White Rose University Consortium logo
University of Leeds logo University of Sheffield logo York University logo

Browse by Academic Unit (A-Z)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0 Altmetric
Group by: Creators Name | Item Type
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Number of items at this level: 245.

A

Abdullah, M.S., Evans, A., Benest, I., Paige, R.F. and Kimble, C. (2004) Modelling knowledge based systems using the executable modelling framework (XMF). In: 2004 Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems. CIS 2004, December 1-3, 2004, Singapore. , 1055- 1060.

Abdullah, M.S., Kimble, C., Benest, I. and Paige, R. (2006) Knowledge-Based Systems: A Re-Evaluation. Journal of Knowledge Management, 10 ( 3). pp. 127-142. ISSN 1367-3270

Akgun, Ozgur, Miguel, Ian, Jefferson, Chris, Frisch, Alan M. and Hnich, Brahim (2011) Extensible Automated Constraint Modelling. In: Proceedings of theTwenty-Fifth AAAI Conference on Artificial Intelligence :. UNSPECIFIED. AAAI Press , San Francisco , pp. 4-11. ISBN 978-1-57735-507-6

Alexander, R., Kazakov, D. and Kelly, T.P. (2006) System of systems hazard analysis using simulation and machine learning. In: Computer Safety, Reliability, and Security. 25th International Conference, SAFECOMP 2006, September 27-29, 2006, Gdansk, Poland. Lecture Notes in Computer Science (4166). Springer , Berlin / Heidelberg , pp. 1-14. ISBN 978-3-540-45762-6

Alonso, E, D'Inverno, M, Kudenko, D, Luck, M and Noble, J (2001) Learning in multi-agent systems. The Knowledge Engineering Review. pp. 277-284. ISSN 1469-8005

Angelopoulos, N. and Cussens, J. (2005) Exploiting informative priors for Bayesian classification and regression trees. In: Pack Kaelbling, L. and Saffiotti, A., (eds.) Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence. IJCAI-05, July 30-August 5, 2005, Edinburgh, Scotland. Professional Book Center , pp. 641-646. ISBN 0938075934

Angelopoulos, N. and Cussens, J. (2005) Tempering for Bayesian C&RT. In: De Raedt, L. and Wrobel, S., (eds.) Proceedings of the 22nd International Conference on Machine Learning. ICML 2005, Aug 7 - 11, 2005, Bonn, Germany. ACM International Conference Proceeding Series (19). , pp. 17-24. ISBN 1-59593-180-5

Arksey, H, Thornton, P and Williams, J (2002) Mapping employment focussed services for disabled people. Research Report. Department for Work and Pensions In-house Report, 93 . Social Research Branch, Department for Work and Pensions , London.

Asplund, K., Ashburner, S., Cargill, K., Hux, M., Lees, K. and Drummond, M. (2003) Health care resouce use and stroke outcome. International Journal of Technology Assessment in Health Care. pp. 267-277. ISSN 0266-4623

Atkinson, G.A. and Hancock, E.R. (2007) Shape estimation using polarization and shading from two views. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29 (11). pp. 2001-2017. ISSN 0162-8828

Audsley, N.C. and Bletsas, K. (2004) Realistic Analysis of Limited Parallel Software / Hardware Implementations. In: Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium. RTAS 04, 25-28 May 2004, Toronto, Canada. , pp. 388-395.

Audsley, N.C. and Ward, M. (2006) Syntax-driven implementation of software programming language control constructs and expressions on FPGAs. In: Proceedings of the 2006 International Conference on Compilers, Architecture and Synthesis for Embedded Systems. CASES 2006, October 22 - 25, 2006, Seoul, Korea. , 253 - 260.

Austin, J (1996) Distributed associative memories for high-speed symbolic reasoning. Fuzzy Sets and Systems. pp. 223-233. ISSN 0165-0114

Austin, J and Filer, R (1996) Using correlation matrix memories for inferencing in expert systems. In: Taylor, JG, (ed.) NEURAL NETWORKS AND THEIR APPLICATIONS. John Wiley & Sons , CHICHESTER , pp. 229-244. ISBN 0-471-96282-1

Austin, J, Turner, A, Turner, M and Lees, K (1999) Chemical structure matching using correlation matrix memories. In: NINTH INTERNATIONAL CONFERENCE ON ARTIFICIAL NEURAL NETWORKS (ICANN99), VOLS 1 AND 2 :. 9th International Conference on Artificial Neural Networks (ICANN99), 1999-09-07 - 1999-09-10, EDINBURGH. IEEE , EDISON , pp. 619-624. ISBN 0-85296-721-7

Azzeh, Mohammad, Neagu, Daniel and Cowling, Peter I. (2010) Fuzzy grey relational analysis for software effort estimation. Empirical Software Engineering. pp. 60-90. ISSN 1382-3256

B

Baez-Monroy, V. and O'Keefe, S. (2006) The identification and extraction of itemset support defined by the weight matrix of a Self-Organising Map. In: International Joint Conference on Neural Networks, 2006. IJCNN '06. IJCNN 2006, July 16-21, 2006, Vancouver, BC, Canada. , pp. 6550-6557. ISBN 0-7803-9490-9

Baez-Monroy, V.O. and O’Keefe, S. (2005) Principles of employing a self-organizing map as a frequent itemset miner. In: Artificial Neural Networks: Biological Inspirations. Porceedings of ICANN 2005. ICANN 2005: 15th International Conference, September 11-15, 2005, Warsaw, Poland. Lecture Notes in Computer Science, Part I (3696). Springer-verlag , Berlin / Heidelberg , pp. 363-370. ISBN 978-3-540-28752-0

Bai, Lu, Ren, Peng, Escolano, Francisco and Hancock, Edwin R. (2014) Depth-Based Complexity Traces of Hypergraphs from Directed Line Graphs. In: Proceedings of the 22nd International Conference on Pattern Recognition :. 22nd International Conference on Pattern Recognition, 2014-08-24 - 2014-08-28, Stockholm. IEEE Computer Society Press .

Bai, Lu, Rossi, Luca, Torsello, Andrea and Hancock, Edwin R. (2014) A quantum Jensen-Shannon graph kernel for unattributed graphs. Pattern Recognition. ISSN 0031-3203 (In Press)

Bailey, C. (2004) A proposed mechanism for super-pipelined instruction-issue for ILP stack. In: Proceedings of Euromicro Symposium on Digital Systems. DSD 2004, 31 Aug.-3 Sept. 2004, Rennes. , pp. 121-129. ISBN 0-7695-2203-3

Barber, H. and Kudenko, D. (2009) Generation of Adaptive Dilemma-Based Interactive Narratives. Computational Intelligence and AI in Games, IEEE Transactions on. 309 -326. ISSN 1943-068X

Bartlett, M. and Kazakov, D. (2005) The origins of syntax: from navigation to language. Connection Science, 17 (3&4). pp. 271-288. ISSN 0954-0091

Bartlett, S.D., Sanders, B.C., Braunstein, S.L. and Nemoto, K. (2002) Efficient classical simulation of continuous variable quantum information processes. Physical Review Letters, 88 (9). 097904-1. ISSN 0031-9007

Bate, I. and Burns, A. (2003) An Integrated Approach to Scheduling in Safety-Critical Embedded Control Systems. Real-Time Systems, 25 (1). pp. 5-37. ISSN 0922-6443

Bate, I., Conmy, P., Kelly, T. and McDermid, J. (2001) Use of Modern Processors in Safety Critical Applications. The Computer Journal, 44 (6). pp. 531-543. ISSN 0010-4620

Bate, I. and Emberson, P. (2006) Incorporating scenarios and heuristics to improve flexibility in real-time embedded systems. In: Proceedings of the 12th IEEE Real-Time And Embedded Technology And Applications Symposium. RTAS 2006, 04-07 April 2006, San Jose, California , United States. , pp. 221-230. ISBN 0-7695-2516-4

Bate, I. and Kelly, T. (2003) Architectural Considerations in the Certification of Modular Systems. Reliability Engineering and System Safety, 81 ( 3). pp. 303-324. ISSN 0951-8320

Bate, I., McDermid, J. and Nightingale, P.W. (2003) Establishing timing requirements for control loops in real-time systems. Microprocessors and Microsystems, 27 (4). pp. 159-169. ISSN 0141-9331

Bernat, G. (2003) Response time analysis of asynchronous real-time systems. Real-Time Systems, 25 (2-3). pp. 131-156. ISSN 0922-6443

Bernat, G., Burns, A. and Liamosi, A. (2001) Weakly hard real-time systems. IEEE Transactions on Computers, 50 (4). pp. 308-321. ISSN 0018-9340

Bernat, G. and Cayssials, R. (2001) Guaranteed on-line weakly-hard real-time systems. In: Proceedings of the 22nd IEEE Real-Time Systems Symposium. RTSS 2001, 3-6 Dec. 2001, London, UK. , pp. 25-35.

Bernat, G., Colin, A. and Petters, S.M. (2002) WCET analysis of probabilistic hard real-time systems. In: 23rd IEEE Real-Time Systems Symposium. RTSS 2002, December 3-5, 2002, Austin, TX. (USA). IEEE , pp. 279-288.

Bletsas, K. and Audsley, N. (2006) Optimal priority assignment in the presence of blocking. Information Processing Letters, 99 ( 3). pp. 83-86. ISSN 0020-0190

Blythe, M.A., Monk, A.F. and Doughty, K. (2005) Socially dependable design: The challenge of ageing populations for HCI. Interacting With Computers, 17 (6). pp. 672-689. ISSN 0953-5438

Borba, P., Sampaio, A., Cavalcanti, A. and Cornelio, M. (2004) Algebraic reasoning for object-oriented programming. Science of Computer Programming, 52 (1-3). pp. 53-100. ISSN 0167-6423

Borgo, Rita, Duke, David, Wallace, Malcolm and Runciman, Colin (2006) Multi-cultural visualization : how functional programming can enrich visualization (and vice versa). In: Vision, Modeling, and Visualization 2006 : Proceedings, November 22 - 24, 2006. AKA Verlag - IOS Press , pp. 245-252. ISBN 1-58603-688-2

Bors, A.G. (2006) Watermarking mesh based representations of 3-D objects using local moments. IEEE Transactions on Image Processing, 15 (3). pp. 687-701. ISSN 0162-8828

Bors, A G, Hancock, E R and Wilson, R C (2003) Terrain analysis using radar shape-from-shading. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 974-992. ISSN 0162-8828

Bors, A G and Pitas, I (1999) Object classification in 3-D images using alpha-trimmed mean radial basis function network. IEEE Transactions on Image Processing. pp. 1744-1756. ISSN 1057-7149

Bors, A G and Pitas, I (2000) Prediction and Tracking of Moving Objects in Image Sequences. IEEE Transactions on Image Processing. pp. 1441-1445. ISSN 1057-7149

Bors, A.G., Kechagias, L. and Pitas, I. (2002) Binary morphological shape-based interpolation applied to 3-D tooth reconstruction. IEEE Transactions on Medical Imaging. pp. 100-108. ISSN 0278-0062

Botincan, Matko, Dodds, Michael David and Jagannathan, Suresh (2012) Resource-sensitive synchronization inference by abduction. In: POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages :. UNSPECIFIED. ACM , New York , pp. 309-322. ISBN 978-1-4503-1083-3

Braunstein, S.L., Cerf, N.J., Iblisdir, S., van Loock, P. and Massar, S. (2001) Optimal cloning of coherent states with a linear amplifier and beam splitters. Physical Review Letters, 86 (21). pp. 4938-4941. ISSN 0031-9007

Braunstein, Sam and Pirandola, Stefano (2012) Side-Channel-Free Quantum Key Distribution. Physical Review Letters. 130502. ISSN 1079-7114

Braunstein, Sam, Pirandola, Stefano and Zyczkowski, Karol (2013) Better late than never : Information retrieval from black holes. Physical Review Letters. 101301. ISSN 1079-7114

Brooke, P.J., Paige, R.F. and Jacob, J.L. (2007) A CSP Model of Eiffel's SCOOP. Formal Aspects of Computing, 19 (4). pp. 487-512. ISSN 0934-5043

Broster, I. and Burns, A. (2003) An Analysable Bus-Guardian for Event-Triggered Communication. In: Proceedings of the 24th IEEE Real-Time Systems Symposium. RTSS’03, December 3-5, 2003, Cancun, Mexico. , pp. 410-419. ISBN 0-7695-2044-8/03

Brown, I.D.K., Stepney, S., Sudbery, A. and Braunstein, S.L. (2005) Searching for highly entangled multi-qubit states. Journal of Physics A: Mathematical and General, 38 (5). pp. 1119-1131. ISSN 03054470

Burles, Nathan John, Austin, Jim and O'Keefe, Simon (2013) Extending the Associative Rule Chaining Architecture for Multiple Arity Rules. In: Proceedings of the Ninth International Workshop on Neural-Symbolic Learning and Reasoning :. Ninth International Workshop on Neural-Symbolic Learning and Reasoning, 2013-08-05 - 2013-08-05, Beijing. , pp. 47-51.

Burles, Nathan John, O'Keefe, Simon and Austin, Jim (2013) Improving the associative rule chaining architecture. In: Mladenov, V, Palm, G, Appollini, B, Koprinkova-Hristova, P, Villa, A and Kasabov, N, (eds.) Artificial Neural Networks and Machine Learning - ICANN 2013. Lecture Notes in Computer Science . Springer-Verlag , Berlin , pp. 98-105. ISBN 978-3-642-40728-4

Burles, Nathan John, O'Keefe, Simon, Austin, Jim and Hobson, Stephen John (2013) ENAMeL : a language for binary correlation matrix memories : reducing the memory constraints of matrix memories. Neural Processing Letters. pp. 1-23. ISSN 1573-773X

Burns, A. and Lin, T. -M. (2006) An engineering process for the verification of real-time systems. Formal Aspects of Computing, 19 (1). pp. 111-136. ISSN 0934-5043

Burns, A. and Wellings, A.J. (2006) Programming Execution-Time Servers in Ada 2005. In: Proceedings of the 27th IEEE Real-Time Systems Symposium. RTSS '06, December 5-8, 2006, Rio de Janeiro, Brazil. IEEE , 47 - 56.

Burns, A. and Hayes, I.J. (2010) A timeband framework for modelling real-time systems. Real-Time Systems. pp. 106-142. ISSN 1573-1383

Burns, A. and Zhang, S. (1995) An optimal synchronous bandwidth allocation scheme for guaranteeing synchronous message deadlines with the timed-token MAC protocol. IEEE/ACM Transactions on Networking. pp. 729-741. ISSN 1063-6692

Butterfield, A. and Woodcock, J. (2005) prialt in Handel-C: an operational semantics. International Journal on Software Tools for Technology Transfer, 7 (3). pp. 248-267. ISSN 1433-2779

C

Cairns, P. and Gow, J. (2007) Integrating searching and authoring in Mizar. Journal of Automated Reasoning, 39 (2). pp. 141-160. ISSN 0168-7433

Cairns, P., Gow, J. and Collins, P. (2003) On dynamically presenting a topology course. Annals of Mathematics and Artificial Intelligence, 38 (1-3). pp. 91-104. ISSN 1012-2443

Calinescu, Radu, Ghezzi, Carlo, Kwiatkowska, Marta and Mirandola, Raffaela (2012) Self-adaptive software needs quantitative verification at runtime. Communications of the ACM. pp. 69-77. ISSN 0001-0782

Carcassoni, M and Hancock, E R (2003) Correspondence matching with modal clusters. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1609-1615. ISSN 0162-8828

Castelan, M., Smith, W.A.P. and Hancock, E.R. (2007) A coupled statistical model for face shape recovery from brightness images. IEEE Transactions on Image Processing, 16 ( 4). 1139 - 1151. ISSN 1057-7149

Cavalcanti, A. and Naumann, D.A. (2002) Forward simulation for data refinement of classes. In: FME 2002: Formal Methods - Getting IT Right. International Symposium of Formal Methods Europe, July 22–24, 2002, Copenhagen, Denmark. Lecture Notes In Computer Science (2391). Springer , Berlin / Heidelberg , pp. 133-140. ISBN 978-3-540-43928-8

Cavalcanti, A., Sampaio, A. and Woodcock, J. (2003) A refinement strategy for circus. Formal Aspects of Computing, 15 (2-3). pp. 146-181. ISSN 0934-5043

Cavalcanti, A., Sampaio, A. and Woodcock, J. (2005) Unifying classes and processes. International Journal on Software & Systems Modelling, 4 (3). pp. 277-296. ISSN 1619-1366

Cavalcanti, A., Woodcock, J. and Dunne, S. (2006) Angelic Nondeterminism in the Unifying Theories of Programming. Formal Aspects of Computing, 18 (3). pp. 288-307. ISSN 0934-5043

Challis, B.P. and Edwards, A.D.N. (2001) Design principles for tactile interaction. In: Brewster, S. and Murray-Smith, R., (eds.) Haptic Human-Computer Interaction. First International Workshop on Haptic Human-Computer Interaction, August 31 – September 1, 2000, Glasgow, UK. Lecture Notes in Computer Science (2058). Springer-verlag , pp. 17-24. ISBN 978-3-540-42356-0

Chang, Y. and Wellings, A. (2006) Hard Real-Time Hybrid Garbage Collection with Low memory Requirements. In: Proceedings of the 27th IEEE Real-Time Systems Symposium. RTSS'06. IEEE , pp. 77-86.

Chatzis, V., Bors, A.G. and Pitas, I. (1999) Multimodal decision-level fusion for person authentication. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans. pp. 674-680. ISSN 1083-4427

Chen, Z., Pears, N. and Liang, B. (2006) Monocular Obstacle Detection using Reciprocal-polar Rectification. Image and Vision Computing, 24 (12). pp. 1301-1312. ISSN 0262-8856

Chen, Z., Wu, C., Liu, Y. and Pears, N. (2004) 3D Euclidean Reconstruction of Buildings from Uncalibrated Image Sequences. International Journal of Shape Modelling, 10 (1). pp. 115-131. ISSN 0218-6543

Chen, Xianfu, Zhao, Zhifeng, Jiang, Tao, Grace, David and Zhang, Honggang (2009) Inter-Cluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding. Eurasip journal on advances in signal processing. 141097. -. ISSN 1687-6172

Chivers, H. and McDermid, J. (2005) Refactoring service-based systems: how to avoid trusting a workflow service,. Concurrency and Computation: Practice and Experience - Special Issue: Workflow in Grid Systems, 18 (10). 1255 - 1275. ISSN 1532-0626

Chivers, Howard Robert, Clark, John Andrew, Nobles, Philip, Rabaiotti, JR and Chen, H (2010) Knowing Who to Watch : Efficiently Identifying Subtle Attackers. Information Systems Frontiers. pp. 17-34. ISSN 1387-3326

Chivers, Howard Robert and Hargreaves, C (2011) Forensic Data Recovery From The Windows Search Database. Digital Investigation. pp. 114-126. ISSN 1742-2876

Chivers, Howard Robert and Paige, Richard F. (2009) XRound : A reversible template language and its application in model-based security analysis. Information and Software Technology. pp. 876-893.

Choi, Byung-Soo and Braunstein, Sam (2010) Quantum algorithm for the asymmetric weight decision problem and its generalization to multiple weights. Quantum Information Processing. pp. 177-188. ISSN 1573-1332

Ciardo, G., Lüttgen, G. and Miner, A.S. (2007) Exploiting interleaving semantics in symbolic state-space generation. Formal Methods in System Design, 31 (1). pp. 63-100. ISSN 0925-9856

Clark, J.A. and Jacob, J.L. (2002) Fault injection and a timing channel on an analysis technique. In: Advances in Cryptology: International Conference on the Theory and Applications of Cryptographic Techniques. EUROCRYPT 2002, April 28 – May 2, 2002, Amsterdam, The Netherlands. Lecture Notes in Computer Science (2332). Springer-verlag , Berlin / Heidelberg , pp. 181-196. ISBN 978-3-540-43553-2

Clark, J.A., Jacob, J.L., Maitra, S. and Stănică, P. (2004) Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. Computational Intelligence, 20 (3). pp. 450-462. ISSN 0824-7935

Clark, J.A., Jacob, J.L. and Stepney, S. (2003) Secret Agents Leave Big Footprints: How to plant a cryptographic trapdoor, and why you might not get away with it. In: Proceedings of the Genetic and Evolutionary Computation Conference 2003. GECCO 2003, July 12–16, 2003, Chicago, IL, USA. Lecture Notes in Computer Science, II (2724). Springer , Berlin / Heidelberg , pp. 2022-2033. ISBN 978-3-540-40603-7

Clark, J.A., Jacob, J.L. and Stepney, S. (2004) The Design of S-Boxes by Simulated Annealing. New Generation Computing, 23 (23). pp. 219-232. ISSN 0288-3635

Clark, J.A., Jacob, J.L., Stepney, S., Maitra, S. and Millan, W. (2002) Evolving boolean functions satisfying multiple criteria. In: Menezes, A. and Sarkar, P., (eds.) Progress in Cryptology - INDOCRYPT 2002. Proceedings. Third International Conference on Cryptology in India, December 16-18, 2002, Hyderabad, India. Lecture Notes in Computer Science (2551). Springer , Berlin / Heidelberg , pp. 246-259. ISBN 978-3-540-00263-5

Clark, JA (2002) Metaheuristic Search as a Cryptological Tool. PhD thesis, UNSPECIFIED.

Clark, John Andrew and Jacob, Jeremy Lawrence (1997) A survey of authentication protocol literature: Version 1.0. Report. Citeseer

Cowling, P.L., Ward, C.D. and Powley, E.J. (2012) Ensemble Determinization in Monte Carlo Tree Search for the Imperfect Information Card Game Magic: The Gathering. Computational Intelligence and AI in Games, IEEE Transactions on. 6218176. ISSN 1943-068X

Cowling, Peter I., Powley, Edward J. and Whitehouse, Daniel (2012) Information Set Monte Carlo Tree Search. Computational Intelligence and AI in Games, IEEE Transactions on. 6203567. pp. 120-143. ISSN 1943-068X

Cross, A.D.J. and Hancock, E.R. (1998) Graph matching with a dual-step EM algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1236-1253. ISSN 0162-8828

Cussens, J. (2001) Parameter estimation in stochastic logic programs. Machine Learning, 44 (3). pp. 245-271. ISSN 0885-6125

Cussens, James (2008) Bayesian network learning by compiling to weighted MAX-SAT. In: McAllester, David and Myllymaki, Petri, (eds.) Proceedings of the 24th Conference on Uncertainty in Artificial Intelligence (UAI 2008) :. 24th Conference on Uncertainty in Artificial Intelligence, 2008-07-09 - 2008-07-12, Helsinki. AUAI Press , Corvallis, Oregon , pp. 105-112. ISBN 0-9749039-4-9

Cussens, James (2011) Bayesian network learning with cutting planes. In: Cozman, Fabio and Pfeffer, Avi, (eds.) Proceedings of the 27th Conference on Uncertainty in Artificial Intelligence (UAI 2011) :. 27th Conference on Uncertainty in Artificial Intelligence, 2011-07-14 - 2011-07-17, Barcelona. AUAI Press , Corvallis, Oregon , pp. 153-160. ISBN 978-0-9749039-7-2

Cutello, V., Nicosia, G., Pavone, M. and Timmis, J. (2007) An Immune Algorithm for Protein Structure Prediction on Lattice Models. IEEE Transactions on Evolutionary Computation, 11 (1). 101 - 117. ISSN 1089-778X

D

Davis, R.I. and Burns, A. (2005) Hierarchical fixed priority pre-emptive scheduling. In: 26th IEEE International Real-Time Systems Symposium. RTSS'05, December 5-8, 2005, Miami, Florida, USA. IEEE , pp. 389-398. ISBN 0-7695-2490-7

Davis, R.I. and Burns, A. (2006) Resource sharing in hierarchical fixed priority pre-emptive systems. In: 27th IEEE Real-Time Systems Symposium. 27th IEEE International Real-Time Systems Symposium, DEC 05-08, 2006, Rio de Janeiro, BRAZIL. IEEE , pp. 257-267. ISBN 0-7695-2761-2

Davis, R.I. and Burns, A. (2007) Robust priority assignment for fixed priority real-time systems. In: Proceedings of the 28th IEEE Real-Time Systems Symposium. RTSS 2007, December 03 - 06, 2007, Tucson, Arizona, USA. , pp. 3-14. ISBN 0-7695-3062-1

Davis, R.I., Burns, A., Bril, R.J. and Lukkien, J.J. (2007) Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised. Real-Time Systems, 35 (3). pp. 239-272. ISSN 1573-1383

De Boni, M. and Manandhar, S. (2005) Implementing clarification dialogue in open-domain question answering. Journal of Natural Language Engineering, 11 (14). pp. 343-361. ISSN 1351-3249

Devlin, Sam and Kudenko, Daniel (2011) Theoretical Considerations of Potential-Based Reward Shaping for Multi-Agent Systems. In: The 10th International Conference on Autonomous Agents and Multiagent Systems :. Tenth International Conference on Autonomous Agents and Multi-Agent Systems, 2011-05-02, Taipeh. ACM , pp. 225-232. ISBN 0-9826571-5-3

Devlin, Sam Michael and Kudenko, Daniel (2012) Dynamic Potential-Based Reward Shaping. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems :. 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), 2012-06-04 - 2012-06-08, Valencia. IFAAMAS , pp. 433-440. ISBN 978-0-9817381-3-0

Drewes, F., Hoffmann, B. and Plump, D. (2002) Hierarchical graph transformation. Journal of Computer and System Sciences, 64 (2). pp. 249-283. ISSN 0022-0000

Dutra e Silva Junior, Elvio Carlos, Soares Indrusiak, Leandro, Finamore, W.A. and Glesner, Manfred (2012) A Programmable look-up table-based interpolator with nonuniform sampling scheme. International Journal of Reconfigurable Computing. 647805. ISSN 1687-7209

de Castro, L.N. and Timmis, J.I. (2003) Artificial immune systems as a novel soft computing paradigm. Soft Computing - A Fusion of Foundations, Methodologies and Applications, 7 (8). pp. 526-544. ISSN 1432-7643

de Lemos, R., Timmis, J., Ayara, M. and Forrest, S. (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics Part C, 37 ( 5). pp. 873-886. ISSN 1094-6977

dos Santos, O.M. and Wellings, A. (2005) Cost Monitoring and Enforcement in the Real-Time Specification for Java- a formal evaluation. In: Proceedings of the 26th IEEE Real-time Systems Symposium. Real-Time Systems Symposium, 8 DEC 2005, Miami, Florida. IEEE , pp. 177-186. ISBN 0-7695-2490-7

E

Edwards, A.D.N., McCartney, H. and Fogarolo, F. (2006) Lambda: A multimodal approach to making mathematics accessible to blind students. In: Proceedings of the 8th International ACM Special Interest Group on Accessible Computing 2006. ACM SIGACCESS, October 23 - 25, 2006, Portland, Oregon, USA. ACM , pp. 48-54. ISBN 1-59593-290-9

Edwards, A.D.N. and Newell, C. (2004) Lively voice: a new model for speaking synthetic characters. Sprache und Datenverarbeitung: International Journal for Language Data Processing, 28 (2). pp. 133-151. ISSN 0343-5205

F

Flener, P., Frisch, A.M., Hnich, B., Kiziltan, Z., Miguel, I., Pearson, J. and Walsh, T. (2002) Breaking row and column symmetries in matrix models. In: Proceedings of the 8th International Conference on Principles and Practice of Constraint Programmin. Principles and Practice of Constraint Programming - (CP 2002), 9 - 13 September 2002, Ithaca, New York, USA. Lecture Notes in Computer Science (2470). Springer , Berlin / Heidelberg , pp. 462-477. ISBN 978-3-540-44120-5

Fletcher, Martyn, Jackson, Tom, Jessop, Mark, Liang, Bojian and Austin, Jim (2006) The Signal Data Explorer: A high performance Grid based signal search tool for use in distributed diagnostic applications. In: Turner, SJ, Lee, BS and Cai, W, (eds.) Sixth IEEE International Symposium on Cluster Computing and the Grid. IEEE COMPUTER SOC , LOS ALAMITOS , pp. 217-224. ISBN 0-7695-2585-7

Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. and Walsh, T. (2006) Propagation algorithms for lexicographic ordering constraints. Artificial Intelligence, 170 (10). 803 - 834. ISSN 0004-3702

Frisch, A.M., Jefferson, C., Martinez Hernandez, B. and Miguel, I. (2005) The Rules of Constraint Modelling. In: Proceedings of the 19th International Joint Conference on Artificial Intelligence. IJCAI-05, 30 JULY - 5 AUGUST 2005, Edinburgh, Scotland. , pp. 109-116.

Frisch, A.M., Peugniez, T.J., Doggett, A.J. and Nightingale, P.W. (2005) Solving Non-Boolean Satisfiability Problems with Stochastic Local Search: A Comparison of Encodings. Journal of Automated Reasoning, 35 ( 1-3). pp. 143-179. ISSN 0168-7433

G

Grzes, Marek and Kudenko, Daniel (2010) Online learning of shaping rewards in reinforcement learning. Neural Networks. pp. 541-550. ISSN 0893-6080

H

Habel, A., Muller, J. and Plump, D. (2001) Double-pushout graph transformation revisited. Mathematical Structures in Computer Science, 11 (5). pp. 637-688. ISSN 0960-1295

Habel, A. and Plump, D. (2001) Computational Completeness of Programming Languages Based on Graph Transformation. In: Honsell, F. and Miculan, M., (eds.) Foundations of Software Science and Computation Structures : 4th International Conference, FOSSACS 2001: Proceedings. Held as Part of the Joint European Conferences on Theory and Practice of Software. ETAPS 2001, April 2-6, 2001, Genova, Italy. Lecture Notes in Computer Science (2030). Springer-verlag , pp. 230-245.

Hancock, E.R. and Atkinson, G.A. (2006) Recovery of surface orientation from diffuse polarization. IEEE Transactions on Image Processing. pp. 1653-1664. ISSN 1057-7149

Hancock, E.R. and Luo, B. (2001) Structural graph matching using the EM algorithm and singular value decomposition. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1120-1136. ISSN 0162-8828

Hancock, E.R. and Torsello, A. (2006) Correcting curvature-density effects in the Hamilton-Jacobi skeleton. IEEE Transactions on Image Processing. pp. 877-891. ISSN 1057-7149

Hancock, E.R. and Wilson, R.C. (2003) A study of pattern recovery in recurrent correlation associative memories. IEEE Transactions on Neural Networks. pp. 506-519. ISSN 1045-9227

Hancock, Edwin, Konno, Norio, Latora, Vito, Machida, Takuya, Nicosia, Vincenzo, Severini, Simone and Wilson, Richard (2013) Co-evolution of networks and quantum dynamics : a generalization of the Barabási-Albert model of preferential attachment. Working Paper. Arxiv (Cornell University)

Hao, C., Clark, J.A. and Jacob, J.L. (2004) Automated design of security protocols. Computational Intelligence, 20 (3). pp. 503-516. ISSN 0824-7935

Hao, C, Clark, JA and Jacob, Jeremy Lawrence (2004) A search-based approach to the automated design of security protocols. Report. York Computer Science Technical Report Series ("Yellow Reports"), York C . Department of Computer Science, University of York

Haywood, N. and Cairns, P. (2007) Engagement with an interactive museum exhibit. In: McEwan, T., Gulliksen, J. and Benyon, D., (eds.) People and Computers XIX — The Bigger Picture. Springer , London , pp. 113-129. ISBN 978-1-84628-249-2

Heseltine, T, Pears, N and Austin, J (2004) Three-dimensional face recognition: An Eigensurface approach. In: ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5. IEEE , NEW YORK , pp. 1421-1424. ISBN 0-7803-8554-3

Hickinbotham, S J, Hancock, E R and Austin, J (1996) Segmenting modulated line textures with S-Gabor filters. In: INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III :. UNSPECIFIED. I E E E, COMPUTER SOC PRESS , NEW YORK , pp. 149-152. ISBN 0-7803-3259-8

Hobson, Stephen John and Austin, Jim (2009) Improved storage capacity in correlation matrix memories storing fixed weight codes. In: Lecture Notes in Computer Science :. UNSPECIFIED. Lecture Notes in Computer Science . Springer , ICANN 2009 , pp. 728-736. ISBN 978-3-642-04273-7

Hodge, V.J., O’Keefe, S. and Austin, J. (2006) A binary neural decision table classifier. Neurocomputing, 69 (16-18). pp. 1850-1859. ISSN 0925-2312

Hodge, V J and Austin, J (2002) Hierarchical word clustering - automatic thesaurus generation. Neurocomputing. pp. 819-846. ISSN 0925-2312

Hodge, V J, Lees, K J and Austin, J L (2004) A high performance k-NN approach using binary neural networks. Neural Networks. pp. 441-458. ISSN 0893-6080

Hodge, V.J. and Austin, J. (2001) Hierarchical growing cell structures: TreeGCS. IEEE Transactions on Knowledge and Data Engineering. pp. 207-218.

Hodge, V.J. and Austin, J. (2005) A binary neural k-nearest neighbour technique. Knowledge and Information Systems. pp. 276-292. ISSN 0219-3116

Hodge, V.J. and Austin, J. (2002) A comparison of a novel neural spell checker and standard spell checking algorithms. Pattern Recognition. pp. 2571-2580. ISSN 0031-3203

Hodge, V.J. and Austin, J. (2003) A comparison of standard spell checking algorithms and a novel binary neural approach. IEEE Transactions on Knowledge and Data Engineering. pp. 1073-1081.

Hodge, V.J. and Austin, J. (2001) An evaluation of standard retrieval algorithms and a binary neural approach. Neural Networks. pp. 287-303. ISSN 0893-6080

Hodge, V.J. and Austin, J. (2001) A novel binary spell checker. In: Dorffner, G., Bischof, H. and Hornik, K., (eds.) Artificial neural networks : ICANN 2001 : International Conference, Vienna, Austria, August 21-25, 2001 : proceedings. Lecture Notes in Computer Science . Springer-verlag , Berlin, Germany , pp. 1199-1204. ISBN 3540424865

Hodge, V.J. and Austin, J. (2004) A survey of outlier detection methodologies. Artificial Intelligence Review. pp. 85-126. ISSN 1573-7462

Hodge, V.J., O'Keefe, S. and Austin, J. (2009) A binary neural shape matcher using Johnson Counters and chain codes. Neurocomputing. pp. 693-703. ISSN 0925-2312

Hodge, Victoria, O'Keefe, Simon and Austin, Jim (2006) A Binary Neural Shape Matcher using Johnson Counters and Chain Codes. In: BICS :. Brain Inspired Cognitive Systems 2006, 2006-10-10 - 2006-10-14, Island of Lesvos. .

Huang, Zhan, Alexander, Rob and Clark, John Andrew (2014) Mutation Testing for Jason Agents. In: Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems :. 13th International Conference on Autonomous Agents and Multiagent Systems, 2014-05-05 - 2014-05-09, Paris. IFAAMAS , Richland, SC . ISBN 978-1-4503-2738-1

Huibin, S., Bailey, C., Farrall, G., Hastie, N. and Jenkins, S. (2005) Combined Simulator Statistics and Block-Code Sampling to Study Performance Enhancement of Microarchitecture. In: Proceedings of IEEE International System-On-Chip Conference 2005. SOC Conference, 2005, 19-23 Sept. 2005, Washington, DC. , 33 - 36. ISBN 0-7803-9264-7

Hutton, S, Williams, J and Kennedy, S (1997) Women's Current Pension Arrangements: Information from the General Household Survey. Research Report. DSS In house report, 22 . Social Research Branch , Department of Social Security, London.

I

Iwu, F., Galloway, A., McDermid, J. and Toyn, I. (2006) Integrating Safety and Formal Analyses using UML and PFS. Reliability Engineering and System Safety, 92 (92). pp. 156-170. ISSN 0951-8320

J

Johnson, Kenneth Harold Anthony, Calinescu, Radu Constantin and Kikuchi, Shinji (2013) An incremental verification framework for component-based software systems. In: CBSE '13 : Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering :. 16th International ACM Sigsoft symposium on Component-based software engineering, 2013-06-17 - 2013-06-21, Vancouver. ACM , New York , pp. 33-42. ISBN 978-1-4503-2122-8

K

Kapetanakis, S. and Kudenko, D. (2002) Reinforcement Learning of Coordination in Cooperative Multi-Agent Systems. In: Dechter, R., Kearns, M. and Sutton, R., (eds.) Proceedings of the 18th National Conference on Artificial Intelligence (AAAI). AAAI-02, July 28 – August 1, 2002, Edmonton, Alberta, Canada. , pp. 326-331. ISBN 978-0-262-51129-2

Kazakov, D and Bartlet, M. (2002) Stochastic Simulation of Inherited Kinship-Driven Altruism. Journal of Artificial Intelligence and Simulation of Behaviour, 1 (2). pp. 183-196. ISSN 1476-3036

Kazakov, D. and Bartlett, M. (2004) Co-operative navigation and the faculty of language. Applied Artificial Intelligence, 18 (9-10). pp. 885-901. ISSN 0883-9514

Kazakov, D. and Manandhar, S. (2001) Unsupervised learning of word segmentation rules with genetic algorithms and inductive logic programming. Machine Learning, 43 (1-2). pp. 121-162. ISSN 0885-6125

Kazakov, Dimitar Lubomirov and Butler, Matthew Richard (2012) Testing Implications of the Adaptive Market Hypothesis via Computational Intelligence. In: Computational Intelligence for Financial Engineering & Economics (CIFEr), 2012 IEEE Conference on :. 2012 IEEE Computational Intelligence for Financial Engineering and Economics (CIFEr 2012), 2012-03-29 - 2012-03-30, New York. IEEE , pp. 1-8. ISBN 978-1-4673-1801-3

Kennedy, J.V., Austin, J., Pack, R. and Cass, B. (1995) C-NNAP - A parallel processing architecture for binary neural networks. In: Proceedings of the IEEE International Conference on Neural Networks (ICNN 95). (University of Western Australia, Perth, Australia, Nov 27-Dec 01, 1995). IEEE , New York , pp. 1037-1041. ISBN 0780327691

Kim, S., Clark, J.A. and McDermid, J.A. (2001) Investigating the Effectiveness of Object-Oriented Testing Strategies with the Mutation Method Sun-Woo Kim, John A. Clark *, John A. McDermid. Software Testing, Verification and Reliability, 11 ( 4). pp. 207-225. ISSN 0960-0833

Kimble, C. and Hildreth, P. (2005) Dualities, Distributed Communities of Practice and Knowledge Management. Journal of Knowledge Management, 9 (4). pp. 102-113. ISSN 13673270

Koike, S., Takahashi, H., Yonezawa, H., Takei, N., Braunstein, S.L., Aoki, T. and Furusawa, A. (2006) Demonstration of quantum telecloning of optical coherent states. Physical Review Letters, 96 (6). 060504. ISSN 0031-9007

Kolovos, D.S., Paige, R.F. and Polack, F.A.C. (2006) Merging Models with the Epsilon Merging Language. In: Model Driven Engineering Languages and Systems. 9th International Conference, MoDELS 2006, October 1-6, 2006, Genova, Italy. Lecture Notes in Computer Science (4199). Springer , Berlin / Heidelberg , pp. 215-229. ISBN 978-3-540-45772-5

Kornbrot, D., Penn, P., Petrie, H., Furner, S. and Hardwick, A. (2007) Roughness perception in haptic virtual reality for sighted and blind people. Perception and Psychophysics, 69 (4). pp. 502-512. ISSN 0031-5117

Kudenko, D., Bauer, M. and Dengler, D. (2003) Group decision making through mediated discussions. In: Brusilovsky, P., Corbett, A. and de Rosis, F., (eds.) User Modeling 2003. Proceedings. 9th International Conference, UM 2003, June 22-26, 2003, Johnstown, PA, USA,. Lecture Notes in Computer Science (2702). Springer , Berlin / Heidelberg , pp. 238-247. ISBN 978-3-540-40381-4

Kurd, Z. and Kelly, T.P. (2005) Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine Control. In: 24th International Conference on Computer Safety, Reliability and Security. SAFECOMP 2005, September 28-30, 2005, Fredrikstad, Norway. Lecture Notes in Computer Science (3688). Springer , Berlin / Heidelberg , pp. 136-150. ISBN 978-3-540-29200-5

Kurd, Z. and Kelly, T.P. (2007) Using fuzzy self-organising maps for safety critical systems. Reliability Engineering and System Safety, 92 (11). pp. 1563-1583. ISSN 0951-8320

Kwon, J., Wellings, A. and King, S. (2005) Ravenscar-Java: a High-integrity Profile for Real-time Java. Concurrency and Computation: Practice and Experience, 17 (5-6). 681 - 713. ISSN 1532-0626

L

Laleau, Regine and Polack, Fiona (2008) Using formal metamodels to check consistency of functional views in information systems specification. Information and Software Technology. pp. 797-814. ISSN 0950-5849

Lampert, Thomas (2010) Spectrogram Track Detection : An Active Contour Algorithm. PhD thesis, UNSPECIFIED.

Lampert, Thomas and O'Keefe, Simon (2008) Active Contour Detection of Linear Patterns in Spectrogram Images. In: 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6 :. 19th International Conference on Pattern Recognition (ICPR 2008), 2008-12-08 - 2008-12-11, Tampa. IEEE , NEW YORK , pp. 3350-3353. ISBN 978-1-4244-2174-9

Lampert, Thomas and O'Keefe, Simon (2009) A Comparison Framework for Spectrogram Track Detection Algorithms. In: Kurzynski, Marek and Wozniak, Michal, (eds.) Computer Recognition Systems :. 6th International Conference on Computer Recognition Systems, 2009-05-25 - 2009-05-28, Jelenia Góra. Advances in Intelligent and Soft Computing . Springer , p. 119. ISBN 9783540939054

Lampert, Thomas and O'Keefe, Simon (2011) A Detailed Investigation into Low-Level Feature Detection in Spectrogram Images. Pattern Recognition. pp. 2076-2092. ISSN 0031-3203

Lampert, Thomas and O'Keefe, Simon (2009) Machine Learning of Harmonic Relationships which Maximise Source Detection and Discrimination. In: Workshop on Machine Intelligence for Autonomous Operations, 2009-10-07 - 2009-10-08, Lerici.

Lampert, Thomas and O'Keefe, Simon (2010) A Survey of Spectrogram Track Detection Algorithms. Applied Acoustics. pp. 87-100.

Lampert, Thomas and O'Keefe, Simon (2010) An active contour algorithm for spectrogram track detection. Pattern Recognition Letters. pp. 1201-1206.

Lampert, Thomas, O'Keefe, Simon and Pears, Nick (2009) Line Detection Methods for Spectrogram Images. In: Kurzynski, Marek and Wozniak, Michal, (eds.) Computer Recognition Systems :. 6th International Conference on Computer Recognition Systems, 2009-05-25 - 2009-05-28, Jelenia Góra. Advances in Intelligent and Soft Computing . Springer , pp. 127-134. ISBN 9783540939054

Lampert, Thomas, Pears, Nick and O'Keefe, Simon (2009) A Multi-Scale Piecewise-Linear Feature Detector for Spectrogram Tracks. In: AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE :. 6th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2009, 2009-09-02 - 2009-09-04, Genova. IEEE , NEW YORK , pp. 330-335. ISBN 978-1-4244-4755-8

Lampert, Thomas Andrew and O'Keefe, Simon (2013) On the detection of tracks in spectrogram images. Pattern Recognition. pp. 1396-1408. ISSN 0031-3203

Liang, B. and Austin, J. (2005) A neural network for mining large volumes of time series data. In: IEEE International Conference on Industrial Technology (ICIT) 2005 (14-17 December 2005, City University of Hong Kong). IEEE , New York , pp. 688-693. ISBN 0-7803-9484-4

Lima, G M D and Burns, A (2003) An optimal fixed-priority assignment algorithm for supporting fault-tolerant hard real-time systems. IEEE Transactions on Computers. pp. 1332-1346. ISSN 0018-9340

Ludtke, N. and Wilson, R.C. (2003) A mixture model for population codes of Gabor filters. IEEE Transactions on Neural Networks, 14 (4). pp. 794-803. ISSN 1045-9227

Luo, B., Wilson, R.C. and Hancock, E.R. (2003) Spectral embedding of graphs. Pattern Recognition, 36 (10). pp. 2213-2230. ISSN 0031-3203

Lüttgen, G. and Mendler, M. (2002) The intuitionism behind statecharts steps. ACM Transactions on Computational Logic, 3 (1). pp. 1-41. ISSN 1529-3785

Lüttgen, G. and Vogler, W. (2004) Bisimulation on speed: Worst-case efficiency. Information and Computation, 191 (2). pp. 105-144. ISSN 0890-5401

M

Maierhofer, M., Bailey, C. and Sotudeh, R. (2001) Affordable scalability: An analysis of modular multimedia server. International Journal of Computers and Applications, 23 (2). pp. 79-89. ISSN 1206-212X

Manandhar, S., Tarim, A. and Walsh, T. (2003) Scenario-based stochastic constraint programming. In: Proceedings of the 18th International Joint Conference in Artificial Intelligence. IJCAI 03, August 9-15, 2003, Acapulco, Mexico. , pp. 257-262.

Manandhar, Suresh Kumar and Can, Burcu (2012) Probabilistic Hierarchical Clustering Of Morphological Paradigms. In: EACL '12 Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics :. European Chapter of the Association for Computational Linguistics (EACL), 2012-04-23 - 2012-11-27, Avignon. Association for Computational Linguistics , Stroudsburg, PA , pp. 654-663. ISBN 978-1-937284-19-0

Massey, P., Clark, J.A. and Stepney, S. (2006) Human-competitive evolution of quantum computing artefacts. Evolutionary Computation, 14 (1). pp. 21-40. ISSN 1063-6560

Matsushita, T. and Runciman, C. (2001) The accepting power of unary string logic programs. Theoretical Computer Science, 266 (1-2). pp. 59-79. ISSN 0304-3975

Menezes, R. and Wood, A. (2006) The Fading Concept in Tuple-Space Systems. In: Proceedings of the 2006 ACM Symposium on Applied Computing. Symposium on Applied Computing: SESSION: Coordination models, languages and applications, April 23 - 27, 2006, Dijon, France. ACM , pp. 440-444. ISBN 1-59593-108-2

Moschitti, A., Quarteroni, S., Basili, R. and Manandhar, S. (2007) Exploiting Syntactic and Shallow Semantic Kernels for Question Answer Classification. In: Proceedings of 45th Annual meeting of the Association for Computational Linguistics. ACL 2007, June 2007, Prague, Czech Republic. , pp. 776-783.

Moss, G E and Runciman, C (2001) Inductive benchmarking for purely functional data structures. Journal of Functional Programming. pp. 525-556. ISSN 1469-7653

Myers, R., Hancock, E.R. and Wilson, R.C. (2000) Bayesian graph edit distance. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 628-635. ISSN 0162-8828

N

Nasios, N. and Bors, A.G. (2006) Kernel-based classification using quantum mechanics. Pattern Recognition, 40 (3). pp. 875-889. ISSN 0031-3203

O

O'Keefe, Simon and Austin, Jim (1995) Image object labelling and classification using an associative memory. In: Fifth International Conference on Image Processing and its Applications :. Fifth International Conference on Image Processing and its Applications, 1995-07-04 - 1995-07-06, Edinburgh. Institution of Electrical Engineers , London , 286 - 290. ISBN 0 85296 642 3

Oliveira, M., Cavalcanti, A. and Woodcock, J. (2004) ArcAngel: a tactic language for refinement. Formal Aspects of Computing, 15 (1). pp. 28-47. ISSN 0934-5043

O’Keefe, S. and Dekhtyarenko, O.K. (2006) SOM-based sparse binary encoding for AURA classifier. In: Proceedings of the 2006 International Joint Conference on Neural Networks. IJCNN '06, July 16-21, 2006, Vancouver, BC, Canada. IEEE , pp. 966-972. ISBN 0-7803-9490-9

P

Paige, R.F. and Ostroff, J.S. (2004) ERC: an Object-Oriented Refinement Calculus for Eiffel. Formal Aspects of Computing, 16 (1). pp. 51-79. ISSN 0934-5043

Paige, Richard F., Brooke, Phillip J. and Ostroff, Jonathan S. (2007) Metamodel-based model conformance and multiview consistency checking. ACM Transactions on Software Engineering and Methodology. 11. B1-B49. ISSN 1049-331X

Pasley, A. and Austin, J. (2004) Distribution Forecasting of High Frequency Time Series. Decision Support Systems, 37 (4). pp. 501-513. ISSN 0167-9236

Pears, N.E. (2001) Mobile robot tracking of pre-planned paths. Advanced Robotics, 15 (1). pp. 97-107. ISSN 0169-1864

Pears, Nick, Heseltine, Tom and Romero, Marcelo (2010) From 3D Point Clouds to Pose-Normalised Depth Maps. International Journal of Computer Vision. pp. 152-176. ISSN 0920-5691

Petrie, H., Hamilton, F., King, N. and Pavan, P. (2006) Remote usability evaluations with disabled people. In: Grinter, R., Rodden, T., Aoki, P., Cutrell, E., Jeffries, R. and Olson, G., (eds.) Proceedings of the Special Interest Group on Computer-Human Interaction 2006 Conference on Human Factors in Computing Systems. CHI2006, April 22 - 27, 2006, Montréal, Québec, Canada. ACM , New York, NY, USA , 1133 - 1141. ISBN 1-59593-372-7

Petrie, H. and Kheir, O. (2007) The relationship between accessibility and usability of websites. In: Proceedings of the Special Interest Group on Computer-Human Interaction 2007 Conference on Human Fac. Human Factors in Computing Systems (SESSION: Empirical studies of web interaction ), 28th April - 3rd May 2007, San Jose, California, USA. , 397 - 406. ISBN 978-1-59593-593-9

Petrie, H.L., Weber, G. and Fisher, W. (2005) Personalisation, interaction and navigation in rich multimedia documents for print-disabled users. IBM Systems Journal, 44 (3). 629 - 635. ISSN 0018-8670

Plump, Detlef and Bak, Chris (2012) Rooted graph programs. In: Krause, Christian and Westfechtel, Bernhard, (eds.) Electronic Communications of the EASST : Proceedings of the 7th International Workshop on Graph Based Tools (GraBaTs 2012). 7th International Workshop on Graph-based Tools (GRABATS 2012), 2012-09-24, Bremen. Technische Universität Berlin , Berlin .

Poledna, S, Burns, A, Wellings, A and Barrett, P (2000) Replica determinism and flexible scheduling in hard real-time dependable systems. IEEE Transactions on Computers. pp. 100-111. ISSN 0018-9340

Poulding, Simon Marcus, Alexander, Rob, Clark, John Andrew and Hadley, Mark Jason (2013) The Optimisation of Stochastic Grammars to Enable Cost-Effective Probabilistic Structural Testing. In: GECCO 2013, 2013-07-06 - 2013-07-10, Amsterdam.

Prasad, D., Burns, A. and Atkins, M. (2003) The valid use of utility in adaptive real-time systems. Real-Time Systems, 25 ( 2-3). pp. 277-296. ISSN 0922-6443

Puech, W, Bors, A G, Pitas, I and Chassery, J M (2001) Projection distortion analysis for flattened image mosaicing from straight uniform generalized cylinders. Pattern Recognition. pp. 1657-1670. ISSN 0031-3203

Q

Qiu, X.P, Yang, D.Z, Zhou, S.M, Chantrell, R.W., O'Grady, K., Du, J., Bai, X.J, Sun, L. and Nowak, U. (2008) Rotation of the pinning direction in the exchange bias training effect in polycrystalline NiFe/FeMn bilayers. Physical Review Letters. 147207. pp. 1-4. ISSN 1079-7114

R

Radjenovic, A. and Paige, R. (2006) Architecture Description Languages for High Integrity Real-Time Systems. IEEE Software, 23 (2). pp. 71-79. ISSN 0740-7459

Rae, Andrew and Wildman, Luke (2003) A taxonomy of attacks on secure devices. In: Proceedings of the Australia Information Warfare and Security Conference 2003 :. Australia Information Warfare and Security Conference., 2003-11-20 - 2003-11-21. , pp. 251-264.

Ramsin, R. and Paige, R.F. (2010) Iterative criteria-based approach to engineering the requirements of software development methodologies. IET SOFTWARE. pp. 91-104. ISSN 1751-8806

Remde, Stephen, Cowling, Peter I., Dahal, Keshav P., Colledge, Nic and Selensky, E. (2012) An empirical study of hyperheuristics for managing very large sets of low level heuristics. Journal of the operational research society. pp. 392-405. ISSN 0160-5682

Ribeiro, E. and Hancock, E.R. (2001) Shape from periodic texture using the eigenvectors of local affine distortion. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1459-1465. ISSN 0162-8828

Ridge, E. and Kudenko, D. (2007) Analyzing heuristic performance with response surface models: prediction, optimization and robustness. In: Proceedings of the 9th Annual Genetic and Evolutionary Computation Conference. GECCO 2007, July 07 - 11, 2007, London, England. , pp. 150-157.

Robles-Kelly, A and Hancock, E R (2005) Graph edit distance from spectral seriation. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 365-378. ISSN 0162-8828

Robles-Kelly, A and Hancock, E R (2004) A graph-spectral approach to shape-from-shading. IEEE Transactions on Image Processing. pp. 912-926. ISSN 1057-7149

Robles-Kelly, Antonio and Hancock, Edwin R. (2007) Shape-from-shading using the heat equation. IEEE Transactions on Image Processing. pp. 7-21. ISSN 1057-7149

Runciman, C. (1997) FUNCTIONAL PEARL : lazy wheel sieves and spirals of primes. Journal of Functional Programming. pp. 219-225. ISSN 1469-7653

S

Samardak, A., Taylor, S., Nogaret, A., Hollier, G., Austin, J., Farrer, I. and Ritchie, D. (2008) Analogue summation of electrical spike trains in semiconductor nerve fibres. Physica E-Low Dimensional Systems and Nanostructures, 40 (6). pp. 2214-2216. ISSN 1386-9477

Santos Costa, V., Page, D. and Cussens, J. (2008) CLP(BN): constraint logic programming for probabilistic knowledge. In: De Raedt, L., Frasconi, P., Kersting, K. and Muggleton, S., (eds.) Probabilistic Inductive Logic Programming: Theory and Applications. Lecture Notes in Computer Science (4911). Springer , Berlin / Heidelberg , pp. 156-188. ISBN 978-3-540-78651-1

Shanker, Sanil, Turner, Aaron, Sherly, Elizabeth and Austin, Jim (2010) Sequential Data Mining using Correlation Matrix Memory. In: Proceedings. ICNIT 2010 International Conference on Networking and Information Technology :. Proceedings. ICNIT 2010 International Conference on Networking and Information Technology, 2010-06-11 - 2010-06-12, Manila. IEEE , pp. 470-472.

Smith, William A. P. and Hancock, Edwin R. (2006) Recovering facial shape using a statistical model of surface normal direction. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1914-1930. ISSN 0162-8828

Srivratanakul, Thitima, Clark, John Andrew and Polack, Fiona (2004) Writing Effective Security Abuse Cases. Report. York Computer Science Technical Report . Department of Computer Science, University of York

Stephenson, Z. and McDermid, J. (2005) Deriving architectural flexibility requirements in safety-critical systems. IEE Proceedings - Software, 152 (14). pp. 143-152. ISSN 1462-5970

Stepney, S., Braunstein, S.L., Clark, J.A., Tyrrell, A., Adamatzky, A., Smith, R.E., Addis, T., Johnson, C., Timmis, J., Welch, P., Milner, R. and Partridge, D. (2005) Journeys in non-classical computation I: A grand challenge for computing research. International Journal on Parallel, Emergent and Distributed Systems, 20 (1). pp. 5-19. ISSN 1744-5760

Stepney, Susan, Clark, John Andrew and Chivers, Howard (2004) Breaking the Model : finalisation and a taxonomy of security attack. Report. York Computer Science Technical Report . Department of Computer Science, University of York

T

Tang, X. and Woodcock, J. (2004) Travelling processes. In: Mathematics of Program Construction, MPC 2004 Proceedings. 7th International Conference, MPC 2004, July 12-14, 2004, Stirling, Scotland, UK. Lecture Notes in Computer Science (3125). Springer , Berlin / Heidelberg , pp. 381-399. ISBN 978-3-540-22380-1

Tarim, S.A., Manandhar, S. and Walsh, T. (2006) Stochastic constraint programming: A scenario based approach. Journal of Constraints, 11 (1). pp. 53-80. ISSN 1383-7133

Thabtah, Fadi A. and Cowling, Peter I. (2008) Mining the data from a hyperheuristic approach using associative classification. Expert Syst. Appl.. pp. 1093-1101. ISSN 0957-4174

Thimbleby , H., Cairns, P. and Jones, M. (2001) Usability Analysis with Markov Models. ACM Transactions on Computer-Human Interaction, 8 (2). pp. 99-132. ISSN 1073-0516

Timmis, J. (2006) Artificial Immune Systems: Today and Tomorrow. Natural Computing, 6 (1). pp. 1-18. ISSN 1567-7818

Ting, I-H., Kimble, C. and Kudenko, D. (2005) A pattern restore method for restoring missing patterns in server side clickstream data. In: Web Technologies Research and Development - APWeb 2005. 7th Asia-Pacific Web Conference, March 29 - April 1, 2005, Shanghai, China. Lecture Notes in Computer Science (3399). Springer , Berlin / Heidelberg , pp. 501-512. ISBN 978-3-540-25207-8

Tracey, N, Clark, John Andrew and Mander, Keith (1998) The way forward for unifying dynamic test-case generation: The optimisation-based approach. Proceedings of the IFIP International Workshop on Dependable Computing and Its Applications (DCIA)..

U

Udzir, N.I., Wood, A.M. and Jaco, J.L. (2007) Coordination with Multicapabilities. Science of Computer Programming, 64 (2). pp. 205-222. ISSN 0167-6423

V

van Loock, P. and Braunstein, S.L. (2001) Telecloning of continuous quantum variables. Physical Review Letters, 87 (24). pp. 247901-1. ISSN 0031-9007

W

Walker, T., Kudenko, D. and Strens, M.J.A. (2004) Algorithms for distributed exploration. In: López de Mántaras, R. and Saitta, L., (eds.) Proceedings of the Sixteenth European Conference on Artificial Intelligence. ECAI'2004, August 22-27, 2004, Valencia, Spain. IOS Press , pp. 84-88. ISBN 1-58603-452-9

Walllace, Malcolm, Rita, Borgo, Colin, Runciman and Duke, David (2006) Fine-grained visualization pipelines and lazy functional languages. IEEE Transactions on Visualization and Computer Graphics. pp. 973-980. ISSN 1077-2626

Weeks, M., Hodge, V., O'Keefe, S., Austin, J. and Lees, K. (2003) Improved AURA k-Nearest Neighbour approach. In: Mira, J and Alvarez, JR, (eds.) ARTIFICIAL NEURAL NETS PROBLEM SOLVING METHODS, PT II :. 7th International Work Conference on Artificial and Natural Neural Networks, 2003-06-03 - 2003-06-06, MENORCA. Lecture Notes in Computer Science . SPRINGER-VERLAG BERLIN , BERLIN , pp. 663-670. ISBN 3-540-40211-X

Wellings, A and Burns, A (1997) Implementing atomic actions in Ada 95. IEEE Transactions on Software Engineering. pp. 107-123. ISSN 0098-5589

White, I D, Godby, R W, Rieger, M M and Needs, R J (1998) Dynamic image potential at an Al(111) surface. Physical Review Letters. pp. 4265-4268. ISSN 1079-7114

Whitham, J. and Audsley, N.C. (2006) MCGREP - A Predictable Architecture for Embedded Real-Time Systems. In: Proceedings of the 27th IEEE International Real-Time Systems Symposium. RTSS 06, December 05 - 08, 2006, Rio de Janeiro, Brazil. IEEE , 13 - 24. ISBN 0-7695-2761-2

Wilkinson, A. and Wood, A. (2005) Isomorphic Types for Open Coordination Systems. In: Zheng, Z.Q., (ed.) Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems. PDCS 2005, November 14 – 16, 2005, Phoenix, AZ, USA. ACTA Press , pp. 404-408.

Wilson, R C and Hancock, E R (1997) Structural matching by discrete relaxation. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 634-648. ISSN 0162-8828

Wilson, R C, Hancock, E R and Luo, B (2005) Pattern vectors from algebraic graph theory. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1112-1124. ISSN 0162-8828

Wilson, Richard Charles, Hancock, Edwin R, Pekalska, Elzbieta and Duin, Robert P. W. (2014) Spherical and hyperbolic embeddings of data. IEEE Transactions on Pattern Analysis and Machine Intelligence. ISSN 0162-8828 (In Press)

Worthington, P L and Hancock, E R (1999) New constraints on data-closeness and needle map consistency for shape-from-shading. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 1250-1267. ISSN 0162-8828

Worthington, P L and Hancock, E R (2001) Object recognition using shape-from-shading. IEEE Transactions on Pattern Analysis and Machine Intelligence. pp. 535-542. ISSN 0162-8828

Wright, Joss, Stepney, S, Clark, John Andrew and Jacob, Jeremy Lawrence (2005) Formalizing anonymity : A review. Report. York Computer Science Technical Report Series, YCS . Department of Computer Science, University of York

X

Xu, Weiping, Hancock, Edwin R and Wilson, Richard Charles (2014) Ricci flow embedding for rectifying non-Euclidean dissimilarity data. Pattern Recognition. pp. 3709-3725. ISSN 0031-3203

Y

Yonezawa, Hidehiro, Braunstein, Samuel L. and Furusawa, Akira (2007) Experimental demonstration of quantum teleportation of a squeezed state. Physical Review Letters. Art. No. 110503. ISSN 1079-7114

Z

Zhan, Yuan and Clark, John Andrew (2004) Automatic test-data generation for testing simulink models. Report. York Computer Science Technical Report . Department of Computer Science, University of York

Zhang, S., Burns, A. and Cheng, T.H. (2002) Cycle-time properties of the timed token medium access control protocol. IEEE Transactions on Computers. pp. 1362-1367. ISSN 0018-9340

This list was generated on Thu Oct 30 10:26:15 2014 GMT.