Search research publications and outputs

501 - 1000 out of 1,213Page size: 500
  1. Paper › Research › Peer-reviewed
  2. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  3. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  4. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  5. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  6. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  7. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  8. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  9. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  10. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  11. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  12. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  13. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  14. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  15. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  16. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  17. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  18. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  19. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  20. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  21. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  22. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  23. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  24. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  25. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  26. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  27. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  28. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  29. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  30. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  31. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  32. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  33. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  34. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  35. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  36. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaper

  37. Deep Learning of Cell Classification using Microscope Images of Intracellular Microtubule Networks

    Alexei, S., Dmitry, B., Marina, P., Kudenko, D., Burakov, A. & Nadezhdina, E., 18 Dec 2017.

    Research output: Contribution to conferencePaper

  38. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  39. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  40. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  41. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  42. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  43. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  44. Dependency Based Embeddings for Sentence Classification Tasks

    Komninos, A. & Manandhar, S., 12 Jun 2016, p. 1490-1500. 11 p.

    Research output: Contribution to conferencePaper

  45. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  46. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  47. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  48. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  49. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  50. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  51. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  52. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  53. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  54. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  55. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  56. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  57. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  58. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  59. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  60. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  61. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  62. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  63. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  64. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  65. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  66. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  67. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  68. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  69. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  70. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  71. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  72. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  73. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  74. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  75. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  76. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  77. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  78. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  79. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  80. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  81. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  82. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  83. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  84. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  85. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  86. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  87. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  88. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  89. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  90. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  91. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  92. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  93. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaper

  94. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  95. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  96. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  97. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  98. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  99. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  100. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  101. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  102. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  103. Evolving Test Environments to Identify Faults in Swarm Robotics Algorithms

    Wei, H., Timmis, J. I. & Alexander, R. D., 6 Jun 2017.

    Research output: Contribution to conferencePaper

  104. Evolving the Game of Life

    Kazakov, D. & Sweet, M., 2005, p. 132-146.

    Research output: Contribution to conferencePaper

  105. Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks

    Zuhily, A. & Burns, A., 2008, p. 410-424.

    Research output: Contribution to conferencePaper

  106. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  107. Experimental assessment of random testing for object-oriented software

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2007, p. 84.

    Research output: Contribution to conferencePaper

  108. Experiments in Object Trouve browsing

    Colton, S., Torres, P., Gow, J. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  109. Exploiting Loose Horizontal Coupling in Evolutionary Swarm Robotics

    Owen, J., Stepney, S., Timmis, J. & Winfield, A. F. T., 2010, p. 432-439.

    Research output: Contribution to conferencePaper

  110. Exploiting independence for branch operations in Bayesian learning of CRTs

    Angelopoulos, N. & Cussens, J., 2005.

    Research output: Contribution to conferencePaper

  111. Extending Argumentation to Goal-Oriented Requirements Engineering

    Habli, I., Wu, W., Attwood, K. & Kelly, T., 2007, p. 306-316.

    Research output: Contribution to conferencePaper

  112. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  113. Extending Ravenscar with CSP Channels

    Atiya, D-A., King, S., Vardanega, T. & Wellings, A. J., 2005, p. 79-90.

    Research output: Contribution to conferencePaper

  114. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  115. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  116. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  117. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  118. Extreme Programming Security Practices

    Ge, X., Paige, R. F., Polack, F. & Brooke, P. J., 2007, p. 226-230. 4 p.

    Research output: Contribution to conferencePaper

  119. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  120. FIFO with Offsets: High Schedulability with Low Overheads

    Nasri, M., Davis, R. I. & Brandenburg, B., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  121. FPTC: Automated Safety Analysis for Domain-Specific Languages

    Paige, R. F., Rose, L. M., Ge, X., Kolovos, D. S. & Brooke, P. J., 2009, p. 229-242.

    Research output: Contribution to conferencePaper

  122. FSF: A Real-Time Scheduling Architecture Framework

    Aldea, M., Bernat, G., Broster, I., Burns, A., Dobrin, R., Drake, J. M., Fohler, G., Gai, P., Harbour, M. G., Guidi, G., Gutiérrez, J. J., Lennvall, T., Lipari, G., Martínez, J. M., Medina, J. L. & Trimarchi, M., 2006, p. 113-124.

    Research output: Contribution to conferencePaper

  123. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  124. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  125. Face recognition using ortho-diffusion bases

    Gudivada, S. & Bors, A. G., Aug 2012, p. 1578-1582.

    Research output: Contribution to conferencePaper

  126. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  127. Facial Shape Estimation in the Presence of Cast Shadows

    Smith, W. A. P. & Hancock, E. R., 2006, p. 779-788.

    Research output: Contribution to conferencePaper

  128. Facial Shape Spaces from Surface Normals and Geodesic Distance

    Ceolin, S., Smith, W. A. P. & Hancock, E. R., 2007, p. 416-423.

    Research output: Contribution to conferencePaper

  129. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  130. Fast Isometric Parametrization of 3D Triangular Mesh

    Sun, X. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  131. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaper

  132. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  133. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  134. Feature-Rich Networks for Knowledge Base Completion

    Manandhar, S. K. & Komninos, A., 30 Jul 2017, p. 324-329. 6 p.

    Research output: Contribution to conferencePaper

  135. First Steps in the Verified Software Grand Challenge

    Woodcock, J., 2006, p. 203-206.

    Research output: Contribution to conferencePaper

  136. Flexibility and Manageability of IMS Projects

    Stephenson, Z., Nicholson, M. & McDermid, J. A., 2006.

    Research output: Contribution to conferencePaper

  137. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  138. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  139. Formal Analysis in Model Management: Exploiting the Power of CZT

    Williams, J. R., Polack, F. A. C. & Paige, R. F., 2010, p. 414.

    Research output: Contribution to conferencePaper

  140. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  141. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  142. Formalising Flash Memory: First Steps

    Butterfield, A. & Woodcock, J., 2007, p. 251-260.

    Research output: Contribution to conferencePaper

  143. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  144. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  145. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  146. From Circus to JCSP

    Oliveira, M. & Cavalcanti, A., 2004, p. 320-340.

    Research output: Contribution to conferencePaper

  147. From Java to real-time Java: a model-driven methodology with automated toolchain

    Chang, W., Zhao, S., Wei, R., Wellings, A. J. & Burns, A., 23 Jun 2019, p. 123-134. 12 p.

    Research output: Contribution to conferencePaper

  148. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  149. From the gaming experience to the wider user experience

    Gámez, E. H. C., Cairns, P. A. & Cox, A. L., 2009, p. 520-523.

    Research output: Contribution to conferencePaper

  150. Functional Faces: Groupwise Dense Correspondence using Functional Maps

    Zhang, C., Smith, W. A. P., Dessein, A. F., Pears, N. E. & Dai, H., 26 Jun 2016, p. 5033-5041. 9 p.

    Research output: Contribution to conferencePaper

  151. Functional grouping analysis of varying reactor types in the Spiky-RBN AChem

    Krastev, M. S., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 247-254.

    Research output: Contribution to conferencePaper

  152. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  153. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  154. Game Intelligence: Proceedings of the IEEE Conference on Computational Intelligence in Games (CIG)

    Devlin, S., Cowling, P. I., Kudenko, D., Goumagias, N., Nucciarelli, A., Cabras, I., Fernandes, K. J. & Li, F., 2014.

    Research output: Contribution to conferencePaper

  155. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  156. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  157. Generation of Dilemma-Based Narratives: Method and Turing Test Evaluation

    Barber, H. & Kudenko, D., 2008, p. 214-217.

    Research output: Contribution to conferencePaper

  158. Generic component lookup

    Bay, T., Eugster, P. & Oriol, M., 2006, p. 182-197. 15 p.

    Research output: Contribution to conferencePaper

  159. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  160. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  161. Getting Farther on Software Evolution via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S. & Saake, G., 2008, p. 63-69.

    Research output: Contribution to conferencePaper

  162. Global Constraints for Lexicographic Orderings

    Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. & Walsh, T., 2002, p. 93-108.

    Research output: Contribution to conferencePaper

  163. Global Register Allocation, Register Allocation for Stack Machines

    Crispin-Bailey, C. & Shannon, M., Sep 2006. 8 p.

    Research output: Contribution to conferencePaper

  164. Gloss Overlap Extensions for a Semantic Network Algorithm: Building a Better Semantic Distance Measure

    Jayasooriya, T. & Manandhar, S., 2006, p. 74-79.

    Research output: Contribution to conferencePaper

  165. Goal-Based Safety Standards: Opportunities and Challenges

    Kelly, T. P., McDermid, J. A. & Weaver, R. A., 2005.

    Research output: Contribution to conferencePaper

  166. Goal-Oriented Automatic Test Case Generators for MC/DC Compliancy

    Aydal, E. G., Woodcock, J. & Cavalcanti, A., 2007, p. 290-295.

    Research output: Contribution to conferencePaper

  167. Grand Challenge 7: Journeys in Non-Classical Computation

    Stepney, S., Abramsky, S., Adamatzky, A., Johnson, C. G., Timmis, J., Gelenbe, E., Abramsky, S. & Sassone, V., 2008, p. 407-421.

    Research output: Contribution to conferencePaper

  168. Graph Characteristic from the Gauss-Bonnet Theorem

    ElGhawalby, H. & Hancock, E. R., 2008, p. 207-216.

    Research output: Contribution to conferencePaper

  169. Graph Drawing using Quantum Commute Time

    Emms, D., Hancock, E. & Wilson, R., 2008, p. 3743-3746. 4 p.

    Research output: Contribution to conferencePaper

  170. Graph Embedding Using an Edge-Based Wave Kernel

    ElGhawalby, H. & Hancock, E. R., 2010, p. 60-69.

    Research output: Contribution to conferencePaper

  171. Graph Matching using Adjacency Matrix Markov Chains

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  172. Graph Similarity Using Interfering Quantum Walks

    Emms, D., Hancock, E. R. & Wilson, R. C., 2007, p. 823-831.

    Research output: Contribution to conferencePaper

  173. Graph Spectral Image Smoothing

    Zhang, F. & Hancock, E. R., 2007, p. 191-203.

    Research output: Contribution to conferencePaper

  174. Grid Enabling Data De-Duplication

    Austin, J., Turner, A. & Alwis, S., 2006, p. 2.

    Research output: Contribution to conferencePaper

  175. Grouping Line-segments using Eigenclustering

    Robles-Kelly, A. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  176. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  177. HLL Enhancement for Stack Based Processors

    Crispin-Bailey, C. & Sotudeh, R., 1994. 4 p.

    Research output: Contribution to conferencePaper

  178. Haptic Virtual Reality for Blind Computer Users

    Colwell, C., Petrie, H., Kornbrot, D., Hardwick, A. & Furner, S., 1998, p. 92-99.

    Research output: Contribution to conferencePaper

  179. Hardware architecture for a Bidirectional Hetero-Associative Protein Processing Associative Memory

    Qadir, O., Liu, J., Tempesti, G., Timmis, J. & Tyrrell, A., Jun 2011, p. 208-215. 8 p.

    Research output: Contribution to conferencePaper

  180. Hardware implementation of similarity functions

    Freeman, M., Weeks, M. & Austin, J., 2005, p. 329-332.

    Research output: Contribution to conferencePaper

  181. Hazard Analysis for Security Protocol Requirements

    Foster, N. & Jacob, J. L., 2002, p. 75-92.

    Research output: Contribution to conferencePaper

  182. Health Modelling for Agility in Safety Critical Systems Development

    Stephenson, Z. R., McDermid, J. A. & Ward, A. G., 2006.

    Research output: Contribution to conferencePaper

  183. Heat Flow-Thermodynamic Depth Complexity in Networks

    Escolano, F., Lozano, M. A. & Hancock, E. R., 2010, p. 1578-1581.

    Research output: Contribution to conferencePaper

  184. Hierarchical growing cell structures: TreeGCS

    Hodge, V. J. & Austin, J., 2000, p. 553-556.

    Research output: Contribution to conferencePaper

  185. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y., McDermid, J. A., Felici, M., Kanoun, K. & Pasquini, A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  186. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  187. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

  188. High Integrity Software Development: Process and Tool Issues

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1994.

    Research output: Contribution to conferencePaper

  189. High Level Failure Analysis for Integrated Modular Avionics

    Conmy, P., McDermid, J. A. & Lindsay, P. A., 2001, p. 13-22.

    Research output: Contribution to conferencePaper

  190. High frequency forecasting with associative memories

    Pasley, A. & Austin, J., 2002, p. 433-438.

    Research output: Contribution to conferencePaper

  191. High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A. & Stephenson, Z. R., 1 Dec 2005, p. 1518-1523. 6 p.

    Research output: Contribution to conferencePaper

  192. Huge data but small programs: visualization design via multiple embedded DSLs

    Duke, D. J., Borgo, R., Runciman, C. & Wallace, M., 2009, p. 31-45. 14 p.

    Research output: Contribution to conferencePaper

  193. Human competitive security protocols synthesis

    Chen, H., Clark, J. A. & Jacob, J., 2006, p. 1855-1856.

    Research output: Contribution to conferencePaper

  194. Hypergraphs, Characteristic Polynomials and the Ihara Zeta Function

    Ren, P., Aleksic, T., Wilson, R. C. & Hancock, E. R., 2009, p. 369-376.

    Research output: Contribution to conferencePaper

  195. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaper

  196. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  197. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  198. Ide-integrated support for schema evolution in object-oriented applications

    Piccioni, M., Oriol, M. & Meyer, B., 2007, p. 27.

    Research output: Contribution to conferencePaper

  199. Identifying Perceptual Structures In Trademark Images

    Hodge, V. J., Hollier, G. P., Austin, J. & Eakins, J., 13 Feb 2008, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  200. Identifying safety dependencies in modular computer systems

    Conmy, P., Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  201. Image Segmentation using Commute Times

    Qiu, H., Hancock, E. R., Clocksin, W. F., Fitzgibbon, A. W. & Torr, P. H. S., 2005.

    Research output: Contribution to conferencePaper

  202. Immune Systems and Computation: An Interdisciplinary Adventure

    Timmis, J., Andrews, P. S., Owens, N. D. L. & Clark, E., 2008, p. 8-18.

    Research output: Contribution to conferencePaper

  203. Immune and Evolutionary Approaches to Software Mutation Testing

    May, P., Timmis, J. & Mander, K., 2007, p. 336-347.

    Research output: Contribution to conferencePaper

  204. Immuno-Engineering

    Timmis, J., Hart, E., Hone, A., Neal, M., Robins, A., Stepney, S. & Tyrrell, A., 2008.

    Research output: Contribution to conferencePaper

  205. Implementation and Application of Functional Languages

    Mitchell, N., Runciman, C., Chitil, O., Horváth, Z. & Zsók, V., 2008, p. 147-164. 18 p.

    Research output: Contribution to conferencePaper

  206. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  207. Improved local buffering schemes for ATM-based multimedia servers

    Crispin-Bailey, C., Maierhofer, M. & Sotudeh, R., Sep 1998, p. 302-306. 5 p.

    Research output: Contribution to conferencePaper

  208. Improvement to Quick Processor-Demand Analysis for EDF-Scheduled Real-Time Systems

    Zhang, F. & Burns, A., 2009, p. 76-86.

    Research output: Contribution to conferencePaper

  209. Improvements in Speaker Diarization System

    Fu, R. & Benest, I. D., 2007, p. 317-323.

    Research output: Contribution to conferencePaper

  210. Improving Multimedia Server Efficiency in ATM Networks

    Crispin-Bailey, C., Maierhofer, M. & sotudeh, R., Jul 1998.

    Research output: Contribution to conferencePaper

  211. Improving Optimistic Exploration in Model-Free Reinforcement Learning

    Grzes, M. & Kudenko, D., 2009, p. 360-369.

    Research output: Contribution to conferencePaper

  212. Improving efficiency of persistent storage access in embedded Linux

    Joyce, R. A. & Audsley, N. C., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  213. Improving the Performance of Embedded Superscalatr Microprocessors by Adding Partial Pipeline

    Crispin-Bailey, C., Shi, H., Hastie, N. & Farrel, G., 31 Aug 2005, p. 15-20. 6 p.

    Research output: Contribution to conferencePaper

  214. Incorporating epistemic uncertainty into the safety assurance of socio-technical systems

    Leong, C. W. K., Kelly, T. P. & Alexander, R. D., 29 Apr 2017.

    Research output: Contribution to conferencePaper

  215. Increased Extent of Characteristic Views using Shape-from-Shading for Object Recognition

    Worthington, P. L., Huet, B. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  216. Incremental Development of a High Integrity Compiler: Experience from an Industrial Development

    Stepney, S., 1998, p. 142-149.

    Research output: Contribution to conferencePaper

  217. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  218. Inducing a perceptual relevance shape classifier

    Hodge, V. J., Eakins, J. P. & Austin, J., 2007, p. 138-145.

    Research output: Contribution to conferencePaper

  219. Inductive Mercury Programming

    Fisher, B. & Cussens, J., 2006, p. 199-213.

    Research output: Contribution to conferencePaper

  220. Industrial Practice in Formal Methods: A Review

    Bicarregui, J., Fitzgerald, J. S., Larsen, P. G., Woodcock, J. C. P. & Dams, D., 2009, p. 810-813.

    Research output: Contribution to conferencePaper

  221. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  222. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  223. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  224. Innovations in measuring accessibility: theoretical and practical perspectives

    Petrie, H., Power, C., Adams, R., Hwang, F., Weber, G., Darzentas, J. S. & Velasco, C. A., 2008, p. 197-198.

    Research output: Contribution to conferencePaper

  225. Instruction level parallelism of stack-code under varied issue widths, and one-level branch prediction

    Bailey, C. & Shi, H., 2005, p. 23-30.

    Research output: Contribution to conferencePaper

  226. Integrated Analysis of Cache Related Preemption Delays and Cache Persistence Reload Overheads

    Rashid, S. A., Nelissen, G., Altmeyer, S., Davis, R. I. & Tovar, E., 6 Dec 2017. 11 p.

    Research output: Contribution to conferencePaper

  227. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  228. Integrating Priority Inheritance Algorithms in the Real-Time Specification for Java

    Wellings, A. J., Burns, A., Santos, O. M. D. & Brosgol, B. M., 2007, p. 115-123.

    Research output: Contribution to conferencePaper

  229. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  230. Integrative Hybrid Modelling of Plant Shoot Branching

    Garnett, P., Stepney, S. & Leyser, O., 1 Nov 2007, p. 9.1-9.5.

    Research output: Contribution to conferencePaper

  231. Intelligent Car Park Routeing for Road Traffic

    Hodge, V. J., Smith, M. & Austin, J., 22 Jun 2009, p. 326-333.

    Research output: Contribution to conferencePaper

  232. Inter-boundary scheduling of stack operands, a preliminary approach

    Crispin-Bailey, C., Nov 2000, p. 3-11. 9 p.

    Research output: Contribution to conferencePaper

  233. Inter-modelling: From Theory to Practice

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 376-391.

    Research output: Contribution to conferencePaper

  234. Interactions Between Stereotypes

    Lock, Z. P. & Kudenko, D., 2006, p. 172-181.

    Research output: Contribution to conferencePaper

  235. Interplay between Language, Navigation and Kin selection

    Kazakov, D., 2010.

    Research output: Contribution to conferencePaper

  236. Investigating Available Instruction Level Parallelism for Stack Based Machine Architectures

    Shi, H. & Bailey, C., 2004, p. 112-120.

    Research output: Contribution to conferencePaper

  237. Investigating and Formalising the Development of HIS Within PSEEs

    Gimenes, I. M. D. S., McDermid, J. A. & Schäfer, W., 1993, p. 90-94.

    Research output: Contribution to conferencePaper

  238. Investigating computer game immersion and the component real world dissociation

    Jennett, C., Cox, A. L. & Cairns, P. A., 2009, p. 3407-3412.

    Research output: Contribution to conferencePaper

  239. Investigating the Correctness and Efficiency of MrsP in Fully Partitioned Systems

    Zhao, S. & Wellings, A. J., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  240. Investigation of Stack Machine Design for Efficient High Level Language Support

    Crispin-Bailey, C. & Sotudeh, R., 1993. 4 p.

    Research output: Contribution to conferencePaper

  241. Investigation of cultural dependency in mobile technology and older adults

    Abd Malik, S. & Edwards, A. D. N., 2010, p. 3835-3840.

    Research output: Contribution to conferencePaper

  242. Isoradius Contours: New Representations and Techniques for 3D Face Registration and Matching

    Pears, N. & Heseltine, T., 2006, p. 176-183.

    Research output: Contribution to conferencePaper

  243. Issues in the Conduct of PSSA

    Dawkins, S. K., Kelly, T. P., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 1999.

    Research output: Contribution to conferencePaper

  244. Issues with using Ravenscar and the ada Distributed Systems Annex for high-integrity systems

    Audsley, N. & Wellings, A., 1 Apr 2001, p. 33-39. 7 p.

    Research output: Contribution to conferencePaper

  245. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  246. KAOS: A Goal-oriented Process Model for EIS

    Tabatabaie, M., Polack, F. A. C. & Paige, R. F., 2010, p. 40-49.

    Research output: Contribution to conferencePaper

  247. Knowledge Engineering Using the UML Profile - Adopting the Model-Driven Architecture for Knowledge-Based System Development

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 74-81.

    Research output: Contribution to conferencePaper

  248. Knowledge Modelling Using The UML Profile

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 70-77. 7 p.

    Research output: Contribution to conferencePaper

  249. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  250. Knowledge-Based Reinforcement Learning for Data Mining

    Kudenko, D. & Grzes, M., 2009, p. 21-22.

    Research output: Contribution to conferencePaper

  251. LIU H, SOTUDEH R, BAILEY C. On improving the Quality of Service for multimedia transmission in ATM networks

    Crispin-Bailey, C., Hong, L. & Sotudeh, R., 1998, p. 412-415. 4 p.

    Research output: Contribution to conferencePaper

  252. Landmark Localisation in 3D Face Data

    Romero, M. & Pears, N., 2009, p. 73-78.

    Research output: Contribution to conferencePaper

  253. Latent Distribution Preserving Deep Subspace Clustering

    Zhou, L., Xiao, B., wang, D., Liu, X., Zhou, J. & Hancock, E. R., May 2019, p. 4440-4446. 7 p.

    Research output: Contribution to conferencePaper

  254. Layout indexing of trademark images

    Leuken, R. H. V., Demirci, M. F., Hodge, V. J., Austin, J. & Veltkamp, R. C., 2007, p. 525-532.

    Research output: Contribution to conferencePaper

  255. Lazy Exploration and Checking of CSP Models with CSPsim

    Brooke, P. J. & Paige, R. F., 2007, p. 33-49.

    Research output: Contribution to conferencePaper

  256. Learning Autonomic Security Reconfiguration Policies

    Tapiador, J. E. & Clark, J. A., 2010, p. 902-909. 8 p.

    Research output: Contribution to conferencePaper

  257. Learning Binary Preference Relations: Analysis of Logic-based versus Statistical Approaches

    Qomariyah, N. N. & Kazakov, D. L., 27 Aug 2017, p. 30-34. 5 p.

    Research output: Contribution to conferencePaper

  258. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  259. Learning Electronic Systems Design with a Project Based Course on the Web

    Donzellini, G., Ponta, D., Crispin-Bailey, C., Pears, N. E. & Xu, D., Jun 1999, p. 114-121. 8 p.

    Research output: Contribution to conferencePaper

  260. Learning Multilingual Morphology with CLOG

    Manandhar, S., Dzeroski, S. & Erjavec, T., 1998, p. 135-144.

    Research output: Contribution to conferencePaper

  261. Learning Word Segmentation Rules for Tag Prediction

    Kazakov, D., Manandhar, S. & Erjavec, T., 1999, p. 152-161.

    Research output: Contribution to conferencePaper

  262. Learning to Coordinate Using Commitment Sequences in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2005, p. 106-118.

    Research output: Contribution to conferencePaper

  263. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  264. Linking VDM and Z

    Woodcock, J. & Freitas, L., 2008, p. 143-152.

    Research output: Contribution to conferencePaper

  265. Literate Formal Development of Ada from Z for Safety Critical Applications

    Jordan, D. T., Locke, C. J., McDermid, J. A., Parker, C., Sharpe, B. A. P. & Toyn, I., 1994.

    Research output: Contribution to conferencePaper

  266. Literate Proving: Presenting and Documenting Formal Proofs

    Cairns, P. A. & Gow, J., 2005, p. 159-173.

    Research output: Contribution to conferencePaper

  267. Logitboost weka classifier speech segmentation

    Ziólko, B., Manandhar, S., Wilson, R. C. & Ziólko, M., 23 Jun 2008, p. 1297-1300. 4 p.

    Research output: Contribution to conferencePaper

  268. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  269. LuckyJ : an Asynchronous Evolution Platform for Component-Based Applications

    Oriol, M., 2003, p. 1-10.

    Research output: Contribution to conferencePaper

  270. Machine Learning and Inductive Logic Programming for Multi-agent Systems

    Kazakov, D. & Kudenko, D., 2001, p. 246-272.

    Research output: Contribution to conferencePaper

  271. Machine Learning for Logic-Based Multi-agent Systems

    Alonso, E. & Kudenko, D., 2000, p. 306-307.

    Research output: Contribution to conferencePaper

  272. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  273. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  274. Managing Architectural Design Decisions for Safety-Critical Software Systems

    Wu, W. & Kelly, T., 2006, p. 59-77.

    Research output: Contribution to conferencePaper

  275. Managing Automatically Formed Mathematical Theories

    Colton, S., Torres, P., Cairns, P. A. & Sorge, V., 2006, p. 237-250.

    Research output: Contribution to conferencePaper

  276. Mapping Correlation Matrix Memory Applications onto a Beowulf Cluster

    Weeks, M., Austin, J., Moulds, A., Turner, A., Ulanowski, Z. & Young, J., 2001, p. 156-163.

    Research output: Contribution to conferencePaper

  277. Matching Point-sets using Procrustes Alignment and the EM Algorithm

    Luo, B. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  278. Mathematics of Surfaces XIII, 13th IMA International Conference, York, UK, September 7-9, 2009

    Hancock, E. R., Martin, R. R. & Sabin, M. A., 2009.

    Research output: Contribution to conferencePaper

  279. Measuring user experience of websites: think aloud protocols and an emotion word prompt list

    Petrie, H. & Precious, J., 2010, p. 3673-3678.

    Research output: Contribution to conferencePaper

  280. Mechanised Translation of Control Law Diagrams into Circus

    Zeyda, F. & Cavalcanti, A., 2009, p. 151-166.

    Research output: Contribution to conferencePaper

  281. Mechanising a Unifying Theory

    Nuka, G. & Woodcock, J., 2006, p. 217-235.

    Research output: Contribution to conferencePaper

  282. Medical diagnostic based on encrypted medical data

    Gribov, A., Horan, K., Gryak, J., Najarian, K., Shpilrain, V., Soroushmehr, S. M. R. & Kahrobaei, D., 2019, p. 98-111. 14 p.

    Research output: Contribution to conferencePaper

  283. Merging Models with the Epsilon Merging Language (EML)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 215-229.

    Research output: Contribution to conferencePaper

  284. Metamodelling and Conformance Checking with PVS

    Paige, R. F. & Ostroff, J. S., 2001, p. 2-16. 14 p.

    Research output: Contribution to conferencePaper

  285. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  286. Migrating Activity Diagrams with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  287. Migrating Mixed Criticality Tasks within a Cyclic Executive Framework

    Burns, A. & Baruah, S., 2017, p. 203-216. 14 p.

    Research output: Contribution to conferencePaper

  288. Miniature Untethered EEG Recorder Improves Advanced Neuroscience Methodologies

    Crispin-Bailey, C., Austin, J., Moulds, A., Platt, B. & Crouch, B., 14 Aug 2019, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  289. Minimal distortion 3-D watermarking using statistics of geodesic distances

    Luo, M. & Bors, A. G., Aug 2012, p. 1683-1687.

    Research output: Contribution to conferencePaper

  290. Mixed Criticality Systems with Varying Context Switch Costs

    Davis, R. I., Altmeyer, S. & Burns, A., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  291. Mobile Phone Preferences and Values: the U.K. vs. Korea

    Cha, H., Oshlyansky, L. & Cairns, P. A., 2005, p. 29-41.

    Research output: Contribution to conferencePaper

  292. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  293. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  294. Model Migration Case

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  295. Model Migration with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010, p. 184--198.

    Research output: Contribution to conferencePaper

  296. Model-based design flow for NoC-based MPSoCs

    Ost, L., Indrusiak, L. S., Maatta, S., Mandelli, M., Nurmi, J. & Moraes, F., 1 Dec 2010, p. 750 -753.

    Research output: Contribution to conferencePaper

  297. Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems

    Mahmood, T., Kazmierczak, E., Kelly, T. & Plunkett, D., 2007, p. 175-182.

    Research output: Contribution to conferencePaper

  298. Modeling of Dual-Route Fear Conditioning Paradigm in the Auditory Cortex

    Sengupta, B., Austin, J. & Green, G., 2005, p. 3632-3644.

    Research output: Contribution to conferencePaper

  299. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  300. Modelling Complex Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999.

    Research output: Contribution to conferencePaper

  301. Modelling Incremental Learning With The Batch SOM Training Method

    Baez-Monroy, V. O. & O'Keefe, S., 2005, p. 542-544.

    Research output: Contribution to conferencePaper

  302. Modelling and Implementing Complex Systems with Timebands

    Woodcock, J., Oliveira, M., Burns, A. & Wei, K., 2010, p. 1-13.

    Research output: Contribution to conferencePaper

  303. Modelling and simulation of granuloma formation in visceral leishmaniasis

    Flugge, A. J., Timmis, J., Andrews, P. S., Moore, J. W. J. & Kaye, P. M., 2009, p. 3052-3059.

    Research output: Contribution to conferencePaper

  304. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  305. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  306. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  307. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  308. Motion information combination for fast human action recognition

    Meng, H., Pears, N. & Bailey, C., 2007, p. 21-28.

    Research output: Contribution to conferencePaper

  309. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  310. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  311. Moving Virtual Source Perception in 3D Space

    Hughes, S. S. & Kearney, G. C., 30 Sep 2016.

    Research output: Contribution to conferencePaper

  312. Multi-Agent Potential-based Reward Shaping for RoboCup KeepAway

    Devlin, S., Grzes, M. & Kudenko, D., May 2011.

    Research output: Contribution to conferencePaper

  313. Multi-Agent Reinforcement Learning for Intrusion Detection: A case study and evaluation

    Servin, A. & Kudenko, D., 2008, p. 873-874.

    Research output: Contribution to conferencePaper

  314. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  315. Multi-agent Reinforcement Learning for Intrusion Detection

    Servin, A. & Kudenko, D., 2007, p. 211-223.

    Research output: Contribution to conferencePaper

  316. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaper

  317. Multigrid Reinforcement Learning with Reward Shaping

    Grzes, M. & Kudenko, D., 2008, p. 357-366.

    Research output: Contribution to conferencePaper

  318. Multiple image disparity correction for 3-D scene representation

    Grum, M. & Bors, A. G., Oct 2008, p. 209-212. 4 p.

    Research output: Contribution to conferencePaper

  319. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  320. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  321. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  322. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  323. NoCScope: A graphical interface to improve Networks-on-Chip monitoring and design space exploration

    Moller, L., Indrusiak, L. S. & Glesner, M., 1 Nov 2009, p. 1 -6.

    Research output: Contribution to conferencePaper

  324. Non-rigid 3D Shape Registration using an Adaptive Template

    Dai, H., Pears, N. E. & Smith, W. A. P., 14 Sep 2018. 15 p.

    Research output: Contribution to conferencePaper

  325. Nonclassical readout of optical memories under local energy constraint

    Spedalieri, G., Lupo, C. & Pirandola, S., 3 Sep 2015, p. 1-11. 11 p.

    Research output: Contribution to conferencePaper

  326. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  327. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  328. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  329. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  330. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  331. Object distance and its application to adaptive random testing of object-oriented programs

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2006, p. 63.

    Research output: Contribution to conferencePaper

  332. Object-Orientation in the UTP

    Santos, T. L. V. L., Cavalcanti, A. & Sampaio, A., 2006, p. 18-37.

    Research output: Contribution to conferencePaper

  333. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  334. On Homeostasis in Collective Robotic Systems

    Timmis, J. & Tyrrell, A. M., 2010, p. 307-309.

    Research output: Contribution to conferencePaper

  335. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  336. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  337. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  338. On modelling user observations in the UTP

    Banks, M. J. & Jacob, J. L., 2010, p. 101--119.

    Research output: Contribution to conferencePaper

  339. On the Accuracy of Tactile Displays

    Power, C., 2006, p. 1155-1162.

    Research output: Contribution to conferencePaper

  340. On the Effectiveness of Test Extraction without Overhead

    Leitner, A., Pretschner, A., Mori, S., Meyer, B. & Oriol, M., 1 Apr 2009, p. 416--425.

    Research output: Contribution to conferencePaper

  341. On the Predictability of Random Tests for Object-Oriented Software

    Ciupa, I., Pretschner, A., Leitner, A., Oriol, M. & Meyer, B., 1 Apr 2008, p. 72--81.

    Research output: Contribution to conferencePaper

  342. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  343. On the meaning of modes in uniprocessor real-time systems

    Martins, P. & Burns, A., 2008, p. 324-325.

    Research output: Contribution to conferencePaper

  344. Open source projects in programming courses

    Pedroni, M., Bay, T., Oriol, M. & Pedroni, A., 2007, p. 454.

    Research output: Contribution to conferencePaper

  345. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  346. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  347. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaper

  348. Origins of the Grid Architectural Style

    Cakic, J. & Paige, R. F., 2006, p. 227-235. 8 p.

    Research output: Contribution to conferencePaper

  349. POSIX and the Verification Grand Challenge: A Roadmap

    Freitas, L., Woodcock, J. & Butterfield, A., 2008, p. 153-162.

    Research output: Contribution to conferencePaper

  350. POSIX file store in Z/Eves: an experiment in the verified software repository

    Freitas, L., Fu, Z. & Woodcock, J., 2007, p. 3-14.

    Research output: Contribution to conferencePaper

  351. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  352. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  353. Parallel reinforcement learning with linear function approximation

    Grounds, M. & Kudenko, D., 2007, p. 45.

    Research output: Contribution to conferencePaper

  354. Parameter Optimisation in the Receptor Density Algorithm

    Hilder, J. A., Owens, N. D. L., Timmis, J., Hickey, P., Kilgour, S. & Tyrrell, A., Jun 2011, p. 226-239. 13 p.

    Research output: Contribution to conferencePaper

  355. Particle Swarm Optimization of Bollinger Bands

    Butler, M. & Kazakov, D., 2010, p. 504-511.

    Research output: Contribution to conferencePaper

  356. Parts based generative models for graphs

    White, D. & Wilson, R. C., 8 Dec 2008, p. 1-4.

    Research output: Contribution to conferencePaper

  357. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  358. People with Disabilities: Automatic and Manual Evaluation of Web Sites

    Petrie, H. & Weber, G., 2006, p. 152-155.

    Research output: Contribution to conferencePaper

  359. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  360. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  361. Personalization of Interactive Systems: Introduction to the Special Thematic Session

    Petrie, H. & Weber, G., 2004, p. 117-120.

    Research output: Contribution to conferencePaper

  362. Persuasive Technology for Leisure and Health: Development of a Personal Navigation Tool

    McCreadie, C., Raper, J., Gunesh, A., Wood, J., Carey, K., Petrie, H., Wood, L., Survey, O., Tyler, S. & Biggs, S., 2006, p. 187-190.

    Research output: Contribution to conferencePaper

  363. Phoneme segmentation of speech

    Ziólko, B., Manandhar, S. & Wilson, R. C., 1 Sep 2006, p. 282-285. 4 p.

    Research output: Contribution to conferencePaper

  364. Pointers and Records in the Unifying Theories of Programming

    Cavalcanti, A., Harwood, W. & Woodcock, J., 2006, p. 200-216.

    Research output: Contribution to conferencePaper

  365. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  366. Practical Formal Specification for Embedded Control Systems

    Iwu, F., Galloway, A. J., Toyn, I. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  367. Practical single view metrology for cuboids

    Pears, N., Wright, P. & Bailey, C., 2007, p. 85-90.

    Research output: Contribution to conferencePaper

  368. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  369. Primitives for the dynamic evolution of component-based applications

    Oriol, M., 2007, p. 1122.

    Research output: Contribution to conferencePaper

  370. Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks

    Shi, Z. & Burns, A., 2008, p. 421-430.

    Research output: Contribution to conferencePaper

  371. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  372. Probabilistic Analysis for Mixed Criticality Systems using Fixed Priority Preemptive Scheduling

    Maxim, D., Davis, R. I., Cucu-Grosjean, L. & Easwaran, A., 4 Oct 2017. 10 p.

    Research output: Contribution to conferencePaper

  373. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  374. Proc. British Machine Vision Conference (BMVC), vol II: Navier-Stokes Formulation for Modelling Turbulent Optical Flow

    Doshi, A. & Bors, A. G., Sep 2007, p. 640-649.

    Research output: Contribution to conferencePaper

  375. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  376. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  377. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  378. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  379. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  380. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  381. Proving Theorems About JML Classes

    Freitas, L. & Woodcock, J., 2007, p. 255-279.

    Research output: Contribution to conferencePaper

  382. Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation

    Aydal, E. G., Paige, R. F., Utting, M. & Woodcock, J., 2009, p. 131-140.

    Research output: Contribution to conferencePaper

  383. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  384. Quantum Teleportation of Wavepackets in a Non-Gaussian State

    Lee, N., Takeno, Y., Benichi, H., Yonezawa, H., Webb, J., Huntington, E., Mista, Jr., L., Filip, R., van Loock, P., Braunstein, S. L. & Furusawa, A., 2009, p. 2221-2222.

    Research output: Contribution to conferencePaper

  385. Quantum algorithms in group theory

    Batty, M., Braunstein, SL., Duncan, AJ. & Rees, S., 2004, p. 1-62.

    Research output: Contribution to conferencePaper

  386. Quantum cryptography with an ideal local relay

    Spedalieri, G., Ottaviani, C., Braunstein, S. L., Gehring, T., Jacobsen, C. S., Andersen, U. L. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  387. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  388. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  389. Qubus computation - art. no. 63050D

    Munro, W. J., Nemoto, K., Spiller, T. P., van Loock, P., Braunstein, S. L. & Milburn, G. J., 2006, p. D3050.

    Research output: Contribution to conferencePaper

  390. RBF shape histograms and their application to 3D face processing

    Pears, N., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  391. RBN-World: The hunt for a rich AChem

    Faulconbridge, A., Stepney, S. & Miller, J. F., 2010, p. 261--268.

    Research output: Contribution to conferencePaper

  392. Radiance function estimation for object classification

    Robles-Kelly, A. & Hancock, E. R., 2004, p. 67-75. 9 p.

    Research output: Contribution to conferencePaper

  393. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  394. Re-evaluation of the role of the processor within embedded multiprocessor systems

    Freeman, M. & Bailey, C., 2009, p. 181-188. 8 p.

    Research output: Contribution to conferencePaper

  395. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  396. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  397. Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching

    Shi, Z. & Burns, A., 1 Apr 2008, p. 161 -170.

    Research output: Contribution to conferencePaper

  398. Real-Time Communication Analysis with a Priority Share Policy in On-Chip Networks

    Shi, Z. & Burns, A., 2009, p. 3-12.

    Research output: Contribution to conferencePaper

  399. Real-Time Utilities for Ada 2005

    Wellings, A. J. & Burns, A., 2007, p. 1-14.

    Research output: Contribution to conferencePaper

  400. Realism in Statistical Analysis of Worst Case Execution Times

    Griffin, D. & Burns, A., 2010, p. 44-53.

    Research output: Contribution to conferencePaper

  401. Recognising Facial Expressions Using Spherical Harmonics

    Sharpe, J. & Hancock, E. R., 2008, p. 157-166.

    Research output: Contribution to conferencePaper

  402. Recovering 3D Shape Using an Improved Fast Marching Method

    Zou, C. & Hancock, E. R., 2010, p. 1678-1681.

    Research output: Contribution to conferencePaper

  403. Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 3324-3327.

    Research output: Contribution to conferencePaper

  404. Refinement: An overview

    Cavalcanti, A., Sampaio, A. & Woodcock, J., 2004, p. 1-17.

    Research output: Contribution to conferencePaper

  405. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  406. Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009.

    Research output: Contribution to conferencePaper

  407. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  408. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  409. Refining Implicit Function Representations of 3-D Scenes: Proc. British Machine Vision Conference(BMVC), vol. II

    Grum, M. & Bors, A. G., Sep 2007, p. 710-719.

    Research output: Contribution to conferencePaper

  410. Reflective Grammatical Evolution

    Timperley, C. & Stepney, S., 2014, p. 71–78.

    Research output: Contribution to conferencePaper

  411. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaper

  412. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  413. Regularising the Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 579-588.

    Research output: Contribution to conferencePaper

  414. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  415. Reinforcement Learning in RoboCup KeepAway with Partial Observability

    Devlin, S., Grzes, M. & Kudenko, D., 2009, p. 201-208.

    Research output: Contribution to conferencePaper

  416. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  417. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  418. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  419. Reputation Attacks in Mediated and Automated Systems

    Rabaiotti, JR., Chivers, H. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  420. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  421. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  422. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  423. Requirements for Performing Safety Analysis on Operating Systems

    Conmy, P. M. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  424. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  425. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  426. Research methods for HCI

    Cox, A. L., Cairns, P. A., Thimbleby, H. W. & Webb, N., 2008, p. 221-222.

    Research output: Contribution to conferencePaper

  427. Reservoir Computing in materio with LEDs

    Dale, M. N., Miller, J. F., Stepney, S. & Trefzer, M. A., 2017.

    Research output: Contribution to conferencePaper

  428. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaper

  429. Resource sharing in RTSJ and SCJ systems

    Wellings, A., Lin, S. & Burns, A., Oct 2011.

    Research output: Contribution to conferencePaper

  430. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaper

  431. Response Time Analysis of Synchronous Data Flow Programs on a Many-Core Processor

    Rihani, H., Moy, M., Maiza, C., Davis, R. I. & Altmeyer, S., Oct 2016.

    Research output: Contribution to conferencePaper

  432. Restoring broken entanglement by separable correlations

    Spedalieri, G. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  433. Retrenching the Purse: Finite Exception Logs, and Validating the Small

    Banach, R., Poppleton, M. & Stepney, S., 2006, p. 234-248.

    Research output: Contribution to conferencePaper

  434. Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2006, p. 82-90.

    Research output: Contribution to conferencePaper

  435. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  436. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  437. Reviewing and Evaluating Automatic Term Recognition Techniques

    Korkontzelos, I., Klapaftis, I. P. & Manandhar, S., 2008, p. 248-259.

    Research output: Contribution to conferencePaper

  438. Rewriting History to Exploit Gain Time

    Bernat, G., Broster, I. & Burns, A., 2004, p. 328-335.

    Research output: Contribution to conferencePaper

  439. Robust Computation of the Polarisation Image

    Saman, G. & Hancock, E. R., 2010, p. 971-974.

    Research output: Contribution to conferencePaper

  440. Robust Diffusion of Structural Flows for Volumetric Image Interpolation

    Doshi, A. & Bors, A. G., Sep 2006, p. 1225-1228. 4 p.

    Research output: Contribution to conferencePaper

  441. Robust Shape from Polarisation and Shading

    Huynh, C. P., Robles-Kelly, A. & Hancock, E. R., 2010, p. 810-813.

    Research output: Contribution to conferencePaper

  442. Robustness Analysis of SARSA(lambda): Different Models of Reward and Initialisation

    Grzes, M. & Kudenko, D., 2008, p. 144-156.

    Research output: Contribution to conferencePaper

  443. Role Identification for Accurate Analysis in Dota 2

    Demediuk, S. P., York, P. J., Block, F. O., Walker, J. A. & Drachen, A., 8 Oct 2019.

    Research output: Contribution to conferencePaper

  444. SAT Encodings of the AT-Most-k Constraint: Some Old, Some New, Some Fast, Some Slow

    Frisch, A. M. & Giannaros, P. A., 2010.

    Research output: Contribution to conferencePaper

  445. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  446. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaper

  447. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  448. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  449. Safety Analysis of Software Architectures - "LIghtweight PSSA"

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  450. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  451. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  452. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  453. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  454. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  455. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  456. Safety Tactics for Software Architecture Design

    Wu, W. & Kelly, T., 2004, p. 368-375.

    Research output: Contribution to conferencePaper

  457. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  458. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  459. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  460. Schemas in Directed Emergent Drama

    Arinbjarnar, M. & Kudenko, D., 2008, p. 180-185.

    Research output: Contribution to conferencePaper

  461. Screening the parameters affecting heuristic performance

    Ridge, E. & Kudenko, D., 2007, p. 180.

    Research output: Contribution to conferencePaper

  462. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  463. Searching for Risk in Large Complex Spaces

    Clegg, K. D. & Alexander, R., Apr 2013, p. 753-762 .

    Research output: Contribution to conferencePaper

  464. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  465. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  466. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  467. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  468. Security of two-way quantum cryptography against asymmetric attacks - art. no. 709215

    Pirandola, S., Mancini, S., Lloyd, S. & Braunstein, S. L., 2008, p. 9215.

    Research output: Contribution to conferencePaper

  469. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaper

  470. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  471. Segmentation of Biological Cell Images for Sonification

    Edwards, A. D. N., Hines, G. & Hunt, A., 1 May 2008, p. 128 -132.

    Research output: Contribution to conferencePaper

  472. Segregation with Communication

    Cooper, D. & Stepney, S., 2000, p. 451-470.

    Research output: Contribution to conferencePaper

  473. Self-Similar Convolution Image Distribution Histograms as Invariant Identifiers

    Tuke, C. E., O'Keefe, S. E. M. & Austin, J., 2001, p. 501-510. 10 p.

    Research output: Contribution to conferencePaper

  474. Separating Lambertian and Specular Reflectance Components using Iterated Conditional Modes

    Ragheb, H. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  475. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaper

  476. Sketching sketching: outlines of a collaborative design method

    Craft, B. & Cairns, P. A., 2009, p. 65-72.

    Research output: Contribution to conferencePaper