Search research publications and outputs

  1. pWCET a Toolset for automatic Worst-Case Execution Time Analysis of Real-Time Embedded Programs

    Bernat, G., Colin, A. & Petters, S. M., 2003.

    Research output: Contribution to conferencePaper

  2. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  3. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  4. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaperpeer-review

  5. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaperpeer-review

  6. Tradeoffs for EEG data reduction on Wearable Device

    Dai, C. & Crispin-Bailey, C., Nov 2012.

    Research output: Contribution to conferencePosterpeer-review

  7. Towards bio-responsive control for music

    Williams, D. A. H., Murphy, D. T. & Fazenda, B., 19 Dec 2017.

    Research output: Contribution to conferencePaperpeer-review

  8. The role of the representational entity in physical computing

    Stepney, S. & Kendon, V., 2019, p. 219–231. 13 p.

    Research output: Contribution to conferencePaperpeer-review

  9. The role of structure and complexity on Reservoir Computing quality

    Dale, M., Dewhirst, J. D., O'Keefe, S. E. M., Sebald, A. A-M., Stepney, S. & Trefzer, M. A., 2019, p. 52–64. 13 p.

    Research output: Contribution to conferencePaperpeer-review

  10. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  11. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaperpeer-review

  12. The Pi-puck extension board: a Raspberry Pi interface for the e-puck robot platform

    Millard, A. G., Joyce, R. A., Hilder, J. A., Fleseriu, C., Newbrook, L., Li, W., McDaid, L. & Halliday, D. M., Sep 2017.

    Research output: Contribution to conferencePaperpeer-review

  13. The Optimisation of Stochastic Grammars to Enable Cost-Effective Probabilistic Structural Testing

    Poulding, S. M., Alexander, R., Clark, J. A. & Hadley, M. J., Jul 2013. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  14. The Moral Responsibility Gap and the Increasing Autonomy of Systems

    Porter, Z. L. M., Habli, I., Monkhouse, H. E. & Bragg, J. E., 18 Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  15. The False Dichotomy between Positive and Negative Affect in Game Play

    Birk, M. V., Iacovides, I., Johnson, D. & Mandryk, R. L., 2015, p. 799-804. 6 p.

    Research output: Contribution to conferenceOtherpeer-review

  16. Supporting Nested Resources in MrsP

    Garrido, J., Zhao, S., Burns, A. & Wellings, A. J., 2017, p. 73-86. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  17. Supporting Critical Modes in AirTight

    Harbin, J. R., Griffin, D. J., Burns, A., Bate, I. J., Davis, R. I. & Soares Indrusiak, L., Dec 2018, p. 7-12. 6 p.

    Research output: Contribution to conferenceOtherpeer-review

  18. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaperpeer-review

  19. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  21. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Revisiting Security Vulnerabilities in Commercial Password Managers

    Carr, M. & Shahandashti, S. F., 14 Sep 2020.

    Research output: Contribution to conferencePaperpeer-review

  23. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  24. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaperpeer-review

Previous 1 2 3 4 Next