validation of the safety analysis of modern railway systems: Service Operations, Logistics, and Informatics (SOLI), 2011 IEEE International Conference on

    Lisagor, O., Sun, L., Kelly, T., Liu, C. & Niu, R., 2011, p. 537-542. 6 p.

    Research output: Contribution to conferenceOtherpeer-review

  10. PLAZZMID: an evolutionary agent-based architecture inspired by bacteria and bees

    Stepney, S., Clarke, T. & Young, P., 1 Sep 2007, p. 1151-60.

    Research output: Contribution to conferenceOtherpeer-review

  11. SHREC’15 Track: Non-rigid 3D Shape Retrieval

    Limberger, F. A. & Wilson, R. C., 2015.

    Research output: Contribution to conferenceOtherpeer-review

  12. Other › Research › Not peer-reviewed
  13. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  14. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  15. A Computational Model of Degeneracy in a Lymph Node

    Andrews, P. & Timmis, J., 2006, p. 164-177.

    Research output: Contribution to conferenceOther

  16. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  17. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  18. A Markov Chain Model of the B-cell Algorithm

    Clarke, E., Hone, A. N. W. & Timmis, J., 2005, p. 318-330.

    Research output: Contribution to conferenceOther

  19. A Multi-Layered Immune Inspired Approach to Data Mining

    Knight, T. & Timmis, J., 2002, p. 266-271.

    Research output: Contribution to conferenceOther

  20. A Resource Limited Artificial Immune System for Data Analysis

    Timmis, J. & Neal., M. J., 2000, p. 19-32.

    Research output: Contribution to conferenceOther

  21. A compact fiducial for affine augmented reality

    Parnham, D. J., Robinson, J. A. & Zhao, Y., 1 Apr 2005, p. 347-352.

    Research output: Contribution to conferenceOther

  22. AISEC: An Artificial Immune System for E-mail Classification

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  23. Aine: an immunological approach to data mining

    Knight, T. & Timmis, J., 2001, p. 297-304.

    Research output: Contribution to conferenceOther

  24. An artificial immune network for multimodal optimisation

    Castro, L. N. D. & Timmis, J., 2002, p. 699-704.

    Research output: Contribution to conferenceOther

  25. Application Areas of AIS: Past, Present and Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferenceOther

  26. Artificial Immune Recognition System (AIRS): Revisions and Refinements

    Watkins, A. & Timmis, J., 2002, p. 173-181.

    Research output: Contribution to conferenceOther

  27. Assessing the Performance of Two Immune Inspired Algorithms and a Hybrid Genetic Algorithm for Function Optimisation

    Timmis, J., Edmonds, C. & Kelsey, J., 2004, p. 1044-1051.

    Research output: Contribution to conferenceOther

  28. Augmenting an artificial immune network

    Neal, M., Hunt, J. & Timmis, J., 1998, p. 3821-3826.

    Research output: Contribution to conferenceOther

  29. Challenges for Artificial Immune Systems

    Timmis, J., 2005, p. 355-367.

    Research output: Contribution to conferenceOther

  30. Chasing Chaos.

    Kelsy, J., Timmis, J. & Hone, A., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  31. Data analysis with artificial immune systems and cluster analysis and kohonen networks: some comparisons

    Timmis, J., Neal, M. & Hunt, J., 2000, p. 922-927.

    Research output: Contribution to conferenceOther

  32. Evolutionary search applied to reconfigurable analogue control

    Clegg, K., Stepney, S. & Clarke, T., 1 Aug 2007, p. 593-6.

    Research output: Contribution to conferenceOther

  33. Evolvable Hardware: a Fundamental Technology for Homeostasis

    Tyrrell, A. M., Timmis, J., Greensted, A. J. & Owens, N., 1 Apr 2007, p. 40-45.

    Research output: Contribution to conferenceOther

  34. Exploiting Immunological Properties for Ubiqitous Computing Systems

    Mohr, P., Ryan, N. & Timmis, J., 2004, p. 277-289.

    Research output: Contribution to conferenceOther

  35. Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier

    Watkins, A. & Timmis, J., 2004, p. 427-438.

    Research output: Contribution to conferenceOther

  36. Generalization Regions in Hamming Negative Selection

    Stibor, T., Timmis, J. & Eckert, C., 2006, p. 447-456.

    Research output: Contribution to conferenceOther

  37. Generating fault trees from fmea

    Wilson, M. S., Timmis, J., Price, C. J. & Cain, C., 1996.

    Research output: Contribution to conferenceOther

  38. Hierarchy and convergance of immune networks: basic ideas and premilinary results

    Castro, L. N. D. & Timmis, J., 2002, p. 231-240.

    Research output: Contribution to conferenceOther

  39. Immunising Automated Teller Machines

    Ayara, M., Timmis, J., Lemos, R. D. & Forrest, S., 2005, p. 404-417.

    Research output: Contribution to conferenceOther

  40. Inspiration for the Next Generation of Artificial Immune Systems

    Andrews, P. & Timmis, J., 2005, p. 126-138.

    Research output: Contribution to conferenceOther

  41. Investigating the evolution and stability of a resource limited artificial immune system

    Timmis, J. & Neal, M., 2000, p. 40-41.

    Research output: Contribution to conferenceOther

  42. Is Negative Selection Appropriate for Anomaly Detection?

    Stibor, T., Mohr, P., Timmis, J. & Eckert, C., 2005, p. 321-328.

    Research output: Contribution to conferenceOther

  43. Mutation Testing: An Artificial Immune System Approach

    Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferenceOther

  44. Negative selection: How to generate detectors

    Ayara, M., Timmis, J., Lemos, L. N. D., Castro, R. D. & Duncan, R., 2002, p. 89-98.

    Research output: Contribution to conferenceOther

  45. On Diversity and Artificial Immune Systems: Incorporating a Diversity Operator into aiNET.

    Andrews, P. & Timmis, J., 2006, p. 293-306.

    Research output: Contribution to conferenceOther

  46. On Immune Inspired Homeostasis for Electronic Systems

    Owens, N., Timmis, J., Greensted, A. & Tyrrell, A., 1 Aug 2007, p. 216-227.

    Research output: Contribution to conferenceOther

  47. On Permutation Masks in Hamming Negative Selection

    Stibor, T., Timmis, J. & Eckert, C., 2006, p. 122-135.

    Research output: Contribution to conferenceOther

  48. On the Investigation of Artificial Immune Systems on Imbalanced Data Classification for Power Distrubution System Fault Cause Identification

    Xu, L., Chow, M-Y., Timmis, J., Taylor, L. & Watkins, A., 1 Jul 2006, p. 1629-1634.

    Research output: Contribution to conferenceOther

  49. On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions

    Stibor, T., Timmis, J. & Eckert, C., 2006, p. 215-228.

    Research output: Contribution to conferenceOther

  50. Recognising regular human activity through a learning context memory

    Mohr, P., Ryan, N. & Timmis, J., 2006.

    Research output: Contribution to conferenceOther

  51. Requirements Analysis: Orthodoxy, Fundamentalism and Heresy

    McDermid, J. A., Bickerton, M. & Jarotcka, M., 1994.

    Research output: Contribution to conferenceOther

  52. Revisiting the Foundations of Artificial Immune Systems: A Problem Oriented Perspective

    Freitas, A. & Timmis, J., 2003, p. 229-241.

    Research output: Contribution to conferenceOther

  53. Special track on Coordination Models, Languages and Architectures: editorial message

    Schumacher, M. I. & Wood, A., 2008, p. 80-81.

    Research output: Contribution to conferenceOther

  54. Specification of Real-Time Systems — A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferenceOther

  55. The Immune System in Pieces: Computational Lessons from Degeneracy in the Immune System

    Mendoa, M., Timmis, J., Andrews, P. & Davies, M., 2007, p. 394-400.

    Research output: Contribution to conferenceOther

  56. The Link between r-contiguous Detectors and k-CNF Satisfiability

    Stibor, T., Timmis, J. & Eckert, C., 2006.

    Research output: Contribution to conferenceOther

  57. The NOMAD Project

    Crispin-Bailey, C., Mar 2014.

    Research output: Contribution to conferenceOther

  58. Towards a Conceptual Framework for Artificial Immune Systems

    Stepney, S., Smith, R., Timmis, J. & Tyrrell, A., 2004, p. 53-64.

    Research output: Contribution to conferenceOther

  59. Towards immune inspired fault tolerance in embedded systems

    Timmis, J., Lemos, R. D., Ayara, M. & Duncan, R., 2002, p. 1459-1463.

    Research output: Contribution to conferenceOther

  60. aivis - artificial immune network visualisation

    Timmis, J., 2001, p. 61-69.

    Research output: Contribution to conferenceOther

  61. Abstract › Research › Peer-reviewed
  62. A Morphable Profile Model of the Human Head as an Outcome Tool for Craniosynostosis Surgery

    Duncan, C., Armstrong, R. & Pears, N. E., 14 Sep 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  63. An Operational Semantics in UTP for a Language of Reactive Designs

    Woodcock, J., 2006, p. 84-84.

    Research output: Contribution to conferenceAbstractpeer-review

  64. CoSMoS: Complex Systems Modelling and Simulation Infrastructure (extended abstract)

    Stepney, S. & Welch, P. H., 2009.

    Research output: Contribution to conferenceAbstractpeer-review

  65. Instruction Complexity in implicit-execution architectures: orthogonality, optimisation, and VLSI design

    Crispin-Bailey, C. & Sotudeh, R., 1997.

    Research output: Contribution to conferenceAbstractpeer-review

  66. Quantitative Assessment of Machine-Stack behaviour for better Computer Performance

    Crispin-Bailey, C. & Sotudeh, R., 1993, p. 1. 11 p.

    Research output: Contribution to conferenceAbstractpeer-review

  67. The CoSMoS Process: Simulations for Scientific Exploration (extended abstract)

    Andrews, P. S., Stepney, S., Timmis, J. & Polack, F., 2009.

    Research output: Contribution to conferenceAbstractpeer-review

  68. Trade-offs For Memory Bandwidth Reduction in Stack Processor Design

    Crispin-Bailey, C. & sotudeh, R., 5 Jul 1995.

    Research output: Contribution to conferenceAbstractpeer-review

  69. Poster › Research › Not peer-reviewed
  70. Paper › Research › Peer-reviewed
  71. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaperpeer-review

  72. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaperpeer-review

  73. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaperpeer-review

  74. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  75. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaperpeer-review

  76. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaperpeer-review

  77. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaperpeer-review

  78. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaperpeer-review

  79. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaperpeer-review

  80. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaperpeer-review

  81. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaperpeer-review

  82. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaperpeer-review

  83. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaperpeer-review

  84. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaperpeer-review

  85. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaperpeer-review

  86. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaperpeer-review

  87. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaperpeer-review

  88. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaperpeer-review

  89. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaperpeer-review

  90. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  91. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  92. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaperpeer-review

  93. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaperpeer-review

  94. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaperpeer-review

  95. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaperpeer-review

  96. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaperpeer-review

  97. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaperpeer-review

  98. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaperpeer-review

  99. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaperpeer-review

  100. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaperpeer-review

  101. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaperpeer-review

Previous 1 2 3 4 5 6 7 8 ...12 Next