Search research publications and outputs

  1. Paper › Research › Not peer-reviewed
  2. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  3. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  4. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  5. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  6. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  7. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  8. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  9. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  10. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  11. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  12. Growing Music: Musical Interpretations of L-Systems

    Worth, P. & Stepney, S., 2005, p. 545-550.

    Research output: Contribution to conferencePaper

  13. Penrose Life: Ash and Oscillators

    Hill, M., Stepney, S. & Wan, F., 2005, p. 471-480.

    Research output: Contribution to conferencePaper

  14. Rule Migration: Exploring a design framework for modelling emergence in CA-like systems

    Turner, H. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  15. Towards Using Simulation to Evaluate Safety Policy for Systems of Systems

    Alexander, R., Hall-May, M., Despotou, G. & Kelly, T., 2005.

    Research output: Contribution to conferencePaper

  16. Paper › Research › Peer-reviewed
  17. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  18. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  19. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  20. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  21. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  22. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  23. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  24. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  25. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  26. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  27. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  28. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  29. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  30. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  31. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  32. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  33. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  34. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  35. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  36. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  37. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  38. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  39. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  40. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  41. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  42. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  43. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  44. Goal-Based Safety Standards: Opportunities and Challenges

    Kelly, T. P., McDermid, J. A. & Weaver, R. A., 2005.

    Research output: Contribution to conferencePaper

  45. Hardware implementation of similarity functions

    Freeman, M., Weeks, M. & Austin, J., 2005, p. 329-332.

    Research output: Contribution to conferencePaper

  46. High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A. & Stephenson, Z. R., 1 Dec 2005, p. 1518-1523. 6 p.

    Research output: Contribution to conferencePaper

  47. Image Segmentation using Commute Times

    Qiu, H., Hancock, E. R., Clocksin, W. F., Fitzgibbon, A. W. & Torr, P. H. S., 2005.

    Research output: Contribution to conferencePaper

  48. Improving the Performance of Embedded Superscalatr Microprocessors by Adding Partial Pipeline

    Crispin-Bailey, C., Shi, H., Hastie, N. & Farrel, G., 31 Aug 2005, p. 15-20. 6 p.

    Research output: Contribution to conferencePaper

  49. Instruction level parallelism of stack-code under varied issue widths, and one-level branch prediction

    Bailey, C. & Shi, H., 2005, p. 23-30.

    Research output: Contribution to conferencePaper

  50. Learning to Coordinate Using Commitment Sequences in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2005, p. 106-118.

    Research output: Contribution to conferencePaper

  51. Literate Proving: Presenting and Documenting Formal Proofs

    Cairns, P. A. & Gow, J., 2005, p. 159-173.

    Research output: Contribution to conferencePaper

  52. Mobile Phone Preferences and Values: the U.K. vs. Korea

    Cha, H., Oshlyansky, L. & Cairns, P. A., 2005, p. 29-41.

    Research output: Contribution to conferencePaper

  53. Modeling of Dual-Route Fear Conditioning Paradigm in the Auditory Cortex

    Sengupta, B., Austin, J. & Green, G., 2005, p. 3632-3644.

    Research output: Contribution to conferencePaper

  54. Modelling Incremental Learning With The Batch SOM Training Method

    Baez-Monroy, V. O. & O'Keefe, S., 2005, p. 542-544.

    Research output: Contribution to conferencePaper

  55. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  56. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  57. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  58. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  59. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  60. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  61. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  62. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  63. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  64. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  65. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  66. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  67. Tagged sets: A secure and transparent coordination medium

    Oriol, M. & Hicks, M., 2005, p. 252--267.

    Research output: Contribution to conferencePaper

  68. The PISA architecture, a Viable platform for the Superscalar Execution of Statically Scheduled Stack Code

    Crispin-Bailey, C. & Alli, S., 31 Aug 2005, p. 23-26. 4 p.

    Research output: Contribution to conferencePaper

  69. The Temporal Knapsack Problem and Its Solution

    Bartlett, M., Frisch, A. M., Hamadi, Y., Miguel, I., Tarim, A. & Unsworth, C., 2005, p. 34-48.

    Research output: Contribution to conferencePaper

  70. Towards the Systematic Generation of Channelling Constraints

    Hernández, B. M. & Frisch, A. M., 2005, p. 859.

    Research output: Contribution to conferencePaper

  71. Transforming and Refining Abstract Constraint Specifications

    Frisch, A. M., Hnich, B., Miguel, I., Smith, B. M. & Walsh, T., 2005, p. 76-91.

    Research output: Contribution to conferencePaper

  72. UBB Mining: Finding Unexpected Browsing Behaviour in Clickstream Data to Improve a Web Site's Design

    Ting, I-H., Kimble, C. & Kudenko, D., 2005, p. 179-185.

    Research output: Contribution to conferencePaper

  73. Unified Modeling Language for Knowledge Modelling

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2005, p. 952-957.

    Research output: Contribution to conferencePaper

  74. Unifying Program Refinement Calculi

    Woodcock, J., 2005, p. 76.

    Research output: Contribution to conferencePaper

  75. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaper

  76. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  77. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaper

  78. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaper

  79. Other › Research › Not peer-reviewed
  80. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  81. A Markov Chain Model of the B-cell Algorithm

    Clarke, E., Hone, A. N. W. & Timmis, J., 2005, p. 318-330.

    Research output: Contribution to conferenceOther

  82. A compact fiducial for affine augmented reality

    Parnham, D. J., Robinson, J. A. & Zhao, Y., 1 Apr 2005, p. 347-352.

    Research output: Contribution to conferenceOther

  83. Application Areas of AIS: Past, Present and Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferenceOther

  84. Challenges for Artificial Immune Systems

    Timmis, J., 2005, p. 355-367.

    Research output: Contribution to conferenceOther

  85. Immunising Automated Teller Machines

    Ayara, M., Timmis, J., Lemos, R. D. & Forrest, S., 2005, p. 404-417.

    Research output: Contribution to conferenceOther

  86. Inspiration for the Next Generation of Artificial Immune Systems

    Andrews, P. & Timmis, J., 2005, p. 126-138.

    Research output: Contribution to conferenceOther

  87. Is Negative Selection Appropriate for Anomaly Detection?

    Stibor, T., Mohr, P., Timmis, J. & Eckert, C., 2005, p. 321-328.

    Research output: Contribution to conferenceOther