Search research publications and outputs

  1. 1978
  2. COMFLEX: a high speed packet switch for Inter-Computer Communication

    McDermid, J. A., 1978, IRIA 1978. p. 187-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 1981
  4. Checkpointing and Error Recovery in Distributed Systems

    McDermid, J. A., 1981, Proc. 2nd Int. Conf. on Distributed Computing Systems. p. 271-282 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. The Interaction between Hardware, Software, and Algorithms

    Wood, A. M., Duff, M. J. B. (ed.) & Levialdi, S. (ed.), 1981, Languages and Architectures for Image Processing. Academic Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. 1986
  7. Higher Level Operations using Processor Arrays

    Wood, A. M., Uhr, L. (ed.), Preston~Jr., K. (ed.), Levialdi, S. (ed.) & Duff, M. (ed.), 1986, Evaluation of Multicomputers for Image Processing. academic press, p. 91-105 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Motion Analysis

    Wood, A. M., Duff, M. J. B. (ed.) & Fountain, T. J. (ed.), 1986, Cellular Logic Image Processing. academic press, p. 174-207 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Software for sc \Clip4

    Wood, A. M., Reynolds, D. E., Duff, M. J. B. (ed.) & Fountain, T. J. (ed.), 1986, Cellular Logic Image Processing. academic press, p. 69-94 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. 1987
  11. Assurance

    McDermid, J. A. & Anderson, T. (ed.), 1987, Safe and Secure Computing Systems. Blackwell Scientific, p. 163-188 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. 1988
  13. Intermediate-level Vision, Relations and Processor Arrays: An Application of sc \Clip4 to Image Sequence Analysis

    Wood, A. M. & Page, I. (ed.), 1988, Parallel Architectures and Computer Vision. Oxford University Press, p. 157-170 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Security Models and Enterprise Models

    Dobson, J. E., McDermid, J. A. & Landwehr, C. (ed.), 1988, Database Security II : Status and Prospects. II ed. IFIP - International Federation for Information Processing, p. 1-36 36 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  15. 1989
  16. Assurance in High-Integrity Software

    McDermid, J. A. & Sennett, C. T. (ed.), 1989, High-integrity software. Pitman, p. 226-273 48 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  17. USER MODELING BY CLASSIFICATION - A NEURAL-BASED APPROACH

    Beale, R., Finlay, J., Austin, J. & Harrison, M., 1989, NEW DEVELOPMENTS IN NEURAL COMPUTING. TAYLOR, JG. & MANNION, CLT. (eds.). BRISTOL: ADAM HILGER LTD, p. 103-110 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. 1990
  19. Integrated Project Support Environments: General Principles and Issues in the Development of High Integrity Systems

    McDermid, J. A. & Kitchenham, B. A. (ed.), 1990, Software engineering for large software systems. Elsevier Science, 57 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Integrated Project Support Environments and Software Engineering Toolsets

    McDermid, J. A., Jenkins, D. G. (ed.) & Welland, R. C. (ed.), 1990, Software engineering for electronic systems designers. I E E E, (IEE Computing Series; vol. 18).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Security Policies for Integrated Project Support Environments

    Hocking, E. S., McDermid, J. A., Landwehr, C. E. (ed.) & Spooner, D. (ed.), 1990, Database Security III: Status and Prospects. III ed. Monterey: IFIP/North Holland, p. 41-74 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Specifying Security Properties

    Jacob, J. L. & Hoare, C. A. R. (ed.), 1990, Developments in Concurrency and Communication. Reading, Mass, U. S. A.: http://www.aw.com/Addison Wesley, p. 221-237 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. 1991
  24. ADAPTIVE ESTIMATION OF HYSTERESIS THRESHOLDS

    HANCOCK, E. R. & KITTLER, J., 1991, 1991 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 196-201 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. CADiZ - Computer Aided Design in Z

    Jordan, D. T., McDermid, J. A., Toyn, I. & Nicholls, J. E. (ed.), 1991, Z User Workshop, Oxford 1990. Springer-Verlag, p. 93-104 12 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. LINEARITY AND LAZINESS

    Wakeling, D. & Runciman, C., 1991, FUNCTIONAL PROGRAMMING LANGUAGES AND COMPUTER ARCHITECTURE. HUGHES, J. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 215-240 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Software Development Process Models

    McDermid, J. A., Rook, P. & McDermid, J. A. (ed.), 1991, Software Engineers' Reference Book. Oxford: Butterworth Heinemann

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Using defeasible logic for a window on a probabilistic database: some preliminary notes

    Cussens, J. & Hunter, A., 1991, Symbolic and Quantitative Approaches for Uncertainty. Kruse, R. & Seigel, P. (eds.). Springer, Vol. 548. p. 146-152 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. 1992
  30. A HIERARCHICAL EVIDENCE COMBINING EDGE DETECTOR

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, PROGRESS IN IMAGE ANALYSIS AND PROCESSING II. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 494-501 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. A RELATIONAL PROGRAMMING SYSTEM WITH INFERRED REPRESENTATIONS

    Cattrall, D. & Runciman, C., 1992, PROGRAMMING LANGUAGE IMPLEMENTATION AND LOGIC PROGRAMMING. Bruynooghe, M. & Wirsing, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 475-476 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. MULTIRESOLUTION EDGE LABELING USING HIERARCHICAL-RELAXATION

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, 11TH IAPR INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, PROCEEDINGS, VOL II. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 140-144 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. RELAXATIONAL REFINEMENT OF INTENSITY RIDGES

    HANCOCK, E. R. & KITTLER, J., 1992, 11TH IAPR INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, PROCEEDINGS, VOL III. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 459-463 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. THE STRUCTURE OF PERMISSIONS - A NORMATIVE FRAMEWORK FOR ACCESS RIGHTS

    Morris, P. & McDermid, J., 1992, DATABASE SECURITY, V. Landwehr, CE. & Jajodia, S. (eds.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 77-97 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...79 Next