Search research publications and outputs

  1. Conference contribution › Research
  2. "Devices are people too" - Using process patterns to elicit security requirements in novel domains: A ubiquitous healthcare example

    Liu, Y., Clark, J. A. & Stepney, S., 2005, SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS. Hutter, D. & Ullmann, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 31-45 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. (True) polymorphism in SPARK2000

    Lin, T. M. & McDermid, J. A., 2000, RELIABLE SOFTWARE TECHNOLOGIES ADA-EUROPE 2000. Keller, HB. & Plodereder, E. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 252-265 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 09381 Extended Abstracts Collection - Refinement Based Methods for the Construction of Dependable Systems

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009, Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009. Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, Vol. 09381. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 3-D terrain from synthetic aperture radar images

    Bors, A. G., Hancock, E. R. & Wilson, R. C., 2000, IEEE WORKSHOP ON COMPUTER VISION BEYOND THE VISIBLE SPECTRUM: METHODS AND APPLICATIONS, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 3D Facial Landmark Localisation by Matching Simple Descriptors

    Romero-Huertas, M. & Pears, N., 2008, 2008 IEEE SECOND INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS). NEW YORK: IEEE, p. 346-351 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 3D Landmark Model Discovery from a Registered Set of Organic Shapes

    Creusot, C., Pears, N. & Austin, J., 16 Jun 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) . p. 57-64 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 3D Morphable Face Models Revisited

    Patel, A. & Smith, W. A. P., 2009, CVPR: 2009 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-4. NEW YORK: IEEE, p. 1327-1334 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 3D Object Recognition Using Hyper-Graphs and Ranked Local Invariant Features

    Xia, S. & Hancock, E. R., 2008, STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION. DaVitoria Lobo, N., Kasparis, T., Roli, F., Kwok, JT., Georgiopoulos, M., Anagnostopoulos, GC. & Loog, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, Vol. 5342 LNCS. p. 117-126 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. A BAYESIAN INTERPRETATION FOR THE HOPFIELD NETWORK

    HANCOCK, E. R. & KITTLER, J., 1993, 1993 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-3. NEW YORK: I E E E, COMPUTER SOC PRESS, p. 341-346 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. A Bayesian Analysis of Algorithms for Learning Finite Functions

    Cussens, J., 1995, Machine Learning: Proceedings of the Twelfth International Conference (ML95). Prieditis, A. & Russell, S. (eds.). San Francisco, CA: Morgan Kaufmann Publishers, p. 142-149 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. A Bayesian approach to 3D surface fitting and refinement.

    Turner, M. & Hancock, E. R., 1995, PROCEEDINGS OF THE 6TH BRITISH MACHINE VISION CONFERENCE 1995, VOLS 1 AND 2. Pycock, D. (ed.). GUILDFORD: B M V A PRESS, p. 67-76 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. A Circus semantics for Ravenscar protected objects

    Atiya, D. A., King, S. & Woodcock, J. C. P., 2003, FME 2003: FORMAL METHODS, PROCEEDINGS. Araki, K., Gnesi, S. & Mandrioli, D. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 617-635 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. A Comparison of Model Migration Tools

    Rose, L., Herrmannsdoerfer, M., Williams, J., Kolovos, D., Garces, K., Paige, R., Polack, F., Petriu, D. (ed.), Rouquette, N. (ed.) & Haugen, Ã. (ed.), 2010, Model Driven Engineering Languages and Systems. PART 1 ed. Springer Berlin / Heidelberg, Vol. 6394. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. A Contract-based Approach to Designing Safe Systems

    Bate, I., Hawkins, R., McDermid, J., Lindsay, P. A. & Cant, A., 2003, Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software. p. 25-36 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. A Control Theoretic Approach for Workflow Management

    Ghazzawi, H. A., Bate, I. & Indrusiak, L. S., 1 Jul 2012, In Proceedings of 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems. p. 280-289 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. A DETAILED INVESTIGATION INTO THE EFFECTIVENESS OF EARCONS

    Brewster, S. A., Wright, P. C. & Edwards, A. D. N., 1994, AUDITORY DISPLAY. Kramer, G. (ed.). READING: ADDISON-WESLEY PUBL CO, p. 471-498 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE-DESIGN

    McDermid, J. A. & Pumfrey, D. J., 1994, COMPASS '94 - PROCEEDINGS OF THE NINTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE. NEW YORK: I E E E, p. 17-25 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. A Deployment Value Model for Intrusion Detection Sensors

    Shaikh, S. A., Chivers, H., Nobles, P., Clark, J. A. & Chen, H., 2009, Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 200. Vol. 5576 LNCS. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: ADDRESSING DIVERSITY, PT I, PROCEEDINGS. Stephanidis, C. (ed.). PART 1 ed. BERLIN: SPRINGER-VERLAG BERLIN, Vol. 5614 LNCS. p. 594-601 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. A Framework for Scheduling in Safety-Critical Embedded Control Systems

    Bate, I. & Burns, A., 1999, 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 13-16 December 1999, Hong Kong, China. IEEE Computer Society, p. 46-53 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. A Functional-Logic Library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, HASKELL'07: PROCEEDINGS OF THE ACM SIGPLAN 2007 HASKELL WORKSHOP. NEW YORK: ASSOC COMPUTING MACHINERY, p. 37-48 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. A Graph-Based Approach to Feature Selection

    Zhang, Z. & Hancock, E. R., 2011, GRAPH-BASED REPRESENTATIONS IN PATTERN RECOGNITION. Jiang, X., Ferrer, M. & Torsello, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 205-214 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. A HIERARCHICAL EVIDENCE COMBINING EDGE DETECTOR

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, PROGRESS IN IMAGE ANALYSIS AND PROCESSING II. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 494-501 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. A Hoare Calculus for Graph Programs

    Poskitt, C. M. & Plump, D., 2010, Proceedings 5th International Conference on Graph Transformation (ICGT 2010). Ehrig, H., Rensink, A., Rozenberg, G. & Schürr, A. (eds.). Springer, Vol. 6372 . p. 139-154 (Lecture Notes in Computer Science; vol. 6372).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. A Hypergraph-Based Approach to Feature Selection

    Zhang, Z. & Hancock, E. R., 2011, Computer Analysis of Images and Patterns - 14th International Conference, CAIP 2011, Seville, Spain, August 29-31, 2011, Proceedings, Part I. Real, P., Díaz-Pernil, D., Molina-Abril, H., Berciano, A. & Kropatsch, W. G. (eds.). PART 1 ed. BERLIN: Springer, Vol. 6854. p. 228-235 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...54 Next