Search research publications and outputs

  1. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 30 Nov 2017.

    Research output: Contribution to conferencePaperpeer-review

  2. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaperpeer-review

  3. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  4. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaperpeer-review

  5. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaperpeer-review

  6. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol

    Avizheh, S., Safavi-Naini, R. & Shahandashti, S. F., Dec 2018, p. 369-387. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  7. A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Menon, C. & Alexander, R. D., 1 Nov 2017.

    Research output: Contribution to conferencePaperpeer-review

  8. A Secure Scheme for Group Communication of Wireless IoT Devices

    Alohali, B., Vasilakis, V., Moscholios, I. & Logothetis, M., 27 Sep 2018. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  9. A Systematic Approach for Designing Mutation Operators for MDE languages

    Alhwikem, F. H. M., Paige, R. F., Rose, L. M. & Alexander, R. D., Oct 2016.

    Research output: Contribution to conferencePaperpeer-review

  10. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaperpeer-review

  11. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaperpeer-review

  12. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  13. AI and Automatic Music Generation for Mindfulness

    Williams, D., Hodge, V. J., Gega, L., Murphy, D., Cowling, P. I. & Drachen, A., 17 Mar 2019. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  14. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaperpeer-review

  15. Achieving Performance Balance for Dual-Criticality System Based on ARM TrustZone

    Dong, P., Burns, A., Jiang, Z. & Ding, Y., Jul 2018. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  16. An Investigation into the Use of Mutation Analysis for Automated Program Repair

    Timperley, C. S., Stepney, S. & Le Goues, C., 17 Aug 2017, p. 99-114. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  17. BookLeaf: An Unstructured Hydrodynamics Mini-application

    Truby, D., Wright, S. A., Kevis, R., Maheswaran, S., Herdman, A. & Jarvis, S. A., 10 Sep 2018. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  18. Co-designing the computational model and the computing substrate

    Stepney, S., 2019, p. 5–14. 10 p.

    Research output: Contribution to conferencePaper

  19. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaperpeer-review

  20. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  21. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaperpeer-review

  22. Ethics and the safety of autonomous systems

    Menon, C. & Alexander, R. D., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  23. Evolving Test Environments to Identify Faults in Swarm Robotics Algorithms

    Wei, H., Timmis, J. I. & Alexander, R. D., 6 Jun 2017.

    Research output: Contribution to conferencePaperpeer-review

  24. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaperpeer-review

  25. From Safety Cases to Security Cases

    Alexander, R. D., Hawkins, R. D. & Kelly, T. P., Feb 2017.

    Research output: Contribution to conferencePaper

  26. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  27. Functional grouping analysis of varying reactor types in the Spiky-RBN AChem

    Krastev, M. S., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 247-254.

    Research output: Contribution to conferencePaperpeer-review

  28. Hazard and Risk Analysis of Health Informatics: Fundamental Challenges and New Directions

    Habli, I. & White, S. P., 2018.

    Research output: Contribution to conferencePaper

  29. Human-swarm interaction via e-ink displays

    Millard, A. G., Joyce, R. A. & Gray, I., 31 May 2020.

    Research output: Contribution to conferencePaper

  30. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaperpeer-review

  31. Identifying Perceptual Structures In Trademark Images

    Hodge, V. J., Hollier, G. P., Austin, J. & Eakins, J., 13 Feb 2008, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  32. Improving efficiency of persistent storage access in embedded Linux

    Joyce, R. A. & Audsley, N. C., 17 Nov 2017.

    Research output: Contribution to conferencePaperpeer-review

  33. Incorporating epistemic uncertainty into the safety assurance of socio-technical systems

    Leong, C. W. K., Kelly, T. P. & Alexander, R. D., 29 Apr 2017.

    Research output: Contribution to conferencePaperpeer-review

  34. Intelligent Car Park Routeing for Road Traffic

    Hodge, V. J., Smith, M. & Austin, J., 22 Jun 2009, p. 326-333.

    Research output: Contribution to conferencePaperpeer-review

  35. Investigating the Correctness and Efficiency of MrsP in Fully Partitioned Systems

    Zhao, S. & Wellings, A. J., 17 Nov 2017.

    Research output: Contribution to conferencePaperpeer-review

  36. Latent Distribution Preserving Deep Subspace Clustering

    Zhou, L., Xiao, B., wang, D., Liu, X., Zhou, J. & Hancock, E. R., May 2019, p. 4440-4446. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  37. Machine Learning of Harmonic Relationships which Maximise Source Detection and Discrimination

    Lampert, T. & O'Keefe, S., 1 Oct 2009. 1 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Migrating Mixed Criticality Tasks within a Cyclic Executive Framework

    Burns, A. & Baruah, S., 2017, p. 203-216. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  39. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  40. On (Emergent) Systematic Generalisation and Compositionality in Visual Referential Games with Straight-Through Gumbel-Softmax Estimator

    Denamganai, K. & Walker, J. A., 12 Dec 2020.

    Research output: Contribution to conferencePaperpeer-review

  41. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaperpeer-review

  42. ReferentialGym: A Nomenclature and Framework for Language Emergence & Grounding in (Visual) Referential Games

    Denamganai, K. & Walker, J. A., 12 Dec 2020.

    Research output: Contribution to conferencePaperpeer-review

  43. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  44. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  45. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  46. Revisiting Security Vulnerabilities in Commercial Password Managers

    Carr, M. & Shahandashti, S. F., 14 Sep 2020.

    Research output: Contribution to conferencePaperpeer-review

  47. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  48. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  49. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  50. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaperpeer-review

  51. Supporting Nested Resources in MrsP

    Garrido, J., Zhao, S., Burns, A. & Wellings, A. J., 2017, p. 73-86. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  52. The Moral Responsibility Gap and the Increasing Autonomy of Systems

    Porter, Z. L. M., Habli, I., Monkhouse, H. E. & Bragg, J. E., 18 Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  53. The Optimisation of Stochastic Grammars to Enable Cost-Effective Probabilistic Structural Testing

    Poulding, S. M., Alexander, R., Clark, J. A. & Hadley, M. J., Jul 2013. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  54. The Pi-puck extension board: a Raspberry Pi interface for the e-puck robot platform

    Millard, A. G., Joyce, R. A., Hilder, J. A., Fleseriu, C., Newbrook, L., Li, W., McDaid, L. & Halliday, D. M., Sep 2017.

    Research output: Contribution to conferencePaperpeer-review

  55. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaperpeer-review

  56. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  57. The role of structure and complexity on Reservoir Computing quality

    Dale, M., Dewhirst, J. D., O'Keefe, S. E. M., Sebald, A. A-M., Stepney, S. & Trefzer, M. A., 2019, p. 52–64. 13 p.

    Research output: Contribution to conferencePaperpeer-review

  58. The role of the representational entity in physical computing

    Stepney, S. & Kendon, V., 2019, p. 219–231. 13 p.

    Research output: Contribution to conferencePaperpeer-review

  59. Towards bio-responsive control for music

    Williams, D. A. H., Murphy, D. T. & Fazenda, B., 19 Dec 2017.

    Research output: Contribution to conferencePaperpeer-review

  60. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaperpeer-review

  61. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaperpeer-review

  62. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  63. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  64. pWCET a Toolset for automatic Worst-Case Execution Time Analysis of Real-Time Embedded Programs

    Bernat, G., Colin, A. & Petters, S. M., 2003.

    Research output: Contribution to conferencePaper