Search research publications and outputs

  1. 1998
  2. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  3. 1997
  4. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  5. Heap compression and binary I/O in Haskell

    Wallace, M. & Runciman, C., 1 Jun 1997.

    Research output: Contribution to conferencePaper

  6. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  7. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  8. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  9. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  10. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  11. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  12. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  13. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  14. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  15. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  16. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  17. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  18. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  19. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  20. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  21. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  22. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  23. Structurally Gated Pairwise Geometric Histograms for Shape Indexing

    Huet, B. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  24. System Modelling for Concurrent Safety Analysis

    Murdoch, J., McDermid, J. A., Wilkinson, P. & Reid, S., 1997.

    Research output: Contribution to conferencePaper

  25. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  26. The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data

    Austin, J., Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G. & Wilkinson, G., 1997, p. 765-772.

    Research output: Contribution to conferencePaper

  27. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  28. Transferring and Retraining Learned Information Filters

    Cohen, W. W. & Kudenko, D., 1997, p. 583-590.

    Research output: Contribution to conferencePaper

  29. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaper

  30. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaper

  31. 1996
  32. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  33. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  34. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  35. Heap profiling for space efficiency

    Runciman, C., Röjemo, N., Launchbury, J., Meijer, E. & Sheard, T., 1 Aug 1996, p. 159--183.

    Research output: Contribution to conferencePaper

  36. Lag, drag, void and use: heap profiling and space-efficient compilation revisited

    Röjemo, N. & Runciman, C., 1 May 1996, p. 34-41.

    Research output: Contribution to conferencePaper

  37. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  38. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  39. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  40. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  41. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  42. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  43. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  44. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  45. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  46. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  47. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  48. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  49. Technology Transfer by Case Study: an Experience Report

    Whittle, B. R., Vickers, A. J. & McDermid, J. A., 1996, p. 211-218.

    Research output: Contribution to conferencePaper

  50. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  51. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  52. 1995
  53. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  54. Lambdas in the Liftshaft: functional programming and an embedded architecture

    Wallace, M. & Runciman, C., 1 Jun 1995, p. 249--258.

    Research output: Contribution to conferencePaper

  55. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  56. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  57. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  58. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  59. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  60. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  61. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  62. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  63. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  64. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  65. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  66. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  67. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  68. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  69. Implementing Mathematical Morphology in \Isetl-sc \Linda

    Rowstron, A. & Wood, A., 1995, p. 847--851.

    Research output: Contribution to conferencePaper

  70. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  71. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  72. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  73. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  74. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  75. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  76. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  77. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  78. Tactile-based direct manipulation in GUIs for blind users

    Petrie, H., Morley, S. & Weber, G., 1995, p. 428-429.

    Research output: Contribution to conferencePaper

  79. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  80. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  81. The Effect of Intra-Block Scheduling on Stack Processor Behaviour

    Crispin-Bailey, C. & Sotudeh, R., 1995. 6 p.

    Research output: Contribution to conferencePaper

  82. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  83. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  84. 1994
  85. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  86. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  87. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  88. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  89. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  90. HLL Enhancement for Stack Based Processors

    Crispin-Bailey, C. & Sotudeh, R., 1994. 4 p.

    Research output: Contribution to conferencePaper

  91. High Integrity Software Development: Process and Tool Issues

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1994.

    Research output: Contribution to conferencePaper

  92. Literate Formal Development of Ada from Z for Safety Critical Applications

    Jordan, D. T., Locke, C. J., McDermid, J. A., Parker, C., Sharpe, B. A. P. & Toyn, I., 1994.

    Research output: Contribution to conferencePaper

  93. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  94. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  95. Profiling parallel functional computations (without parallel machines)

    Runciman, C., Wakeling, D., O'Donnell, J. T. & Hammond, K., 1994, p. 236--251.

    Research output: Contribution to conferencePaper

  96. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  97. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  98. Safety Critical Systems in Aerospace

    McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  99. Software Quality Assurance Using the SAZ Method

    Polack, F. & Mander, K., 1994, p. 230-249.

    Research output: Contribution to conferencePaper

  100. Teaching Reuse in a Supportive Life-Cycle

    Burd, E. L., McDermid, J. A. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  101. Teaching Reuse through a supportive life-cycle

    Burd, E. L., McDermid, J. A., Whittle, B. R., O'Callaghan, A. & Leigh, M., 1994.

    Research output: Contribution to conferencePaper

  102. The Development of Reusable Engine Control Technology for Application in Future Engines

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  103. The Formal Specification in Z of Defence Standard 00-56

    Woodcock, J., Gardiner, P. H. B. & Hulance, J. R., 1994, p. 9-28.

    Research output: Contribution to conferencePaper

  104. The effects of local variable optimisation in A C-based stack processor environment

    Crispin-Bailey, C., Sotudeh, R. & Ould-Khaoua, M., 1994. 6 p.

    Research output: Contribution to conferencePaper

  105. Tool Support for High Integrity Ada Software

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A., Pierce, R. H., Wand, I. C., Jepson, B. J. & Toussaint, M., 1994, p. 63-75.

    Research output: Contribution to conferencePaper

  106. Towards a Z Method: Axiomatic Specification in Z

    Hall, J. G. & McDermid, J. A., 1994, p. 213-229.

    Research output: Contribution to conferencePaper

  107. Training Blind People in the Use of Graphical User Interfaces

    Weber, G., Petrie, H., Kochanek, D. & Morley, S., 1994, p. 25-31.

    Research output: Contribution to conferencePaper

  108. 1993
  109. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  110. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  111. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  112. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  113. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  114. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  115. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  116. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  117. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  118. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  119. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  120. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  121. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  122. Heap profiling of a lazy functional compiler

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 203--214.

    Research output: Contribution to conferencePaper

  123. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

  124. Investigating and Formalising the Development of HIS Within PSEEs

    Gimenes, I. M. D. S., McDermid, J. A. & Schäfer, W., 1993, p. 90-94.

    Research output: Contribution to conferencePaper

  125. Investigation of Stack Machine Design for Efficient High Level Language Support

    Crispin-Bailey, C. & Sotudeh, R., 1993. 4 p.

    Research output: Contribution to conferencePaper

  126. LZW text compression in Haskell

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 215--226.

    Research output: Contribution to conferencePaper

  127. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  128. Perfect hash functions made parallel - lazy functional programming on a distributed multiprocessor

    Checkland, I. G. & Runciman, C., 1993, p. 397-406.

    Research output: Contribution to conferencePaper

  129. Specification of Real-Time Systems: A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  130. Structural Engineering and Software: Certainty, Uncertainty and Probability

    McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  131. The Formal Analysis of Ada Programs

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1993.

    Research output: Contribution to conferencePaper

  132. The SAZ Project: Integrating SSADM and Z

    Polack, F., Whiston, M. & Mander, K., 1993, p. 541-557.

    Research output: Contribution to conferencePaper

  133. 1992
  134. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  135. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  136. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  137. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  138. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  139. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  140. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  141. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  142. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  143. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  144. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  145. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  146. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  147. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  148. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaper

  149. 1991
  150. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  151. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  152. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  153. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  154. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  155. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  156. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  157. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  158. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  159. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  160. Graph-Reducible Term Rewriting Systems

    Plump, D., 1991, p. 622--636.

    Research output: Contribution to conferencePaper

  161. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  162. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  163. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  164. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  165. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  166. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  167. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  168. TARDIS: An Architectural Framework for Timely and Reliable Distributed Information Systems

    Burns, A., Lister, A. M., McDermid, J. A. & Bailes, P. A., 1991, p. 1-15.

    Research output: Contribution to conferencePaper

  169. TARDIS/Z: A Technique for Formal Specification of High Integrity and Real Time Systems

    Coombes, A. C., Burns, A., McDermid, J. A. & Wichmann, B. A., 1991, p. 1-6.

    Research output: Contribution to conferencePaper

  170. The Refinement Calculus

    Woodcock, J., 1991, p. 80-95.

    Research output: Contribution to conferencePaper

  171. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. E. & Jajodia, S., 1991, p. 77-97.

    Research output: Contribution to conferencePaper

  172. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  173. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  174. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaper

  175. 1990
  176. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  177. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  178. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  179. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  180. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  181. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  182. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  183. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  184. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  185. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  186. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  187. Skills and Technologies for the Development and Evaluation of Safety Critical Applications

    McDermid, J. A. & Daniels, B. K., 1990, p. 163-172.

    Research output: Contribution to conferencePaper

  188. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  189. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  190. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  191. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  192. 1989
  193. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  194. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  195. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  196. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  197. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  198. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  199. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  200. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  201. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  202. 1988
  203. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  204. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  205. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  206. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  207. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  208. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  209. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  210. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  211. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  212. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  213. 1987
  214. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  215. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  216. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  217. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  218. 1985
  219. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  220. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  221. 1983
  222. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  223. 1982
  224. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  225. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  226. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next