Search research publications and outputs

  1. 2011
  2. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  3. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  4. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  5. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  6. F for fake: four studies on how we fall for phish

    Blythe, M., Petrie, H. & Clark, J. A., 2011, p. 3469-3478.

    Research output: Contribution to conferencePaper

  7. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  8. Reflecting on Open-Ended Evolution

    Stepney, S. & Hoverd, T., 2011.

    Research output: Contribution to conferencePaper

  9. Specifying Confidentiality in Circus

    Banks, M. J. & Jacob, J. L., 2011, p. 215-230.

    Research output: Contribution to conferencePaper

  10. User-defined clocks in the real-time specification for Java

    Wellings, A. & Martin Schoeberl, M., 2011.

    Research output: Contribution to conferencePaper

  11. 2010
  12. Model-based design flow for NoC-based MPSoCs

    Ost, L., Indrusiak, L. S., Maatta, S., Mandelli, M., Nurmi, J. & Moraes, F., 1 Dec 2010, p. 750 -753.

    Research output: Contribution to conferencePaper

  13. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  14. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  15. The State of Practice in System Safety Research Evaluation

    Rae, A., Alexander, R. & Nicholson, M., Oct 2010.

    Research output: Contribution to conferencePaper

  16. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  17. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  18. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  19. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  20. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  21. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  22. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  23. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  24. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  25. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...46 Next