Search research publications and outputs

  1. 2018
  2. Perceptually Validated Cross-Renderer Analytical BRDF Parameter Remapping

    Guarnera, D., Guarnera, G. C., Toscani, M., Glencross, M., Li, B., Hardeberg, J. Y. & Gegenfurtner, K., 14 Dec 2018

    Article in IEEE Transactions on Visualization and Computer Graphics

  3. Wing Loss for Robust Facial Landmark Localisation with Convolutional Neural Networks

    Feng, Z., Kittler, J., Awais, M., Huber, P. & Wu, X-J., 14 Dec 2018, Proceedings - 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2018. IEEE Computer Society, p. 2235-2245 11 p. 8578336

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Verifying a Copying Garbage Collector in GP 2

    Plump, D. & Wulandari, G., 6 Dec 2018, Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops, Revised Selected Papers. Mazzara, M., Ober, L. & Salaün, G. (eds.). Springer, p. 479--494 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Will you be happier? Designing a game that employs gifting to non-player characters

    Li, S., Ursu, M., Williams, D. & Kegel, I., 4 Dec 2018, HAI 2018 - Proceedings of the 6th International Conference on Human-Agent Interaction. Association for Computing Machinery, Inc, p. 338-340 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol

    Avizheh, S., Safavi-Naini, R. & Shahandashti, S. F., Dec 2018, p. 369-387. 19 p.

    Research output: Contribution to conferencePaper

  7. Decoupling Criticality and Importance in Mixed-Criticality Scheduling

    Bletsas, K., Awan, M. A., Souto, P. F., Akesson, B., Burns, A. & Tovar, E., Dec 2018, p. 25-32. 6 p.

    Research output: Contribution to conferenceOther

  8. Supporting Critical Modes in AirTight

    Harbin, J. R., Griffin, D. J., Burns, A., Bate, I. J., Davis, R. I. & Soares Indrusiak, L., Dec 2018, p. 7-12. 6 p.

    Research output: Contribution to conferenceOther

  9. What is the Safety Case for Health IT? A Study of Assurance Practices in England

    Habli, I., White, S. P., Sujan, M., Harrison, S. & Ugarte, M., Dec 2018

    Article in Safety science

  10. Closed frequent itemset mining with arbitrary side constraints

    Kocak, G., Akgun, O., Miguel, I. J. & Nightingale, P. W., 17 Nov 2018, Workshop proceedings (OEDM 2018) of the 2018 IEEE International Conference on Data Mining (ICDM). IEEE Computer Society, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Rapid Integration of CPS Security and Safety

    McDermid, J. A., Asplund, F., Oates, R. & Roberts, J., 5 Nov 2018

    Article in IEEE Embedded Systems Letters

  12. Calculational Verification of Reactive Programs with Reactive Relations and Kleene Algebra

    Foster, S. D., Ye, K., Cavalcanti, A. L. C. & Woodcock, JAMES. C. P., 1 Nov 2018, Relational and Algebraic Methods in Computer Science - 17th International Conference, RAMiCS 2018, Proceedings. Guttmann, W., Desharnais, J. & Joosten, S. (eds.). Lecture Notes in Computer Science, Vol. 11194. p. 205-224 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 Next