Search research publications and outputs

  1. A framework for constraint based local search using ESSENCE

    Akgun, O., Attieh, S. W. A., Gent, I. P., Jefferson, C. A., Miguel, I. J., Nightingale, P. W., Salamon, A. Z., Spracklen, P. & Wetter, J. P., 13 Jul 2018, Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, p. 1242-1248 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. A manifesto for Reality-based Safety Science

    Rae, A., Provan, D., Aboelssaad, H. & Alexander, R., 1 Jun 2020

    Article in Safety science

  3. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaperpeer-review

  4. A neural network for mining large volumes of time series data

    Liang, B. & Austin, J., Dec 2005, IEEE International Conference on Industrial Technology (ICIT) 2005 (14-17 December 2005, City University of Hong Kong). New York: IEEE, Vol. 1-2. p. 688-693 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. A novel binary spell checker

    Hodge, V. J., Austin, J., Dorffner, G. (ed.), Bischof, H. (ed.) & Hornik, K. (ed.), 2001, Artificial neural networks : ICANN 2001 : International Conference, Vienna, Austria, August 21-25, 2001 : proceedings. Berlin, Germany: Springer-Verlag, p. 1199-1204 5 p. (Lecture Notes in Computer Science; vol. 2130).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. A novel entropy-based graph signature from the average mixing matrix

    Bai, L., Rossi, L., Cui, L. & Hancock, E. R., 1 Dec 2016, 2016 23rd International Conference on Pattern Recognition (ICPR). Davis, L., Bimbo, A. D. & Lovell, B. (eds.). Los Alamitos, CA, USA: IEEE Computer Society Press, p. 1339-1344 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  8. A review of literature on parallel constraint solving

    Gent, I. P., McCreesh, C., Miguel, I. J., Moore, N., Nightingale, P. W., Prosser, P. & Unsworth, C., Sep 2018

    Article in Theory and Practice of Logic Programming

  9. A search-based approach to the automated design of security protocols

    Hao, C., Clark, JA. & Jacob, J. L., 2004, YCS-2004-376 ed. Department of Computer Science, University of York. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); vol. YCS , no. YCS-2004-376)

    Research output: Book/ReportOther report

  10. A survey of authentication protocol literature: Version 1.0

    Clark, J. A. & Jacob, J. L., 1997, Citeseer.

    Research output: Book/ReportOther report

  11. A taxonomy of attacks on secure devices

    Rae, A. & Wildman, L., 2003, Proceedings of the Australia Information Warfare and Security Conference 2003. p. 251-264

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...43 Next