Search research publications and outputs

  1. 1st International workshop on assurance cases for software-intensive systems (ASSURE 2013): Software Engineering (ICSE), 2013 35th International Conference on

    Denney, E., Pai, G., Habli, I., Kelly, T. & Knight, J., 2013, p. 1505-1506. 2 p.

    Research output: Contribution to conferenceOtherpeer-review

  2. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaperpeer-review

  3. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 30 Nov 2017.

    Research output: Contribution to conferencePaperpeer-review

  4. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaperpeer-review

  5. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaperpeer-review

  6. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  7. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaperpeer-review

  8. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  9. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaperpeer-review

  10. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaperpeer-review

  11. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaperpeer-review

  12. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaperpeer-review

  13. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaperpeer-review

  14. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  15. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  16. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  17. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaperpeer-review

  18. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaperpeer-review

  19. A Computational Model of Degeneracy in a Lymph Node

    Andrews, P. & Timmis, J., 2006, p. 164-177.

    Research output: Contribution to conferenceOther

  20. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaperpeer-review

  21. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaperpeer-review

  22. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaperpeer-review

  23. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaperpeer-review

  24. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaperpeer-review

  25. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaperpeer-review

  26. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  27. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  28. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaperpeer-review

  29. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaperpeer-review

  30. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  31. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaperpeer-review

  32. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  33. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaperpeer-review

  34. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  35. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  36. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaperpeer-review

  37. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaperpeer-review

  38. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaperpeer-review

  39. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  40. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaperpeer-review

  41. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaperpeer-review

  42. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaperpeer-review

  43. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaperpeer-review

  44. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaperpeer-review

  45. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaperpeer-review

  46. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaperpeer-review

  47. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  48. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  49. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaperpeer-review

  50. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaperpeer-review

Previous 1 2 3 4 5 6 7 8 ...27 Next