Search research publications and outputs

  1. 2015
  2. Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects

    Kolovos, D. S., Matragkas, N. D., Korkontzelos, I., Ananiadou, S. & Paige, R. F., 2015, Proceedings of the International Workshop on Open Source Software for Model Driven Engineering co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS 2015) : Ottawa, Canada, September 29, 2015. CEUR-WS.org, p. 20-29 10 p. (CEUR Workshop Proceedings; vol. 1541).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automatically Detecting Fallacies in System Safety Arguments

    Kelly, T., Wells, S., Yuan, T. & Manandhar, S., 2015, Proceedings of the 15th International Workshop on Computation Models of Natural Argument. p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  4. Behavioral Program Synthesis: Insights and Prospects

    Krawiec, K., Swan, J. & O'Reilly, U-M., 2015, Genetic Programming Theory and Practice XIII : GPTP 2015, University of Michigan, Ann Arbor. Riolo, R., Worzel, B., Kotanchek, M. & Kordon, A. (eds.). Springer, p. 191-209 19 p. (Genetic and Evolutionary Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. CSP and Kripke Structures

    Cavalcanti, A. L. C., Huang, W-L., Peleska, J. & Woodcock, J. C. P., 2015, Theoretical Aspects of Computing - ICTAC 2015. Leucker, M., Rueda, C. & Valencia, F. D. (eds.). SPRINGER, p. 505-523 19 p. (Lecture Notes in Computer Science; vol. 9399).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Combined Security and Safety Risk Analysis: What needs to be done for ICS and the IoT

    McDermid, J. A., StJohn-Green, M., Piggin, R. & Oates, R., 2015, 10th IET System Safety and Cyber Security Conference . IET, p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Comparing Concurrent and Retrospective Verbal Protocols for Blind and Sighted Users

    Savva, A., Petrie, H. & Power, C. D., 2015, Human-Computer Interaction. p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Conservation of matter increases evolutionary activity

    Hickinbotham, S. J. & Stepney, S., 2015, European Conference on Artificial Life 2015. MIT Press, p. 98-105

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  9. Coupled-Feature Hypergraph Representation for Feature Selection

    Zhang, Z., Xiahou, J., Bai, L. & Hancock, E. R., 2015, Graph-Based Representations in Pattern Recognition :10th IAPR-TC-15 International Workshop, GbRPR 2015, Beijing, China, May 13-15, 2015. Proceedings. Liu, C-L., Luo, B., Kropatsch, W. G. & Cheng, J. (eds.). SPRINGER, p. 44-53 10 p. (Lecture Notes in Computer Science; vol. 9069).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  11. Deja Fu: a concurrency testing library for Haskell

    Walker, M. S. & Runciman, C., 2015, Proceedings of 8th International Symposium on Haskell. ASSOC COMPUTING MACHINERY, p. 141-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Disruption to UK Air Traffic Management on 12th December 2014: Analysis and Lessons Learnt

    McDermid, J. A. & Whysall, P., 2015, 10th IET System Safety and Cyber Security Conference 2015. IET, p. 108-113 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Efficient and Secure Delegation of Group Exponentiation to a Single Server

    Kahrobaei, D., Di Crescenzo, G., Shpilrain, V. & Cavallo, B., 2015, Efficient and Secure Delegation of Group Exponentiation to a Single Server. Springer, p. 156-173 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Embedded Dynamic Improvement

    Burles, N. J., Swan, J., Bowles, E., Brownlee, A. E. I., Kocsis, Z. A. & Veerapen, N., 2015, GECCO Companion '15: Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference. New York: ACM, p. 831-832

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  15. Emergent bluffing and inference with Monte Carlo Tree Search

    Cowling, P. I., Whitehouse, D. & Powley, E. J., 2015, 2015 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, p. 114-121 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Environmental bias forces parasitism in Tierra

    Hickinbotham, S. J. & Stepney, S., 2015, European Conference on Artificial Life 2015. MIT Press, p. 294-301

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  17. Evaluating Mixed Criticality Scheduling Algorithms with Realistic Workloads

    Griffin, D., Bate, I., Lesage, B. & Soboczenski, F., 2015, Proc. 3rd Workshop on Mixed Criticality (WMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Evaluating Student Work in Modelling Courses

    Paige, R. F., Kolovos, D. S., Polack, F. A. C. & Rose, L. M., 2015, EduSymp 2015 MODELS Educators Symposium 2015: Proceedings of the MODELS Educators Symposium 2015 co-located with the ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS 2015). Sturm, A. & Clark, T. (eds.). CEUR-WS.org, p. 68-76 9 p. (CEUR Workshop Proceedings; vol. 1555).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Exact estimation of multiple directed acyclic graphs

    Oates, C. J., Smith, J. Q., Mukherjee, S. & Cussens, J., 2015

    Article in Statistics and computing

  20. Example-Based Modeling of Facial Texture from Deficient Data

    Dessein, A. F., Smith, W. A. P., Wilson, R. C. & Hancock, E. R., 2015, (Accepted/In press) Proceedings ICCV 2015. IEEE Computer Society, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Expressing Arbitrary Reward Functions as Potential-Based Advice

    Harutyunyan, A., Devlin, S., Vrancx, P. & Nowé, A., 2015, Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15). Palo Alto, California: AAAI Press, p. 2652-2658 7 p. (Proceedings of the AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence.; vol. 29).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Extending Optimistic Transmission Protocol for Other Movement Patterns

    Lim, T. H. & Bate, I., 2015, 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. FPGA-based acceleration for Real-Time Big Data Systems

    Gray, I., Audsley, N. C., Garside, J., Chan, Y. & Wellings, A. J., 2015, 9th HiPEAC workshop on Reconfigurable Computing.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution