Technical Reports

  1. Computing
  2. Technical Reports

School of Computing Technical Report Series

Since 1969, the School of Computing at Newcastle University published a series of Technical Reports. These were a mixture of pre-prints, conference reports, student-authored work and other types of article. This page is the result of a project to gather and present the full list of reports, their bibliographical information and links to full texts for the articles themselves. See below for background information on the project.

1969

(back to top)

  1. Coffman, E.C. Formalism in Computer System Design: Models of Parallelism and Concurrency. (download PDF).
  2. Wright, K. Some relationships Between Implicit Runge-Kutta, Collocation and Lanczos & Methods and their Stability Properties. (download PDF).
  3. Berry, R.E. A Hybrid Navigation System, Radio Aid Computer Programming Study; report at the end of the second year. (download PDF).
  4. Randell, B. Interacting Sequential Processes. (download PDF).
  5. Dowsey, M.W. Towards a True Author Entry System for CAI. (download PDF).

1970

(back to top)

  1. Coffman, E.G. and Bruno, J. On File Structuring for Non-Uniform Access Frequencies. (download PDF).
  2. Page, E.S. Systematic Orderings by Difference Equations. (download PDF).
  3. Joyce, D.C. A Survey of Extrapolation Processes in Numerical Analysis. (download PDF).
  4. Coffman, E.G., Burnett, G.J. and Snowdon, R.A. On the Performance of Interleaved Memories with Multiple-Word Band-Widths. (download PDF).
  5. Dowsey, M.W. A Language to Facilitate Man Computer-Dialogue. (download PDF).
  6. Mitrani, I. Non-Priority Multi-Programming Systems Under Heavy Demand Conditions From a Customer’s Point of View. (download PDF).
  7. McVitie, D.G. and Wilson, L.B. The Stable Marriage Problem. (download PDF).
  8. Dowsey, M.W. On-line Teaching of Programming Languages. (download PDF).

1971

(back to top)

  1. Lynch, W.C. Reliable Data Transmission Sub-channelisation and Full Duplex. (download PDF).
  2. Randell, B. Ludgate’s Analytical Machine of 1909. (download PDF).
  3. Coffman, E.G. and Randell, B. Performance Predications for Extended Paged Memories. (download PDF).
  4. Randell, B. Operating Systems: The Problems of Performance and Reliability. (download PDF).
  5. Henderson, P. and Snowdon, R.A. An Experiment in Structured Programming. (download PDF).
  6. Henderson, P. Derived Semantics for Some Programming Language Constructs. (download PDF).
  7. Randell, B. Highly Reliable Computing Systems. (download PDF).
  8. Henderson, P. The Design and Semantic Analysis of a Programming Language and its Compiler. (download PDF).
  9. Mitrani, I. Multi-Programming Systems with One Processor and Many Input-Output Devices. (download PDF).
  10. Aasen, J.O. Linear Operators with Invarient Cones. (download PDF).
  11. Anderson, T., Eve, J. and Horning, J.J. Efficient LR(1) Parsers. (download PDF).
  12. Lynch, W.C. Disk and Drum Optimization Techniques. (download PDF).
  13. Alderson, A., Lynch, W.C. and Randell, B. Thrashing in a Multi-Programmed Paging System. (download PDF).
  14. Berry, R.E. A Hybrid Navigation System: Radio Aid and Airborne Computer. Final Report of Programming Study. (download PDF).
  15. Snowdon, R.A. PEARL: An Interactive System for the Preparation and Validation of Structured Programs. (download PDF).
  16. Satterthwaite, E. Debugging Tools for High Level Languages. (download PDF).
  17. Snow, C.R. and Lauer, H.C. Is Supervisor – State Necessary. (download PDF).

1972

(back to top)

  1. Horning, J.J. and Randell, B. Process Structuring. (download PDF).
  2. Page, E.S. and Waller, L. An Interactive Approach for the Solution of a Class of Discrete Optimisation Problems. (download PDF).
  3. Randell, B. On Alan Turing and the Origins of Digital Computers. (download PDF).
  4. Barraclough, E.D. Medlars On-line Search Formulation and Indexing. (download PDF).
  5. Henderson, P. Functional Specification on Non-deterministic Programs. (download PDF).
  6. Barnett, J.K.R. An Analysis by Software Methods of Processor Time Use. (download PDF).
  7. Wilson, L.B. The Analysis of the Stable Marriage Assignment Algorithm for Equal Sets. (download PDF).
  8. Randell, B. The Origins of Digital Computers: A Bibliography. (download PDF).
  9. Mascall, A.J. and Snow, C.R. CMTS: An Experimental Evaluation of Relocation Hardware. (download PDF).
  10. Waller, L. An Improved Branch-and bound Algorithm for the Job-shop Scheduling Problem of Minimising Makespan. (download PDF).
  11. Mitrani, I. A Queueing Model of Priority Multi-programming. (download PDF).
  12. Lauer, P. E. The Perils of Indirect Proof, or, Another Efficient Search Algorithm to Find the Elementary Circuits of Directed Graphs. (download PDF).

1973

(back to top)

  1. Betteridge, T. An Analytical Storage Allocation Model. (download PDF).
  2. Hoare, C.A.R. and Lauer, P.E. Consistent and Complementary Formal Theories of the Semantics of Programming Languages. (download PDF).
  3. DeVillers, E.V.D.S. and Wilson, L.B. Hash Coding Methods for Sparse Matrices. (download PDF).
  4. Lloyd, J.L. The Stability of the Rayleigh-Ritz Method for the Solution of Non-linear Two Point Boundary Value Problems. (download PDF).
  5. Cooke, M. and Wilson, L.B. The Allocation of Houses and Stable Marriage Assignment. (download PDF).
  6. Waller, L. A Branch-bound-and-imply Algorithm for an Improved Attack Upon the Job-shop Scheduling Problem. (download PDF).
  7. Page, E.S. A Combinatorial Game. (download PDF).
  8. Deremer, F. Transformational Grammars for Languages and Compilers. (download PDF).
  9. Waller, L. Optimal Solutions to Restricted n-job 2-machine Scheduling Problems of Minimising Makespan. (download PDF).
  10. Haberrmann, A.N. The Equivalence of Some Deadlock-Avoidance Strategies. (download PDF).
  11. Haberrmann, A.N. A Spectrum of Deadlock-Avoidance Strategies. (download PDF).
  12. Lauer, H.C. and Wyeth, D. A Recursive Virtual Machine Architecture. (download PDF).

1974

(back to top)

  1. Campell, R.H. The Specification of Process Synchronization by Path Expressions. (download PDF).
  2. Newman, N.M. The Tape-Recorder and Instruction in the Operation of Equipment. (download PDF).
  3. Randell, B. Research on Computing System Reliability at the University of Newcastle upon Tyne. (download PDF).
  4. Henderson, P. and Quarendon, P. Finite State Testing of Structured Programs. (download PDF).
  5. Horning, J.J., Lauer, H.C., Melliar-Smith, P.M. and Randell, B. A Program Structure for Error Detection and Recovery. (download PDF).
  6. Szwarcfiter, J.L. and Lauer, P.E. Finding the Elementary Cycles of a Directed Graph in O (N+M) per cycle. (download PDF).
  7. Knuth, D.E. and Szwarcfiter, J.L. A Structured Program to Generate all Topological Sorting Arrangements. (download PDF).
  8. Mitrani, I. Networks of Unreliable Computers. (download PDF).
  9. Campell, R.H. and Lauer, P.E. A Spectrum of Solutions to the Cigerette Smokers Problem. (download PDF).
  10. Lauer, P.E. and Campell, R.H. A Description of Path Expressions by Petri-Nets. (download PDF).
  11. Randell, B. The History of Digital Computers. (download PDF).
  12. Laver, F.J.M. Computing and Communications. (download PDF).
  13. Simpson, R.M. A Study in the Design of High Integrity Systems. (download PDF).

1975

(back to top)

  1. Lauer, H.C. On Ph.D Thesis Proposals in Computing Science. (download PDF).
  2. Szwarcfiter, J.L. and Lauer, P.E. A New Backtracking Strategy for the Enumeration of the Elementary Cycles of a Directed Graph. (download PDF).
  3. Anderson, T. Provably Safe Programs. (download PDF).
  4. Cruickshank, D.M. Computable Error Bounds for Poly-nomial Collocation Methods. (download PDF).
  5. Snow, C.R. and Yates, A.M. A System for Interactive Graph Theory and some Applications. (download PDF).
  6. Fells, H., Newman, N.M. and Lloyd, J.L. The Preparation and use of a Programmed Instruction Text to Teach a Programming Language. (download PDF).
  7. Lauer, P.E. Formal Semantics of a Class of High-level Primitives for Co-ordinating Concurrent Processes. (download PDF).
  8. Randell, B. System Structure for Software Fault Tolerance. (download PDF).
  9. Wilson, L.B. The Analysis of Sequence Search Trees Using Recurrence Relations. (download PDF).
  10. Henderson, P., Snowdon, R.A., Gorrie, J.D. and King, I.I. The TOPD System. (download PDF).
  11. Barraclough, E.D., Hunter, J.A., Lovett, A.J. and Rossiter, B.N. The Medusa Current Awareness Experiment. (download PDF).
  12. Szwarcfiter, J.L. and Wilson, L.B. Some Properties of Ternary Trees. (download PDF).
  13. Lauer, P.E. On the Logical Description of Simple Conventional Hardware Configuration. (download PDF).
  14. Mitrani, I. and Hine, J.H. Complete Parameterized Families of Job Scheduling Strategies. (download PDF).
  15. Wilson, L.B. Assignment Using Choice Lists. (download PDF).
  16. Hine, J.H. A Note on the Solution of General Closed Queueing Networks. (download PDF).
  17. Eve, J. PhD Programmes at Some North American Universities. (download PDF).

1976

(back to top)

  1. Henderson, P. and Morris, J.H. A Lazy Evaluator. (download PDF).
  2. Tsur, S. Extraction and Utilzation of Intelligence in Paging Policies. (download PDF).
  3. Lauer, P.E. Abstracttre Processors with Networks of State Machines as Control: Their use in Programming Language Definition. (download PDF).
  4. Lauer, P.E. Towards an Axiomatization of Value-Theory. (download PDF).
  5. Clowes, J.S. Mean Path Lengths in a Class of Recursive Random Trees. (download PDF).
  6. Randell, B. The COLOSSUS. (download PDF).
  7. Randell, B. The Origins of Digital Computers: Supplementary Bibliography. (download PDF).
  8. Lomet, D.B. Process Structuring Synchronisation and Recovery Using Atomic Actions. (download PDF).
  9. Anderson, T. and Kerr, R. Recovery Blocks in Actions: A System Supporting High Reliability. (download PDF).
  10. Snow, C.R. An Exercise in the Transportation of an Operating System. (download PDF).
  11. Melliar-Smith, P.M. and Randell, B. Software Reliability: The Role of Programmed Exception Handling. (download PDF).
  12. Vejrhofstad, J.S.M. Recovery for Multi-level Data Structures. (download PDF).

1977

(back to top)

  1. Cotronis, J.Y. and Lauer, P.E. Verification of Concurrent Systems of Processes. (download PDF).
  2. Hine, J.H., Mitrani, I. and Tsur, S. The Control of Response Times in Multi-class Systems by Memory. (download PDF).
  3. Banatre, M. and Shrivastava, S.K. Reliable Resource Allocation between Unreliable Processes. (download PDF).
  4. Vejrhofstad, J.S.M. On Multi-level Recovery: An Approach using Partially Recoverable Interfaces. (download PDF).
  5. Eve, J. and Kurki-Suonio, R. Finding Strongly Connected Components of a Directed Graph. (download PDF).
  6. Randell, B., Lee, P.A. and Treleavan, P.C. Reliable Computing Systems. (download PDF).
  7. Lauer, P.E., Best, E. and Shields, M.W. On the Problem of Achieving Adequacy of Concurrent Programs. (download PDF).
  8. Prince, P.J. and Wright, K. Runge-Kutta Processes with Exact Principal Error Equations. (download PDF).
  9. Devillers, R. and Lauer, P.E. A General Mechanism for Avoiding Starvation with Distributed Control. (download PDF).
  10. Gimpson, R.B. Data Representation by Program Transformation. (download PDF).
  11. Treleavan, P.C. Exploiting Problem-Parallelism in Computer Systems. (download PDF).
  12. Treleavan, P.C. Principal Components of Data Flow Computers. (download PDF).
  13. Ghani, N. and Givens, J.G. A Teaching Laboratory for Digital Systems. (download PDF).
  14. Hine, J.H. Pre-specified Performance Requirements in Multi-programmed Computer Systems. (download PDF).
  15. Anderson, T. and Shrivastava, S.K. Reliable Software: A Selective Annotated Bibliography. (download PDF).
  16. Clowes, J.S., Mitrani, I. and Wilson, L.B. Level Number Sequences for Binary Trees. (download PDF).
  17. Merlin, P.M. and Randell, B. Consistent State Restoration in Distributed Systems. (download PDF).
  18. Schmid, H.A. and Best, E. A Step Towards a Solution of the Liveness Problem in Petri Nets. (download PDF).
  19. Anderson, T., Lee, P.A. and Shrivastava, S.K. A Model of Recoverability in Multi-level Systems. (download PDF).
  20. Best, E. A Theorem on the Characteristics of Non-sequential Processes. (download PDF).
  21. Lauer, P.E. and Shields, M.W. Abstract Specification of Resource Accessing Disciplines: Adequacy, Starvation, Priority and Interrupts. (download PDF).

1978

(back to top)

  1. Snow, C.R. The Software Tools Project. (download PDF).
  2. Lee, P.A. A Reconsideration of the Recovery Block Scheme. (download PDF).
  3. Lauer, P.E. and Torrigiani, P.R. Toward a System Specification Language Based on Paths and Processes. (download PDF).
  4. Farrell, E.P. and Kanellopoulos, N.G. Debugging Aids for Micro-processor Systems: Two Approaches. (download PDF).
  5. Shrivastava, S.K. and Akinpelu, A.A. Fault Tolerant Sequential Programming Using Recovery Blocks. (download PDF).
  6. Shrivastava, S.K. Sequential Pascal with Recovery Blocks. (download PDF).
  7. Hunter, J.A. and Hindmarsh, M.M. ALGOL W Development at Newcastle. (download PDF).
  8. Shields, M.W. and Lauer, P.E. On the Abstract Specification and Formal Analysis of Synchronisation Properties of Concurrent Systems. (download PDF).
  9. Treleavan, P.C., Farrell, E.P., Ghani, N., Jones, S.B., Randell, B. and Smith, P.J. The Design of Highly Concurrent Computing Systems. (download PDF).
  10. Shrivastava, S.K. Concurrent Pascal with Backward Error-recovery. (download PDF).
  11. Henderson, P., Gimpson, R.B. and Martin, M.M. Modularisation of Large Programs. (download PDF).
  12. Henderson, P. The Lispkit System – A Software Kit. (download PDF).

1979

(back to top)

  1. Best, E. and Randell, B. A Formal Model of Atomicity in Asynchronous Systems. (download PDF).
  2. Szwarcfiter, L.J. and Wilson, L.B. The Cycle Cover Problem. (download PDF).
  3. Shields, M.W. and Lauer, P.E. A Formal Semantics for Concurrent Systems. (download PDF).
  4. Wilson, L.B. The Use of Recurrence Relations in Computing. (download PDF).
  5. Lee, P.A., Ghani, N. and Heron, K. A Recovery Cache for the PDP-11. (download PDF).
  6. Wright, K. Asymptotic Properties of the Norms of Certain Collocation Matrices. (download PDF).
  7. Lauer, P.E., Torrigiani, P.R. and Shields, M.W. COSY: A System Specification Language based on Paths and Processes. (download PDF).
  8. Anderson, T. and Lee, P.A. The Provisions of Recoverable Interfaces. (download PDF).
  9. Randell, B. Software Engineering in 1968. (download PDF).
  10. Farrell, E.P., Ghani, N. and Treleavan, P.C. A Concurrent Computer Architecture and a Ring based Implementation. (download PDF).
  11. Randell, B. An Annotated Bibliography on the Origins of Digital Computers. (download PDF).
  12. Shields, M.W. Adequate Path Expressions. (download PDF).
  13. Lauer, P.E., Shields, M.W. and Best, E. Design and Analysis of Highly Parallel and Distributed Systems. (download PDF).
  14. Lauer, P.E., Shields, M.W. and Best, E. Formal Theory of the Basic COSY Notation. (download PDF).
  15. Hopkins, R.P., Rautenback, P.W. and Treleavan, P.C. A Computer Supporting Data Flow Control Flow and Updateable Memory. (download PDF).

1980

(back to top)

  1. Best, E. Notes on Predicate Transformers and Concurrent Programs. (download PDF).
  2. Best, E. Adequacy of Path Programs. (download PDF).
  3. Best, E. An Operational Characterisation of the Atomicity of Activities. (download PDF).
  4. Best, E. The Relative Strength of the Semantic Axiom of K-density. (download PDF).
  5. Shrivastava, S.K. Structuring Distributed Systems for Recoverability and Crash Resistance. (download PDF).
  6. Treleavan, P.C. and Mole, G.F. A Multi-processor Reduction Machine for User-defined Reduction Languages. (download PDF).
  7. Lauer, P.E. and Torrigiani, P.R. A COSY Banker: Specification Highly Parallel and Distributed Resource Management. (download PDF).
  8. Shields, M.W. and Lauer, P.E. Verifying Concurrent Systems Specification in COSY. (download PDF).
  9. Lauer, P.E. and Shields, M.W. COSY: An Environment for Development and Analysis of Concurrent and Distributed Systems. (download PDF).
  10. Randell, B. Reliability and Integrity of Distributed Computing Systems. (download PDF).
  11. Shields, M.W. and Lauer, P.E. Programming and Verifying Concurrent Systems in COSY. (download PDF).
  12. Treleavan, P.C. Proceedings of the Joint SRC/University of Newcastle upon Tyne Workshop on VLSI: Machine Architecture and Very High Level Languages. (download PDF).
  13. Treleavan, P.C. and Hopkins, R.P. Decentralised Computation. (download PDF).
  14. Wood, W.G. Recovery Control of Communicating Processes in a Distributed System. (download PDF).

1981

(back to top)

  1. Whitfield, H. The Challenge of the Chip. (download PDF).
  2. Jegado, M. Recoverability Aspects of a Distributed File System. (download PDF).
  3. Treleavan, P.C. and Hopkins, R.P A Recursive (VLSI) Computer Architecture. (download PDF).
  4. Lauer, P.E., Shields, M.W. and Cotronis, B.Y. Formal Behavioural Specification of Concurrent Systems without Globality Assumptions. (download PDF).
  5. Lauer, P.E. Synchronization of Concurrent Processes without Globality Assuptions. (download PDF).
  6. Randell, B. From Analytical Engine to Electronic Digital Computer: The Contributions of Ludgate (1883-1922), Torresy Quevedo (1852-1936) and Bush (1890-1974). (download PDF).
  7. Best, E. and Cristian, F. Systematic Detection of Exception Occurrences. (download PDF).
  8. Rushby, J.M. Verification of Secure Systems. (download PDF).
  9. Lu, X.D. A Special-purpose VLSI Chip-dynamic Pipeline Up-down Counter. (download PDF).
  10. Treleavan, P.C., Brownbridge, D.R. and Hopkins, R.P. Data Driven and Demand Driven Computer Architecture. (download PDF).
  11. Anderson, T. and Knight, J.C. Practical Software Fault Tolerance for Real-time Systems. (download PDF).
  12. Cristian, F. Robust Data Types. (download PDF).
  13. Shrivastava, S.K. and Panzieri, F. The Design of a Reliable Remote Procedure Call Mechanism. (download PDF).
  14. Treleavan, P.C. VLSI Processor Architectures. (download PDF).

1982

(back to top)

  1. Cristian, F. Exception Handling and Software Fault Tolerance. (download PDF).
  2. Anderson, T. and Lee, P.A. Fault Tolerance Terminology Proposals. (download PDF).
  3. Brownbridge, D.R., Marshall, L.F. and Randell, B. The Newcastle Connection or UNIXes of the World Unite!. (download PDF).
  4. Treleavan, P.C. and Gouveia Lima, I. Japan’s Fifth Generation Computer Systems. (download PDF).
  5. Panzieri, F. Reliable Remote Calls for Distributed UNIX: An Implementation Study. (download PDF).
  6. Shrivastava, S.K. A Dependancy, Commitment and Recovery Model for Atomic Actions. (download PDF).
  7. Panzieri, F. Software and Hardware of High Integrity Systems Project. Final Report. University Agreement ERC/9/4/2043/059 RSRE. (download PDF).
  8. Best, E. Relational Semantics of Concurrent Programs (with some applications). (download PDF).
  9. Randell, B The Structuring of Distributed Computing Systems. (download PDF).
  10. Rushby, J.M. and Randell, B. A Distributed Secure System. (download PDF).

1983

(back to top)

  1. Christian, F. Correct and Robust Programs. (download PDF).
  2. Cristian, F. A Rigorous Approach to Fault-tolerant System Development. (download PDF).
  3. Lauer, P.E. System Dossiers. (download PDF).
  4. Campell, R.H. and Randell, B. Error Recovery in Asynchronous Systems. (download PDF).
  5. Campell, R.H., Anderson, T. and Randell, B. Practical Fault Tolerant Software for Systems. (download PDF).
  6. Shrivastava, S.K. On the Treatment of Orphans in a Distributed System. (download PDF).
  7. Randell, B. Fault Tolerance and System Structuring. (download PDF).
  8. Panzieri, F. and Randell, B. Interfacing UNIX to Data Communications Networks. (download PDF).

1984

(back to top)

  1. Anyanwu, J.A. A Reliable Stable Storage System for UNIX. (download PDF).
  2. Panzieri, F. Communications Protocols for Local Area Networks. (download PDF).
  3. Linton, A. and Panzieri, F. A Communication System Supporting Large Datagrams on a Local Area Network. (download PDF).
  4. Randell, B. The Newcastle Connection: A Software Subsystem for Constructing Distributed UNIX Systems. (download PDF).

1985

(back to top)

  1. Anyanwu, J.A. and Marshall, L.F. A Crash Resistant UNIX File System. (download PDF).
  2. Anderson, T. Can Design Faults be Tolerated?. (download PDF).
  3. Panzieri, F. Design and Development of Communication Protocols for Local Area Networks. (download PDF).
  4. Randell, B. System Design and Structuring. (download PDF).
  5. Linton, A. Networking Issues in the Newcastle Connection. (download PDF).
  6. Panzieri, F. and Shrivastava, S.K. Rajdoot: A Remote Procedure Call Mechanism Supporting Orphan Detection and Killing. (download PDF).
  7. Bennett, K.H., Marshall, L.F. and Randell, B. Reliable Computing in a UNIX United Environment. (download PDF).
  8. Anderson, T., Barraclough, E.D., Halliwell, D.N. and Moulding, M.R. Software Fault Tolerance: An Evaluation. (download PDF).
  9. Shrivastava, S.K. Workshop on Distributed Computing. (download PDF).
  10. Anyanwu, J.A. and Randell, B. Update and Merge of Partitioned Distributed Systems. (download PDF).
  11. Koutny, M. Train Journeys in the Merlin-Randell Problem. (download PDF).
  12. Ezhilchelvan, P.D. and Shrivastava, S.K. A Characterization of Faults in Systems. (download PDF).
  13. Brownbridge, D.R. Cyclic Reference Counting for Combinator Machines. (download PDF).
  14. Lee, D. and Linton, A. UDSTP: A Transport Protocol for a Uniform Datagram Service. (download PDF).
  15. Mancini, L.V. Modular Redundancy in a Message Passing System. (download PDF).
  16. Randell, B. and Dobson, J.E. Reliability and Security Issues in Distributed Computing Systems. (download PDF).
  17. Campell, R.H., Koelmans, A.M. and McLauchlan, M.R. STRICT: A Design Language for Strongly Typed Recursive Integrated Circuits. (download PDF).
  18. Hughes, L.F. The NUNET-UNIX Interface Protocol Description. (download PDF).

1986

(back to top)

  1. Mancini, L.V. and Koutny, M. Formal Specification of N-modular Redundancy. (download PDF).
  2. Dobson, J.E. and Randell, B. Building Reliable Secure Computing Systems out of Unreliable Insecure Components. (download PDF).
  3. Montaser-Kohsari, A., Mitrani, I. and Betteridge, T. Software Monitoring of UNIX Systems. (download PDF).
  4. Snow, C.R. Multi-level Debugging Using Interface Monitoring. (download PDF).
  5. Mancini, L.V. and Shrivastava, S.K. Exception Handling in Replicated Systems with Voting. (download PDF).
  6. Randell, B. Design Fault Tolerance. (download PDF).
  7. Dobson, J.E. and Martin, M.J. Modelling Real-world Issues in Dependable Communications Systems. (download PDF).
  8. Black, J.P., Marshall, L.F. and Randell, B. The Architecture of UNIX United. (download PDF).
  9. Hughes, L.F. A Multicast Transmission of Taxonomy. (download PDF).
  10. Shrivastava, S.K. Replicated Distributed Processing. (download PDF).
  11. Dixon, G.N. and Shrivastava, S.K. Exploiting Type Inheritance Facilities to Implement Recoverability in Object Based Systems. (download PDF).
  12. Pfleger, S. Design Concepts for Robust Software. (download PDF).
  13. Hopkins, R.P. A Recursive Architecture Supporting Control Flow, Data and Reduction. (download PDF).
  14. Brown, A.W., Robinson, D.S. and Weedon, R.A. Managing Software Development. (download PDF).

1987

(back to top)

  1. Heather, M.A. and Rossiter, B.N. Database Techniques for Text Modelling: The Document Architecture of British Statutes. (download PDF).
  2. Snow, C.R. and Wong, W.Y.P. Interactive Remote Source-level Debuging Tools Using Interface Monitoring. (download PDF).
  3. Wong, W.Y.P. and Snow, C.R. Implementation of an Interactive Remote Source-level Degugger for C Programs. (download PDF).
  4. Wong, W.Y.P. Implementation of an Interpreter for C Expressions. (download PDF).
  5. Hughes, L.F. Multicast Gateway Design Considerations. (download PDF).
  6. Randell, B. System Design and Structuring for Dependability. (download PDF).
  7. Mancini, L.V. and Pappalardo, G. Resolving Nondeterminism in Distributed Redundant Systems. (download PDF).
  8. Janicki, R. and Koutny, M. On Equivalent Execution Semantics of Concurrent Systems. (download PDF).
  9. Ezhilchelvan, P.D. Early Stopping Algorithms for Distributed Agreement Under Fail-stop, Omission, and Timing Fault Types. (download PDF).
  10. Brown, A.W. A View Mechanism for an Integrated Project Support Environment. (download PDF).
  11. Koutny, M. and Mancini, L.V. Synchronizing Events in Replicated Systems. (download PDF).
  12. Mancini, L.V. and Shrivastava, S.K. Failure Detection in Replicated Systems. (download PDF).
  13. Hopkins, R.P. and Koutny, M. A Model for Dynamically Structured Communicating Systems. (download PDF).
  14. Kemp, D.L., Scott, E.A. and Taylor, D.A. Window Management Systems: An Annotated Biblography. (download PDF).
  15. Stewart, I.A. On the Intersections of Longest Cycles in a Graph. (download PDF).
  16. Shrivastava, S.K., Dixon, G.N. and Parrington, G.D. Objects and Actions in Reliable Distributed Systems. (download PDF).
  17. Stewart, I.A. An Algorithm for Colouring Perfect Planar Graphs. (download PDF).
  18. Koelmans, A.M., McLauchlan, M.R. and Robson, A.P. The STRICT Language and Design Methodology. (download PDF).
  19. Stewart, I.A. A Parallel Algorithm to Four-colour a Perfect Planar Graph. (download PDF).
  20. Campbell, O.G. Meteor Burst Communication Protocols – The History and Role of Computing Technology in Radio Communication via Meteor Trails. (download PDF).
  21. Snow, C.R. Integrated Tools for Hardware/software Debugging. Final Report [on] S.E.R.C. Research Project GR/C/35974. (download PDF).
  22. Shrivastava, S.K., Mancini, L.V. and Randell, B. On the Duality of Fault Tolerant System Structures. (download PDF).
  23. Mancini, L.V. A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures. (download PDF).

1988

(back to top)

  1. Holt, C.M. An Associative Constructive Logic. (download PDF).
  2. Holt, C.M. IF Statements as Logical Disjunction. (download PDF).
  3. Ezhilchelvan, P.D. With Less Malicious Byzantine Generals: Agreement Algorithms Under Value Faults. (download PDF).
  4. Mancini, L.V. The Verification of Distributed Redundant Systems. (download PDF).
  5. Brown, A.W. An Introduction to Integrated Project Support Environments. (download PDF).
  6. Holt, C.M. Concurrent Constructive Logic. (download PDF).
  7. Mancini, L.V. and Pappalardo, G. The Join Algorithm: Ordering Messages in Replicated Systems. (download PDF).
  8. Wright, K. Continuous Orthonormalization Algorithms for Boundary Value Problems. (download PDF).
  9. Mancini, L.V. and Pappalardo, G. Towards a Theory of Replicated Processing. (download PDF).
  10. Parrington, G.D. and Shrivastava, S.K. Implementing Concurrency Control in Reliable Distributed Object Oriented Systems. (download PDF).
  11. Parrington, G.D. and Shrivastava, S.K. Towards a Theory of Replicated Processing. (download PDF).
  12. Pietkiewicz-Koutny, M. Modelling Dynamic Reconfiguration in TMR Systems. (download PDF).
  13. Shrivastava, S.K., Dixon, G.N., Hedayati, F., Parrington, G.D. and Wheater, S.M. A Technical Overview of Arjuna: A System for Reliable Distributed Computing. (download PDF).
  14. Pappalardo, G. and Shrivastava, S.K. A Formal Treatment of Interference in Remote Procedure Calls. (download PDF).
  15. Dobson, J.E. Security and Databases: A Methodological Approach. (download PDF).
  16. Zhang, Y. CPD: A Useful Tool for Designing Expert Systems. (download PDF).
  17. Mancini, L.V. and Pappalardo, G. Proving Correctness Properties of a Replicated Synchronous Program. (download PDF).
  18. Dobson, J.E. Representing the Real World. (download PDF).
  19. Dobson, J.E. Modelling Real-world Issues for Dependable Software. (download PDF).
  20. Holt, C.M. Dynamic Communication Links. (download PDF).
  21. Koutny, M. Adequacy-preserving Transformatics of COSY Path Programs. (download PDF).
  22. Iliev, V.I., Dlay, S.S., Koelmans, A.M., McLauchlan, M.R. and Kinniment, D.J. An Advanced VLSI Security Device Employing Data Verification Features. (download PDF).
  23. Koelmans, A.M., McLauchlan, M.R. and Kinniment, D.J. Asynchronous Extensions to the STRICT High Level Design System. (download PDF).
  24. Stewart, I.A. Expressibility, Complexity and Comparative Schematology. (download PDF).
  25. Ezhilchelvan, P.D., Shrivastava, S.K. and Tully, A. Constructing Replicated Systems using Processors with Point-to-Point Communication Links. (download PDF).
  26. Brown, A.W. A View Mechanism for an Integrated Project Support Environment. (download PDF).
  27. Dixon, G.N. Object Management for Persistence and Recoverability. (download PDF).
  28. Parrington, G.D. Management of Concurrency in a Reliable Object-Oriented Computing System. (download PDF).

1989

(back to top)

  1. Ezhilchelvan, P.D., Mitrani, I. and Shrivastava, S.K. An Empirical Study of the Performance of Distributed Replicated Systems. (download PDF).
  2. Dobson, J.E. and McDermid, J.A. Security Models and Enterprise Models. (download PDF).
  3. Shrivastava, S.K., Dixon, G.N., Parrington, G.D., Hedayati, F., Wheater, S.M. and Little, M.C. The Design and Implementation of Arjuna. (download PDF).
  4. Mancini, L.V. and Shrivastava, S.K. Replication within Atomic Actions and Conversations: A Case Study in Fault-Tolerance Duality. (download PDF).
  5. Hopkins, R.P. and Koutny, M. Modelling Concurrent Systems with Dynamic Communication Structure. (download PDF).
  6. Dixon, G.N., Parrington, G.D., Shrivastava, S.K. and Wheater, S.M. The Treatment of Persistent Objects in Arjuna. (download PDF).
  7. Pucci, G Software Metrics and Design Diversity. (download PDF).
  8. Yakovlev, A. Concurrency Models for Designing Interface Logic in Distributed Systems. (download PDF).
  9. Yakovlev, A. A Relation-based Approach to Analysing Semantics of Asynchronous Hardware Specifications. (download PDF).
  10. Hopkins, R.P. and Koutny, M. Asynchronous Communication in Dynamically Structured Systems. (download PDF).
  11. Pucci, G. A New Approach to the Modelling of Recovery Block Structures. (download PDF).
  12. Wright, K., Ahmed, A.H.A. and Seleman, A.H. Criteria for Mesh Selection in Collocation Algorithms for Ordinary Differential Boundary Value Problems. (download PDF).
  13. Stewart, I.A. Logical and Schematic Characterization of Complexity Classes. (download PDF).
  14. Mancini, L.V. Reliability Issues in the Design of Distributed Object-Based Architectures. (download PDF).
  15. Megson, G.M. A Unified Self-Systolic Torus for Ricatti Equation Solution. (download PDF).
  16. Stewart, I.A. Obtaining Nielsen Reduced Sets in Free Groups. (download PDF).
  17. Chennells, R.S. and Foster, J. Survey of Network Information Services: A Report to the Computer Board. (download PDF).
  18. Dobson, J.E. Conversation Structures as a Means of Specifying Security Policy. (download PDF).
  19. Megson, G.M. Sorting without Exchanges on a Bit Serial Systolic Array. (download PDF).
  20. Rossiter, B.N. and Heather, M.A. Toward the Object-Oriented Textbase. (download PDF).
  21. Shrivastava, S.K., Dixon, G.N. and Parrington, G.D. An Overview of Arjuna: A Programming System for Reliable Distributed Computing. (download PDF).
  22. Holt, C.M. Intervals as Time Lattices. (download PDF).
  23. Stewart, I.A. Complete Problems for Symmetric Logspace Involving Free Groups. (download PDF).

1990

(back to top)

  1. Carter, W.C. PDCS from a Designer’s Viewpoint. (download PDF).
  2. Iqbal, R. A One-Pass Algorithm for Shape-Preserving Quadratic Spline Interpolation. (download PDF).
  3. Calzarossa, M., Marie, R. and Trivedi, K.S. System Performance with User Behavior Graphs. (download PDF).
  4. Ezhilchelvan, P.D. Design and Development of Algorithms for Fault Tolerant Distributed Systems. (download PDF).
  5. Shrivastava, S.K., Mancini, L.V. and Randell, B. The Duality of Fault-Tolerant System Structures. (download PDF).
  6. Dobson, J.E., McDermid, J. and Randell, B. On the Trustworthiness of Computing Systems. (download PDF).
  7. Dobson, J.E. A Methodology for Analysing Human and Computer-related Issues in Secure Systems. (download PDF).
  8. Parrington, G.D. Reliable Distributed Programming in C++: The Arjuna Approach. (download PDF).
  9. Stewart, I.A. Using the Hamiltonian Path Operator to Capture NP. (download PDF).
  10. Stewart, I.A. The Demise of the Turing Machine in Complexity Theory. (download PDF).
  11. Randell, B. Electronic Computing: A Continuing Revolution. (download PDF).
  12. Janicki, R. and Koutny, M. Net Implementation of Optimal Simulations. (download PDF).
  13. Koutny, M. Axiom System Induced by CTL Logic. (download PDF).
  14. Stewart, I.A. Comparing the Expressibility of Languages Formed using NP-complete Operators. (download PDF).
  15. Shrivastava, S.K. and Wheater, S.M. Implementing Fault-tolerant Distributed Applications using Objects and Multi-coloured Actions. (download PDF).
  16. Wheater, S.M. Constructing Reliable Distributed Applications using Actions and Objects. (download PDF).
  17. Iqbal, R. A Modification of Roulier’s Algorithm for Shape-preserving Surface Interpolation. (download PDF).
  18. Kuszynski, C.A., Busfield, T., Koelmans, A.M., McLauchlan, M.R. and Kinniment, D.J. Graphical Representation of a Hardware Description Language. (download PDF).

1991

(back to top)

  1. Little, M.C. and Shrivastava, S.K. Replicated K-Resilient Objects in Arjuna. (download PDF).
  2. Dobson, J.E. and McDermid, J.A. An Investigation into Modelling and categorisation of Non-Functional Requirements (for the Specification of Surface Naval Command Systems). (download PDF).
  3. Burns, F.P., Kinniment, D.J. and Koelmans, A.M. Correct Interactive Transformational Synthesis of DSP Hardware. (download PDF).
  4. Song, D.H. An Accurate Prefetching Policy for Object Oriented Systems. (download PDF).
  5. Stewart, I.A. On Completeness for NP via Projection Translations. (download PDF).
  6. Stewart, I.A. Complete Problems for Logspace Involving Lexicographic First Paths in Graphs. (download PDF).
  7. Stewart, I.A. Logical Characterizations of Bounded Query Classes I: Logspace Oracle Machines. (download PDF).
  8. Stewart, I.A. Logical Characterizations of Bounded Query Classes II: Polynomical-time Oracle Machines. (download PDF).
  9. Randell, B. Programming: From Babbage to Backus. (download PDF).
  10. Tully, A. Preventing State Divergence in Replicated Distributed Systems. (download PDF).
  11. Hall, J. A Petri Net Semantics of Occam 2. (download PDF).
  12. Randell, B. Coping with the Past. (download PDF).
  13. Trouessin, G., Y. Deswarte, J.-C. Fabre and B. Randell Improvement of Data Processing Security by means of Fault Tolerance. (download PDF).
  14. Stewart, I.A. Deciding Whether a Planar Graph has a Cubic Subgraph is NP-complete. (download PDF).
  15. Shrivastava, S.K., Ezhilchelvan, P.D., Speirs, N.A. and Seaton, D.T. Fail-controlled Computer Architectures for Distributed Systems. (download PDF).
  16. Stewart, I.A. Uniform Sequences of Branching Programs. (download PDF).
  17. Stewart, I.A. Complete Problems Involving Boolean Labelled Structures and Projection. (download PDF).
  18. Stewart, I.A. On the Capture of Complexity Classes using Logic. (download PDF).
  19. Randell, B. and Fabre, J.-C. FDP Techniques in Object-oriented Systems. (download PDF).
  20. Stewart, I.A. Methods for Proving Completeness via Logical Reductions. (download PDF).
  21. Hopkins, R.P. Distributable Nets. (download PDF).
  22. Xu, J. The t/(n-1)-diagnosability and its Applications to Fault Tolerance. (download PDF).
  23. de Lemos, R., Saeed, A. and Anderson, T. Requirements Specification and Verification for Safety-critical Systems. (download PDF).
  24. Stewart, I.A. On the Expressibility of Extensions of First-order Logic. (download PDF).
  25. Randell, B. and Laprie, J.-C. Predictably Dependable Computing Systems: Second Year Report. (download PDF).
  26. Barrett, P.A. and Speirs, N.A. Towards an Integrated Approach to Fault Tolerance in Delta-4. (download PDF).
  27. Stewart, I.A. Refining Known Results on the Generalized Word Problem for Free Graphs. (download PDF).
  28. Koelmans, A.M. and Kinniment, D.J. Modelling and Verification of Timing Conditions with the Boyer-Moore Prover. (download PDF).
  29. Koelmans, A.M. and Kinniment, D.J. Verification of Timing Conditions Using a Theorem Prover. (download PDF).
  30. Shrivastava, S.K., Ezhilchelvan, P.D., Speirs, N.A., Tao, S. and Tully, A. Principal Features of the Voltan Family of Reliable Node Architectures for Distributed Systems. (download PDF).
  31. Shrivastava, S.K. and Waterworth, A. Using Objects and Actions to Provide Fault tolerance in Distributed, Real-Time Applications. (download PDF).
  32. Wright, K. Parallel Treatment of Block Bi-Diagonal Matrics in the Solution of Ordinary Differentail Boundary Value Problems. (download PDF).
  33. Koutny, M., Mancini, L.V. and Pappalardo, G. Verifying Correctness of Communicating Replicated Processes. (download PDF).
  34. Stewart, I.A. On a Greedy Heuristic for Finding Small Dominating Sets. (download PDF).
  35. Koutny, M. Modelling Systems with Dynamic Priorities. (download PDF).
  36. McCue, D.L. Intercepting Fetch and Store Operations in C ++. (download PDF).
  37. Janicki, R. and Koutny, M. Invariants and Paradigms of Concurrency Theory. (download PDF).
  38. Pietkiewicz-Koutny, M. Modelling Reconfigurability using Graph Grammars and Petri Nets. (download PDF).
  39. Stewart, I.A. On the Reachability Problem for Some Classes of Petri Nets. (download PDF).
  40. Stoker, M.A. The Exploitation of Parallelism on Shared Memory Multiprocessors. (download PDF).
  41. de Lemos, R., Saeed, A. and Anderson, T. Analysis of Timeliness Requirements in Safety-Critical Systems. (download PDF).
  42. de Lemos, R., Saeed, A. and Anderson, T. Value Inconsistencies due to Time Uncertainties. (download PDF).
  43. de Lemos, R., Saeed, A. and Anderson, T. A Train Set as a Case Study for the Requirements Analysis of Safety-Critical Systems. (download PDF).
  44. Yakovlev, A. A Structural Technique for Fault-Protection in Asynchronous Interfaces. (download PDF).
  45. Megson, G.M. Automating Systolic Algorithm Design 1: Basic Synthesis Techniques. (download PDF).
  46. Megson, G.M. Automating Systolic Algorithm Design 2: A Practical Approach. (download PDF).
  47. Wright, K. Differential Equations for the Analytic Singular Value Decomposition of a Matrix. (download PDF).
  48. Holt, C.M. Visualizing Concurrent Relations. (download PDF).
  49. Koutny, M. and Janicki, R. Structure of Concurrency. (download PDF).
  50. Stewart, I.A. On Two Approximation Algorithms for the Clique Problem. (download PDF).
  51. Chakka, R. and Mitrani, I. Heterogeneous Multiprocessor Systems wilh Breakdowns: Performance and Optimal Repair Strategies. (download PDF).
  52. Capretz, L.F. Object-Oriented Design Methodologies for Software Systems. (download PDF).

1992

(back to top)

  1. Koelmans, A.M., Yakovlev, A. and Kinniment, D.J. System-level Design Based on Transformational Synthesis: Problems and Options. (download PDF).
  2. Bondavalli, A., Di Giandomenico, F. and Xu, J. A Cost Effective and Flexible Scheme for Software Fault Tolerance. (download PDF).
  3. Best, E. and Hall, J. The Box Calculus: A new Causal Algebra with Multilabel Communication. (download PDF).
  4. Yakovlev, A. On Limitations and Extensions of Signal Transition Graph Model for Designing Asynchronous Control Circuits. (download PDF).
  5. Hodge, D.R. Very Large Distributed System Management: A Dependable Approach. (download PDF).
  6. Little, M.C. Object Replication in a Distributed System. (download PDF).
  7. Yakovlev, A. Synthesis of Hazard-Free Asynchronous Circuits from Generalised Signal-Transition Graphs. (download PDF).
  8. Koutny, M., Mancini, L.V. and Pappalardo, G. Replication in Acyclic Networks of Communicating Processes. (download PDF).
  9. Phillips, C. Fortran GEM2 Programmers’ Manual. (download PDF).
  10. Saeed, A. and Anderson, T. An Approach to the Requirements Analysis of Safety-Critical Systems. (download PDF).
  11. Saeed, A., de Lemos, R. and Anderson, T. An Approach to the Assessment of Requirements Specifications for Safety-Critical Systems. (download PDF).
  12. Burns, A., McDermid, J.A. and Dobson, J.E. On the Meaning of Safety and Security. (download PDF).
  13. Poulson, D.F., Oswald, G., Chudge, J. and Strens, M.R. Modelling Organisational Complexity using the ORDIT Framework. (download PDF).
  14. Hopkins, R.P. A (Prioritised) Petri Box Algebra and its use for a Triple Modular Redundance Case Study. (download PDF).
  15. Phillips, C. Parallel Block LU Factorisation in the Global Element Method Part 1: Share Memory Implementation. (download PDF).
  16. Capretz, L.F. and Lee, P.A. Reusability and Life Cycle Issues within an Object-Oriented Methodology. (download PDF).
  17. Cook, R. and Phillips, C. Incorporating Advective Terms into the Global Element Method. (download PDF).
  18. Xu, J. and Randell, B. Software Fault Tolerance: t(n-1)-Variant Programming. (download PDF).
  19. Megson, G.M. The Derivation of Uniform Recurrence Equations for the Knapsack Problem. (download PDF).
  20. McCue, D.L. Selective Transparency in Distributed Transaction Processing. (download PDF).
  21. Caughey, S.J., Shrivastava, S.K. and McCue, D.L. Implementing Fault-Tolerant Object Systems on Distributed Memory Multiprocessors. (download PDF).
  22. McCue, D.L. and Little, M.C. Computing Replica Placement in Distributed Systems. (download PDF).
  23. Diemoz, E., Jowett, A.T., Ingham, D.B., Lwanda, C., Morton, A.J., Mtema, P.B., Whittaker, S. and Wright, D. An Analysis of International Electronic Mail Performance and Reliability. (download PDF).
  24. Dobson, J.E., Blyth, A.J.C., Chudge, J. and Strens, M.R. The ORDIT Approach to Requirements Identification. (download PDF).
  25. Yakovlev, A. and Petrov, A.I. Symbolic Signal Transition Graphs and Asynchronous Circuit Deisgn. (download PDF).
  26. Randell, B. System Dependability. (download PDF).
  27. Megson, G.M. Mapping a Class of Run-Time Dependencies onto Regular Arrays. (download PDF).
  28. Capretz, L.F. and Lee, P.A. A Classification of Object-Oriented Development Methodologies. (download PDF).
  29. Capretz, L.F. and Lee, P.A. CASE Tools for Object-Oriented Design Methodologies. (download PDF).
  30. Buzato, L. and Calsavara, A. Stabilis: A Case Study in Writing Fault-Tolerant Distributed Applications Using Persistent Objects. (download PDF).
  31. Phillips, C. Parallel Block LU Factorisation in the Global Element Method Part 2: Local Memory Implementation. (download PDF).
  32. Phillips, C. and Cook, R. A Quasi-Newton Method for Global Element Calculations. (download PDF).
  33. Spencer, J.M. Using Instance Properties to Decide Object Placement in Distributed Systems. (download PDF).
  34. Fitzgerald, F.S., Lindsay, P.A. and Moore, R. On Making Formal Proof More Tractable. (download PDF).
  35. Wright, K. Numerical Solutions of Differential Equations for the Analytic Singular Value Decomposition. (download PDF).
  36. Rossiter, B.N. and Heather, M.A. Data Management of On-line Information Systems. (download PDF).
  37. Rossiter, B.N. and Heather, M.A. Applying Category Theory to Databases. (download PDF).
  38. Capretz, L.F. and Lee, P.A. Towards an Object-Oriented Approach. (download PDF).
  39. de Lemos, R., Saeed, A. and Waterworth, A. Exception Handling in Real-Time Software for Specification. (download PDF).

1993

(back to top)

  1. Fabre, J.C., Deswarte, Y. and Randell, B.R. A Framework for the Design of Secure and Reliable Applications by Fragmentation-Redundancy-Scattering. (download PDF).
  2. Holt, C.M. Multimedia Language Design. (download PDF).
  3. Anderson, T., de Lemos, R., Fitzgerald, J.S. and Saeed, A. On Formal Support for Industrial Scale Requirements Analysis. (download PDF).
  4. Brasiliero, F.V., Ezhilchelvan, P.D., Shrivastava, S.K., Speirs, N.A. and Tao, S. Efficient Protocols for Fail-silent Nodes in Distributed Systems. (download PDF).
  5. Shrivastava, S.K. and McCue, D.L. Structuring Fault-Tolerant Object Systems for Modularity in a Distributed Environment. (download PDF).
  6. Megson, G.M. and Chen, X. A Survey and Analysis of Partitioning and Mapping Methods for Regular Arrays. (download PDF).
  7. Megson, G.M. Systematic Construction of Trigonometric Neural Networks. (download PDF).
  8. Rubira-Calsavara, C.M.F. and Stroud, R.J. Forward and Backward Error Recovery in C++. (download PDF).
  9. Shrivastava, S.K. and Tully, A. Active Replication of Distributed Programs: Problems and Solutions. (download PDF).
  10. Fabre, J.-C. and Randell, B. An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. (download PDF).
  11. Snow, C.R. On the Comparison of Two Threads Packages. (download PDF).
  12. Megson, G.M. Mapping Certain Non-Linear Dependencies onto Regular Arrays. (download PDF).
  13. Little, M.C., McCue, D.L. and Shrivastava, S.K. Maintaining Information about Persistent Replicated Objects in a Distributed System. (download PDF).
  14. Megson, G.M. and Chen, X. A Methodology of Partitioning and Mapping for Fixed-Shape and Given-Mesh Regular Arrays. (download PDF).
  15. Fitzgerald, J.S. and Moore, R. Experiences in Developing a Proof Theory for VDM Specifications. (download PDF).
  16. Janicki, R. and Koutny, M. Order Structures and Generalisations of Szpilrajn’s Theorem. (download PDF).
  17. Koelmans, A.M., Burns, F.P. and Kinniment, D.J. Use of a Theorem Prover for Transformational Synthesis. (download PDF).
  18. Yakovlev, A., Petrov, A.I. and Lavagno, L. High Speed Asynchronous Arbiter. (download PDF).
  19. Megson, G.M. and Chen, X. A LSGP Partitioning Method for Mapping onto a Given-Shape Regular Array. (download PDF).
  20. Saeed, A., de Lemos, R. and Anderson, T. The Role of Formal Methods in the Requirements Analysis of Safety Critical Systems: A Train Set Example. (download PDF).
  21. Saeed, A., de Lemos, R. and Anderson, T. Formal Techniques for Requirements Analysis for Safe Reactor Control. (download PDF).
  22. Rapanotti, L. and Megson, G.M. Pre-Processing in SADE: Stage I. (download PDF).
  23. Rossiter, B.N. and Heather, M.A. Database Architecture and Functional Dependencies Expressed with Formal Categories and Functors. (download PDF).
  24. Armstrong, J.M. and Mitchell, R.J. Managing Inheritance on Programming Projects. (download PDF).
  25. Armstrong, J.M., Howse, J.R., Mitchell, R.J. and Maung, I. The Role of Inheritance as an Import/Export Mechanism. (download PDF).
  26. Chen, X. and Megson, G.M. A Methodology of Partitioning and Mapping for Given Regular Arrays with Lower Dimension. (download PDF).
  27. Holt, C.M. Proof Sketches. (download PDF).
  28. Little, M.C. and McCue, D.L. Construction and Use of a Simulation Package in C++. (download PDF).
  29. Fabre, J.-C., Deswarte, Y. and Randell, B. Designing Secure and Reliable Applications using FRS: An Object-Oriented Approach. (download PDF).
  30. Hopkins, R.P. Voting Communications in Networks of Concurrent Processes. (download PDF).
  31. Hopkins, R.P. Recursion and Refinement for a Generalisation of the Petri Box Calculus. (download PDF).
  32. Duan, Z. and Holt, C.M. Negation by Default for Framing Temporal Logic Programming. (download PDF).
  33. Xu, J., Bondavalli, A. and Di Giandomenico, F. Software Fault Tolerance: Dynamic Combination of Dependability and Efficiency. (download PDF).
  34. Xu, J. and Lee, Q. Topological Properties of Typical Interconnection Networks: Fault Tolerance, Communication Delay and Connection Cost. (download PDF).
  35. Xu, J. and Randell, B. Object-oriented Construction of Fault-tolerant Software. (download PDF).
  36. Hodge, D.R. Effective Management of Very Large Computer Systems. (download PDF).
  37. Rapanotti, L. and Megson, G.M. Pre-Processing in SADE: Stage II. (download PDF).
  38. Capretz, L.F. and Lee, P.A. Object-oriented Design: Guidelines and Techniques. (download PDF).
  39. Megson, G.M., Aleksandrov, V.N. and Dimov, I.T. Systolic Matrix Inversion using Monte Carlo Method. (download PDF).
  40. Barrett, P.A., Shrivastava, S.K., Speirs, N.A. and Waterworth, A. Building Fault-tolerant Distributed Computing Systems using Standard Components. (download PDF).
  41. Kaya, D. and Wright, K. Parallel Algorithms for LU Decomposition on a Shared Memory Multiprocessor. (download PDF).
  42. Saeed, A., Anderson, T. and de Lemos, R. Robust Requirements Specifications for Safety-Critical Systems. (download PDF).
  43. Duan, Z., Koutny, M. and Holt, C.M. Projection in Temporal Logic Programming. (download PDF).
  44. Caughey, S.J., Parrington, G.D. and Shrivastava, S.K. SHADOWS – A Flexible Support System for Objects in Distributed Systems. (download PDF).
  45. Speirs, N.A., Tao, S., Brasileiro, F.V., Ezhilchelvan, P.D. and Shrivastava, S.K. The Design and Implementation of Voltan Fault-tolerant Nodes for Distributed Systems. (download PDF).
  46. Blyth, A.J.C., Chudge, J., Dobson, J.E. and Strens, M.R. A Framework for Modelling Evolving Requirements. (download PDF).
  47. Blyth, A.J.C., Chudge, J., Dobson, J.E. and Strens, M.R. ORDIT: A New Methodology to Assist in the Process of Eliciting and Modelling Organisational Requirements. (download PDF).
  48. Lee, P.A. and Phillips, C. Visualising Parallel Numerical Software Performance on a Shared Memory Multiprocessor. (download PDF).
  49. Snow, C.R. and Whitfield, H. Simple Authentication. (download PDF).
  50. Yakovlev, A., Koelmans, A.M. and Lavagno, L. High Level Modelling and Design of Asynchronous Interface Logic. (download PDF).
  51. Ezhilchelvan, P.D. and Shrivastava, S.K. rel/REL: A Family of Reliable Multicast Protocols for Distributed Real-time Systems. (download PDF).
  52. Yakovlev, A., Kishinevsky, M., Kondratyev, A. and Lavagno, L. On the Models for Asynchronous Circuit Behaviour with OR Causality. (download PDF).
  53. Rossiter, B.N., Sillitoe, T.J. and Heather, M.A. Models for Legal Documentation: Using Formal Methods for Quality Assurance in Hypertext Systems. (download PDF).
  54. Rossiter, B.N., Huntley, K.G. and Heather, M.A. Behavioural Modelling of Formal Documents and Active Instruments. (download PDF).
  55. Moszkowski, B. Some very Compositional Temporal Properties. (download PDF).

1994

(back to top)

  1. Barrett, P.A. and Speirs, N.A. Delta-4: An Open Architecture for Dependable Systems. (download PDF).
  2. Aleksandrov, V.N. and Fidanova, S. 2D Regular Arrays for a Special Class of Non Uniform Recurrence Equations. (download PDF).
  3. Cook, R., Pakzad, M. and Phillips, C. Parallel Preconditioners for the Conjugate Gradient Method. (download PDF).
  4. de Lemos, R., Saeed, A. and Anderson, T. Formal Techniqes for Requirements Analysis for Safety-critical Systems. (download PDF).
  5. de Lemos, R., Saeed, A. and Anderson, T. Requirements Analysis for Safety-critical Systems: A Chemical Batch Processing Example. (download PDF).
  6. Heather, M.A. and Rossiter, B.N. Representing Legal Norms with the Pullback Functor f*. (download PDF).
  7. Rapanotti, L. and Megson, G.M. Pre-Processing in SADE: Stage III. (download PDF).
  8. Little, M.C. and McCue, D.L. The Replica Management System: A Scheme for Flexible and Dynamic Replication. (download PDF).
  9. Cook, R. and Phillips, C. A Reformulated Preconditioned Conjugate Gradient Square Method Part 1: The Algorithm. (download PDF).
  10. Cho, G. and Marshall, L.F. A Multicast Service for Mobile Computing. (download PDF).
  11. Romanovsky, A. and Strigini, L. Implementation of Conversations in the Conventional Ada. (download PDF).
  12. Heather, M.A. and Rossiter, B.N. Category Theory: The Mathematics for the Humanities ?. (download PDF).
  13. Burnett, R. and Anderson, T. Reliability Allocation for a System Using Markov Analysis. (download PDF).
  14. Rapanotti, L. and Megson, G.M. Uniformisation Techniques for Integral Recurrence Equations. (download PDF).
  15. Randell, B. and Xu, J. Recovery Blocks. (download PDF).
  16. Robertson, C. and Megson, G.M. Scene Analysis – A Brief Survey. (download PDF).
  17. Xu, J. Sequentially T-diagnosable Systems. (download PDF).
  18. Holt, C.M. Program Verification in a Visual Language. (download PDF).
  19. Holt, C.M. An Algebra of Lines and Boxes. (download PDF).
  20. de Lemos, R., Saeed, A. and Anderson, T. An Approach for the Risk Analysis of Safety Specifications. (download PDF).
  21. Banatre, M., Gefflaut, A., Joubert, P., Morin, C. and Lee, P.A. An Architecture for Tolerating Processor Failures in Shared-memory Multiprocessors. (download PDF).
  22. G.M. Megson and X. Chen Synthesis of Knapsack Problems into Fixed Size Arrays with Lower Dimensions. (download PDF).
  23. A. Semenov and A. Yakovlev Event-based Framework for Verifying High-level Models of Asynchronous Circuits. (download PDF).
  24. D.A. Nelson, B.N. Rossiter and M.A. Heather The Functorial Data Model – An Extension to Functional Databases. (download PDF).
  25. J.C. Bicarregui, J.S. Fitzgerald, R. Moore and B. Ritchie Proof in VDM: Reader’s Notes. (download PDF).
  26. D. Kaya and K. Wright Parallel Algorithms for Reduction of a General Matrix to Upper Hessenberg form on a Shared Memory Multiprocessor. (download PDF).
  27. M. Koutny, L.V. Mancini and G. Pappalardo Two Implementation Relations and the Correctness of Communicating Replicated Processes. (download PDF).
  28. L. Rapanotti and G.M. Megson Mapping Integral Recurrences onto Regular Arrays. (download PDF).
  29. R. de Lemos, A. Saeed and T. Anderson On the Safety Analysis of Requirements Specifications. (download PDF).
  30. A.J.C. Blyth and J. Chudge Modelling Organisational Behaviour using Social and Linguistic Constructs. (download PDF).
  31. P.A. Lee and R.J. Stroud C++ As an Introductory Programming Language. (download PDF).
  32. A.J.C. Blyth Modelling and Eliciting Organisational and Information System Requirements for Medical Information Systems. (download PDF).
  33. J. Xu, B. Randell, C.M.F. Rubira-Calsavara and R.J. Stroud Software Fault-tolerance: Towards an Object-oriented Approach. (download PDF).
  34. J. Xu, F. Giandomenico and A. Bondavalli Adaptive Architectures for Hybrid Fault Tolerance in Distributed Computing Systems. (download PDF).
  35. M.J. Kim, D.A. Nelson and B.N. Rossiter Evaluation of the Object-relational dbms. (download PDF).

1995

(back to top)

  1. M. Koutny and M. Pietkiewicz-Koutny On the Sleep Sets Method for Partial Order Verification of Concurrent Systems. (download PDF).
  2. A. Semenov and A. Yakovlev Combining Partial Orders and Symbolic Traversal for Eficient Verification of Asynchronous Circuits. (download PDF).
  3. Chen, X. and G.M. Megson Automatic Parallel Code Generation for Given Arrays. (download PDF).
  4. R. de Lemos, A. Saeed and T. Anderson Formal Techniques for Requirements Analysys for Safety-Critical Systems. (download PDF).
  5. R. de Lemos, R. Fields and A. Saeed Analysis of Safety Requirements in the Context of System Faults and Human Errors. (download PDF).
  6. B.N. Rossiter, D.A. Nelson and M.A. Heather The Categorical Product Data Model as a Formalism for Object-Relational Databases. (download PDF).
  7. X. Chen and G.M. Megson Automatic Parallel Code Generation for Given Arrays. (Part 2: Practice and Results). (download PDF).
  8. J. Xu, B. Randell, A. Romanovsky, C.M.F. Rubira-Calsavara, R.J. Stroud and Z. Wu Fault Tolerance in Concurrent Object-Oriented Software Through Co-ordinated Error Recovery. (download PDF).
  9. G. Cho and L.F. Marshall An Efficient Location and Routing Scheme for Mobile Computing Environments.. (download PDF).
  10. G.D. Parrington, S.K. Shrivastava, S.M. Wheater and M.C. Little The Design and Implementation of Arjuna.. (download PDF).
  11. G.D. Parrington A Stub Generation System for C++. (download PDF).
  12. D.A. Nelson and B.N. Rossiter Suitability of Programing Languages for Categorical Databases. (download PDF).
  13. R.J. Stroud and Z. Wu Using Meta-Object Protocols to Implement Atomic Data Types. (download PDF).
  14. R.J. Stroud and Z. Wu Using Meta-Objects to Adapt a Persistent Object System to Meet Application Needs. (download PDF).
  15. A. Yakovlev, A.M. Koelmans, A. Semenov and D.J. Kinniment Modelling, Analysis and Synthesis of Asynchronous Control Circuits Using Petri Nets. (download PDF).
  16. J. Xu and B. Randell Responsive Roll-Forward Recovery in Embedded Real-Time Systems. (download PDF).
  17. A. Semenov, A. Yakovlev and N. Anisimov Specification and Verification of a Self-Timed Token Ring Protocol. (download PDF).
  18. J.-C. Fabre, V. Nicomette, T. Perenou, R.J. Stroud and Z. Wu Implementing Fault Tolerant Applications Using Reflective Object-Oriented Programming. (download PDF).
  19. Z. Wu, R.J. Stroud, K. Moody and J. Bacon Data Consistency in a Distributed Persistent Object System. (download PDF).
  20. Wu, Z., R.J. Stroud, K. Moody and J. Bacon The Design and Implementation of a Distributed Transaction System Based on Atomic Data Types. (download PDF).
  21. M.R. Strens and R.C. Sugden Criteria for the Assessment of Representation Methods as Vehicles for Handling Change. (download PDF).
  22. R.C Sugden and M.R. Strens Change Handling Criteria for the Assessment of Requirements and Design Methods. (download PDF).
  23. A. Yakovlev Designing Control Logic for Counterflow Pipeline Processor Using Petri Nets. (download PDF).
  24. L.E. Buzato Management of Object-Oriented Action Based Distributed Programs. (download PDF).
  25. R.J. de A. Macedo Fault-Tolerant Group Communication Protocols for Asynchronous Systems. (download PDF).
  26. J.W. Harley Dataflow Development of Medium-Grained Parallel Software. (download PDF).
  27. L. Rapanotti and G.M. Megson A Class of Dynamic Data Dependencies and Their Localisation. (download PDF).
  28. N. Thomas and I. Mitrani Routing Among Servers with Breakdowns and Retained Queues. (download PDF).
  29. M. Pietkiewicz-Koutny and A. Yakovlev Non-Pure Nets and Their Transition Systems. (download PDF).
  30. Holt, C.M. Programing Within VR. (download PDF).
  31. C.M Holt Language Spaces. (download PDF).
  32. M.A. Heather and B.N. Rossiter Geometric Theory of Machine Awareness for Legal Information Retrieval and Reasoning. (download PDF).
  33. D.A. Nelson and B.N. Rossiter Prototyping a Formal Object-Oriented Database in P/FDM. (download PDF).
  34. R.J. Stroud and Z. Wu Using Metaobject Protocols to Satisfy Non-Functional Requirements. (download PDF).
  35. R. Burnett and T. Anderson Trade-Off Between Cost and Reliability During the Design Phase. (download PDF).
  36. Z. Wu and R.J. Stroud Using Metaobject Protocols to Structure Operating Systems. (download PDF).
  37. Holt, C.M. Comparing Visual and Textual Languages. (download PDF).
  38. K.S. Low and A. Yakovlev Token Ring Arbiters: An Excercise in Asynchronous Logic Design with Petri-Nets. (download PDF).
  39. A.M. Koelmans, A. Yakovlev, D.J. Kinniment and Y. Xu PNIF: An Interchange Format for System Specification with Coloured Petri Nets. (download PDF).
  40. A. Semenov, A.M. Koelmans, L. Lloyd and A. Yakovlev Designing an Asynchronous Processor Using Petri-Nets. (download PDF).
  41. N.A. Starodoubstev, A. Yakovlev and S.Y. Petrov Use of VHDL Enviroment for Interactive Synthesis of Asynchronous Circuits. (download PDF).
  42. L.J. Steggles Higher-Order Algebra with Transfinite Types. (download PDF).
  43. A. Romanovsky, J. Xu and B. Randell Exception Handling and Resolution in Distributed Object-Oriented Systems. (download PDF).

1996

(back to top)

  1. F.V. Brasileiro Constructing Fail-Controlled Nodes for Distributed Systems: A Software Approach. (download PDF).
  2. M. Pakzad, J.L. Lloyd and C. Phillips Independent Columns: A New Parallel ILU Preconditioner for the PCG Method. (download PDF).
  3. A. Romanovsky Practical Exception Handling and Resolution in Concurrent Programs. (download PDF).
  4. J.N. Coleman, D.J. Kinniment, F.P. Burns and A.M. Koelmans A Self-Taught Computer Engineering Course. (download PDF).
  5. M. Pietkiewicz-Koutny Transition Systems of Elementary Net Systems with Inhibitor Arcs. (download PDF).
  6. P. Watson, M. Ward and K. Hoyle The System Management of the ICL GOLDRUSH Parallel Database Server. (download PDF).
  7. Holt, C.M. Making Visual Languages More Effective. (download PDF).
  8. A.J. Lait and B. Randell An Assessment of Name Matching Algorithms. (download PDF).
  9. L.J. Steggles and M. Wirsing Formal Software and Hardware Development: A Case Study in the Use of CSDM, SPECTRUM and HOLCF. (download PDF).
  10. M Hesketh On Synthesis of Box Expressions from Petri Boxes. (download PDF).
  11. J.A. Smith and S.K. Shrivastava A System for Fault-Tolerant Execution of Data and Compute Intensive Programs Over a Network of Workstations. (download PDF).
  12. M.A. Heather and B.N. Rossiter Formal Representation of the Logic Embedded in Legal Language. (download PDF).
  13. B.N. Rossiter and M.A. Heather Standards for Assured Legacy Systems. (download PDF).
  14. Duan, Z. An Extended Interval Temporal Logic and a Framing Technique for Temporal Logic Programing. (download PDF).
  15. A. Calsavara and S.K. Shrivastava A Toolkit for Constructing Distributed Object-Oriented Metainformation Systems. (download PDF).
  16. H. Blair, S.J. Caughey, H. Green and S.K. Shrivastava Structuring Call Control Software Using Distributed Objects. (download PDF).
  17. K. Meinke and L.J. Steggles Correctness of Dataflow and Systolic Algorithms: Case Studies in Higher-Order Algebra. (download PDF).
  18. A. Romanovsky Atomic Actions Based on Distributed/Concurrent Exception Resolution. (download PDF).

1997

(back to top)

  1. A. Romanovsky, B. Randell, R.J. Stroud, J. Xu and A.F. Zorzo Implementing Synchronous Co-ordinated Atomic Actions Based on Forward Error Recovery. (download PDF).
  2. C. Carrion and A. Yakovlev Design and Evaluation of Two Asynchronous Token Ring Adapters. (download PDF).
  3. I. Mitrani and A. Yakovlev Tree Arbiter With Nearest-Neighbour Scheduling. (download PDF).
  4. H.D. Chu and J.E. Dobson FAST: A Framework for Automating Statistics-Based Testing. (download PDF).
  5. A. Semenov, A. Yakovlev, E. Pastor, M.A. Pe±a and J. Cortadella Synthesis of Speed Independent Circuits from STG-unfolding Segment. (download PDF).
  6. A. Semenov, A. Yakovlev, E. Pastor, M.A. Pe±a, J. Cortadella and L. Lavagno Partial Order Based Approach to Synthesis of Speed-Independent Circuits. (download PDF).
  7. S. Pearson and A. Saeed Information Structures for Traceability for Dependable Avionic Systems. (download PDF).
  8. R. de Lemos and J. G. Hall ERTL: An Extension to RTL for Requirements Analysis for Hybrid Systems. (download PDF).
  9. J Wang, A. Saeed and R. de Lemos Subjective Safety Analysis of Safety Requirements Specifications. (download PDF).
  10. L. Lloyd An Open Question – Will the Properties of Electromigration and Thermomigration have an Adverse Effect on the Future of Asynchronous Logic Design?. (download PDF).
  11. N.V. Tikhomirova, I.V. Shturtz and A. Romanovsky Object-Oriented Approach to State Restoration by Reversion in Fault Tolerant Systems. (download PDF).
  12. A. Semenov and A. Yakovlev Contextual Net Unfolding and Asynchronous System Verification. (download PDF).
  13. L. Lloyd, A. Yakovlev and A.M. Koelmans A 2-Phase Asynchronous Event Driven Buffer with Completion Detection Signalling. (download PDF).
  14. M.A. Heather and B.N. Rossiter Unifying Theory for Content Self-awareness in Distributed Multimedia Publishing. (download PDF).
  15. N. Anisimov and M. Koutny Compositional Petri Nets in Protocol Engineering. (download PDF).
  16. C.M. Angus Numerical Software Development with Functional Languages. (download PDF).
  17. C.M. Angus Constructing Configurable Applications by Combining Monads. (download PDF).
  18. S.M. Wheater and M.C. Little The Design and Implementation of a Framework for Configurable Software. (download PDF).
  19. M.C. Little and S.K. Shrivastava Using Application Specific Knowledge for Configuring Object Replicas. (download PDF).
  20. S. Tao Fault Injection Testing of Software Implemented Fault Tolerance Mechanisms of Distributed Systems. (download PDF).
  21. F.V. Brasileiro, P.D. Ezhilchelvan, S.K. Shrivastava, N.A. Speirs Implementing Fail-Silent Nodes for Distributed Systems. (download PDF).
  22. P.D. Ezhilchelvan, F.V. Brasileiro and N.A. Speirs A Timeout Based Message Ordering Protocol for a Lightweight Software Implementation of TMR Systems. (download PDF).
  23. Chu, H.D. An Evaluation Scheme of Software Testing Techniques. (download PDF).
  24. H.D. Chu and J.E. Dobson SITE: A Statistics-based Integrated Test Environment. (download PDF).
  25. M. Hesketh and M. Koutny An Axiomatisation of Duplication Equivalence in the Petri Box Calculus. (download PDF).
  26. A. Romanovsky, S.E. Mitchell and A.J. Wellings On Programming Atomic Actions in Ada 95. (download PDF).
  27. F. Al-Harbi and B.N. Rossiter The Effect of the Iraqi Invasion on Organisations in Kuwait: A Study into Disaster Recovery Plans. (download PDF).
  28. R.C. Sugden and I.N. Purves Decision Support Paradigms for Prescribing in General Practice – Lessons from the PRODIGY Trials. (download PDF).
  29. J. Wang, A. Saeed and R. de Lemos Subjective Safety Analysis for Software Development. (download PDF).
  30. Ingham, D.B., Little, M.C., Caughey, S.J. and Shrivastava, S.K. W3Objects: Bringing Object-Oriented Technology to the Web. (download PDF).
  31. D.B. Ingham, S.J. Caughey and M.C. Little Fixing the “Broken-link” Problem: The W3Objects Approach. (download PDF).
  32. D.B. Ingham, S.J. Caughey and M.C. Little Supporting Highly Manageable Web Services. (download PDF).
  33. J. Xu, F. Di Giandomenico, A. Bondavalli and S. Chiaradonna Definition and Evaluation of Adaptive Fault-Tolerant Architectures in a Distributed Computing Environment. (download PDF).
  34. J. Xu and B. Randell The t/(n-1)-VP Approach to Fault-Tolerant Software. (download PDF).
  35. B. Randell, A. Romanovsky, R.J. Stroud, J. Xu and A.F. Zorzo Co-ordinated Atomic Actions: From Concept to Implementation. (download PDF).
  36. J. Xu, A. Romanovsky and B. Randell Co-ordinated Exception Handling in Distributed Object-Oriented Systems: Improved Algorithm, Correctness and Implementation. (download PDF).
  37. B. Randell, J. Xu and A.F. Zorzo Software Fault Tolerance in Object-Oriented Systems: Approaches, Implementation and Evaluation. (download PDF).
  38. M. Cepin, R. de Lemos, B. Mavko, S. Riddle and A. Saeed An Object-Based Approach to Modelling and Analysis of Failure Properties. (download PDF).
  39. Holt, C.M. Alterable Visual Languages. (download PDF).
  40. A. Romanovsky A Study of Atomic Action Schemes Intended for Standard Ada. (download PDF).
  41. M.C. Little, S.K. Shrivastava, S.J. Caughey and D.B. Ingham Constructing Reliable Web Applications Using Atomic Actions. (download PDF).
  42. Black, D., P.D. Ezhilchelvan and S.K. Shrivastava Determining the Last Membership of a Process Group after a Total Failure. (download PDF).
  43. L.J. Steggles Parameterised Higher-Order Algebraic Specifications. (download PDF).
  44. D.J. Kinniment, A. Yakovlev and B. Gao MetaStable Behaviour in Arbiter Circuits. (download PDF).
  45. M.R. Strens and J. Chudge Using Responsibility Modeling To Match Organizational Change To Changes In The Systems Development Process. (download PDF).
  46. S. Pearson and M. Rowlands Airbus Traceability Case Study. (download PDF).
  47. J. Haveman, S. Paynter and J.M. Armstrong A Transaction Model for Real-Time Systems. (download PDF).
  48. A. Romanovsky and A.F. Zorzo A Distributed Coordinated Atomic Action Scheme. (download PDF).
  49. A.M.P. Barcellos and P.D. Ezhilchelvan An End-to-End Reliable Multicast Protocol Using Polling for Scaleability. (download PDF).
  50. L. Lloyd, K. Heron, A.M. Koelmans and A. Yakovlev Asynchronous Microprocessors: From High Level Model to FPGA Implementation. (download PDF).
  51. J. Haveman Transaction Decomposition: Refinement of Timing Constraints. (download PDF).
  52. J. Xu, A. Romanovsky and B. Randell Coordinated Exception Handling in Distributed Object Systems: from Model to System Implementation. (download PDF).
  53. M. Pietkiewicz-Koutny Morphisms for Inhibitor Nets and Related Transition Systems. (download PDF).
  54. A. Kondratyev, J. Cortadella, M. Kishinevsky, L. Lavagno, A. Taubin and A. Yakovlev Identifying State Coding Conflicts in Asynchronous System Specifications Using Petri Net Unfoldings. (download PDF).
  55. D.J. Kinniment, B. Gao, A. Yakovlev and F. Xia Towards Asynchronous A-D Conversion. (download PDF).
  56. J.S. Fitzgerald A Proof of Satisfiability in Mukherjee and Stavridou’s Ammunition Control System. (download PDF).
  57. J.S. Fitzgerald and C.B. Jones Proof in the Analysis of a Model of a Tracking System. (download PDF).
  58. A. Romanovsky, J. Xu and B. Randell Exception Handling in Object-Oriented Real-Time Distributed Systems. (download PDF).
  59. R. de Lemos and A. Romanovsky Coordinated Atomic Actions in Modelling Objects Cooperation. (download PDF).

1998

(back to top)

  1. A.F. Zorzo, A. Romanovsky, B. Randell, R.J. Stroud, I. Welch and J. Xu Using Coordinated Atomic Actions to Design Dependable Distributed Object Systems. (download PDF).
  2. H.D. Chu and J.E. Dobson An Integrated Test Environment for Distributed Applications. (download PDF).
  3. H.D. Chu and J. Chen Mobile Software Testing over the Internet. (download PDF).
  4. B.N. Rossiter and M.A. Heather Constructing Standards for Cross-Platform Operations. (download PDF).
  5. A. Romanovsky and A.F. Zorzo Coordinated Atomic Actions as a Technique for Implementing Distributed Gamma Computation. (download PDF).
  6. Holt, C.M. Maps of Programs. (download PDF).
  7. F. Xia and A. Yakovlev Overview of Modelling and Analysis Techniques for Arbiters and Related Circuits. (download PDF).
  8. F. Xia, I.G. Clark, A. Yakovlev and A.C. Davies Petri Net Models of Metastable Operations in Latch Circuits. (download PDF).
  9. B. Randell, A. Romanovsky, R.J. Stroud, J. Xu, A.F. Zorzo, D. Schwier and F. von Henke Coordinated Atomic Actions: Formal Model, Case Study and System Implementation. (download PDF).
  10. R. de Lemos Objecting ‘Beyond Objects’. (download PDF).
  11. R. de Lemos On the Integration of Requirements Analysis and Safety Analysis for Safety-Critical Systems. (download PDF).
  12. M. Pietkiewicz-Koutny Synthesis of ENI-Systems Using Minimal Regions. (download PDF).
  13. M.R. Strens, M.J. Martin, J.E. Dobson and S. Plagemann Business and Market Models of Brokerage in Network -Based Commerce. (download PDF).
  14. W. Vogler, A. Semenov and A. Yakovlev Unfolding and Finite Prefix for Nets with Read Arcs. (download PDF).
  15. S.J. Caughey, D.B. Ingham and P. Watson Metabroker: A Generic Broker for Electronic Commerce. (download PDF).
  16. M. Koutny and G. Pappalardo The ERT Model of Fault-Tolerant Computing and Its Application to a Formalisation of Coordinated Atomic Actions. (download PDF).
  17. L.J. Steggles and P. Kosiuczenko A Formal Model for SDL Specifications based on Timed Rewriting Logic. (download PDF).
  18. M.R. Strens, M.J. Martin and J.E. Dobson Modelling Business Scenarios for Electric Brokerage. (download PDF).
  19. R. de Lemos and A. Romanovsky Exception Handling in a Co-operative Object-Oriented Approach. (download PDF).
  20. R.S. Allen A Graphical system for Parallel Software Development. (download PDF).
  21. G. Di Marzo Serugendo, N. Guelfi, A. Romanovsky and A.F. Zorzo CO-OPN/2 Specification of the DSGamma System Designed Using Co-ordinated Atomic Actions. (download PDF).
  22. M.J. Martin, J.E. Dobson and M.R. Strens An Architectural Approach to Brokerage in Network Based Commerce. (download PDF).
  23. L. Lloyd, A. Yakovlev, E. Pastor and A.M. Koelmans Estimations of Power Consumption in Asynchronous Logic as Derived from Graph Based Circuit Representations. (download PDF).
  24. F. Ranno, S.K. Shrivastava and S.M. Wheater A System for Specifying and Coordinating the Execution of Reliable Distributed Aplications. (download PDF).
  25. S.K. Shrivastava and S.M. Wheater Architectural Support for Dynamic Reconfiguration of Large Scale Distributed Apllications. (download PDF).
  26. F. Ranno, S.K. Shrivastava and S.M. Wheater A Language for Specifying the Composition of Reliable Distributed Applications. (download PDF).
  27. S.M. Wheater, S.K. Shrivastava and F. Ranno A CORBA Compliant Transactional Workflow System for Internet Applications. (download PDF).
  28. Y.-M. Wang, M.J. Merritt and A. Romanovsky Guaranteed Deadlock Recovery: Deadlock Resolution with Rollback Propagation. (download PDF).
  29. A. Yakovlev, D.J. Kinniment and F. Xia FIFO Buffer with Real-Time Interface. (download PDF).
  30. Holt, C.M. Using Views to Aid Language Design. (download PDF).
  31. M.C. Little and S.K. Shrivastava Distributed Transactions in Java. (download PDF).
  32. M.C. Little and S.K. Shrivastava Java Transactions for the Internet. (download PDF).
  33. M.C. Little and S.K. Shrivastava Building Configurable Applications in Java. (download PDF).
  34. F. Xia and I.G. Clark Complementing the Role Model Method with Petri Net Techniques in Studying Issues of Data Freshness of the Four-slot Mechanism. (download PDF).
  35. S.J. Caughey, M.C. Little and S.K. Shrivastava Checked Transactions in an Asynchronous Message Passing Environment. (download PDF).
  36. M.C. Little and S.K. Shrivastava Integrating the Object Transaction Service with the Web. (download PDF).
  37. L.J. Steggles and P. Kosiuczenko A Timed Rewriting Logic Semantics for SDL: A Case Study of the Alternating Bit Protocol. (download PDF).

1999

(back to top)

  1. R. Benjamin, B. Gladman and B. Randell Protecting IT Systems from Cyber Crime. (download PDF).
  2. P. Watson and S. Parastatidis The NIP Parallel Object-Oriented Computational Model. (download PDF).
  3. P.D. Ezhilchelvan and A. Romanovsky Engineering Look-ahead in Distributed Conversations. (download PDF).
  4. Holt, C.M. Exceptions and Eventflow. (download PDF).
  5. A. Romanovsky Class Diversity Support in Object-Oriented Languages. (download PDF).
  6. J. Xu, B. Randell, A. Romanovsky, R.J. Stroud, A.F. Zorzo, E. Canver and F. von Henke Rigorous Development of a Safety-Critical System Based on Coordinated Atomic Actions. (download PDF).
  7. E. Tramontana and R. de Lemos A Reflective Approach for Describing Cooperation between Objects. (download PDF).
  8. S. Merad, R. de Lemos and T. Anderson Dynamic Selection of Software Components in the Face of Changing Requirements. (download PDF).
  9. P.D. Ezhilchelvan and S.K. Shrivastava Enhancing Replica Management Services to Cope with Group Failures. (download PDF).
  10. P. Popov, A. Romanovsky and L. Strigini Choosing Effective Methods for Design Diversity – How to Progress from Intuition to Science. (download PDF).
  11. A.F. Zorzo A Production Cell Controlled by Dependable Multiparty Interactions. (download PDF).
  12. R. de Lemos and A. Saeed Validating Formal Verification using Safety Analysis Techniques. (download PDF).

2000

(back to top)

  1. A. Romanovsky Abstract Object State and Version Recovery in N-Version Programming. (download PDF).
  2. A.F. Zorzo and R.J. Stroud A Distributed Object-Oriented Framework for Dependable Multiparty Interactions. (download PDF).
  3. I. Welch and R.J. Stroud Dalang – A Reflective Extension for Java. (download PDF).
  4. M. Pietkiewicz-Koutny Synthesis of Net systems with Inhibitor Arcs from Step Transition systems. (download PDF).
  5. R. de Lemos A Co-operative Object-Oriented Architecture for Adaptive Systems. (download PDF).
  6. R. de Lemos A cooperative Object-Oriented Style for Control Systems. (download PDF).
  7. R. de Lemos Analysis of the Safety Properties of a System from the Viewpoint of the Interactions of its Components. (download PDF).
  8. D.J. Kinniment Measurements on a High Speed Arbiter. (download PDF).
  9. S. Parastatidis and P. Watson An Object-based Software DSM for the NIP Parallel System. (download PDF).
  10. A. Romanovsky Faulty Version Recovery in Object-Oriented N-Version Programming. (download PDF).
  11. B.N. Rossiter and M.A. Heather Image-Object Retrieval in mixed Information Systems: Theory Behind the Practice. (download PDF).
  12. P.D. Ezhilchelvan, C. Liu and A.M.P. Barcellos A Multicast Transport Protocol for Reliable Group Applications. (download PDF).
  13. A. Romanovsky On Structuring Cooperative and Competitive Concurrent Systems. (download PDF).
  14. R. de Lemos and S. Merad A Game Theoretic Solution for the Optimal Selection of Software Components. (download PDF).
  15. A. Romanovsky An Exception Handling Framework for N-Version programming in Object Oriented Systems. (download PDF).
  16. Merad, S. Bayesian and Minimax Solutions to the Run-time Adaptation of a Plant to a Changing Environment. (download PDF).
  17. F. Xia, A. Yakovlev, A. Bystrov, A.M. Koelmans, D.J. Kinniment and D. Shang An Asynchronous Communication Mechanism Using Self-timed Circuits. (download PDF).
  18. A. Bystrov, D.J. Kinniment and A. Yakovlev Priority Arbiters. (download PDF).
  19. J. Kienzle and A. Romanovsky A Framework Based on Design Patterns for Providing Persistence in Object-Oriented Programming Languages. (download PDF).
  20. I.G. Clark Memory Optimisation for Multi-Process State Spaces. (download PDF).
  21. S. Paynter, J.M. Armstrong and J. Haveman Exploiting Formality within an Architectural Design Method. (download PDF).
  22. A. Romanovsky Diversely Designed Classes for Use by Multiple Tasks. (download PDF).
  23. J. Xu, B. Randell and A. Romanovsky A Generic Implementation Approach to Concurrent Fault-Tolerant Software. (download PDF).
  24. Tramontana, E. A Reflective Architecture for Role-Based Designs. (download PDF).
  25. D.T. Stott, N.A. Speirs, J. Xu, S. Bagchi, K. Whisnant, Z. Kalbarczyk and R.K. Iyer Fault Injection Based Assessment of Fail-Silence Provided by Process Duplication versus Internal Error Detection. (download PDF).
  26. M. Koutny and V. Khomenko Deadlock Checking Using Liner Programming and Partial Order Dependencies. (download PDF).
  27. J. Burton, M. Koutny and G. Pappalardo Modelling and Verification of Communicating Processes in the Event of Interface Difference. (download PDF).
  28. L.J. Steggles Specifying and Verifying Real–Time Systems using Second–Order Algebraic Methods: A Case Study of the Railroad Crossing Controller.. (download PDF).
  29. L.F. Marshall and S. Parastatidis Modelling Agent Systems Using the Hotel Analogy. (download PDF).
  30. L.F. Marshall and J. Webber Gotos Considered Harmful and other Programmers’ Taboos. (download PDF).
  31. A. Burns, A.J. Wellings, . Burns , A.M. Koelmans, M. Koutny, A. Romanovsky and A. Yakovlev Towards Modelling and Verification of Concurrent Ada Programs Using Petri Nets. (download PDF).
  32. P.D. Ezhilchelvan, J.-M. HÚlary and M. Raynal Building TMR-Based Reliable Servers Despite Bounded Input Lifetimes. (download PDF).
  33. P.D. Ezhilchelvan, A. Mostefaoui and M. Raynal Randomized Multivalued Consensus. (download PDF).
  34. A. Madalinski, A. Bystrov and A. Yakovlev Statistical Fairness of Ordered Arbiters. (download PDF).
  35. I. Welch and R.J. Stroud Kava – Using Byte code Rewriting to add Behavioural Reflection in Java. (download PDF).
  36. I. Welch and R.J. Stroud Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. (download PDF).
  37. A. Burns, A.J. Wellings, A.M. Koelmans and M. Koutny On Developing and Verifying Design Abstractions for Reliable Concurrent Programming in Ada. (download PDF).
  38. Cachin, C., J. Camenisch, M. Dacier, Y. Deswarte, J.E. Dobson, D. Horne, K. Kursawe, J-C. Lebraud, D. Long, T. McCutcheon, J. Muller, D. Powell, B. Randell, P. Pfitzmann and t-Al Mailicious- and Accidental- Fault Tolerance for Internet Applications (MAFTIA) : Reference Model and Use Cases. (download PDF).
  39. J. Arlat, J.-C. Fabre, V. Issarny, M. KaÔmiche, K. Kanoun and C. Kloukinas DSoS State of the Art Survey. (download PDF).
  40. Madalinski , F. Xia and A. Yakovlev Relative Data Freshness of Asynchronous Communication Mechanisms. (download PDF).
  41. A Grigg and N Henderson A Systematic Method for Development of Real-Time Systems. (download PDF).
  42. Khomenko, V. and M. Koutny Verification of Bounded Petri Nets Using Integer Programming. (download PDF).
  43. S. Paynter, J.M. Armstrong and J. Haveman ADL: An Activity Description Language for Real-Time Networks. (download PDF).
  44. A. Romanovsky and J. Kienzle Action-Oriented Exception Handling in Cooperative and Competitive Concurrent Object-Oriented Systems. (download PDF).
  45. F. Garcia , C.M.F. Rubira-Calsavara, A. Romanovsky and J. Xu A Comparative Study of Exception Handling Mechanisms for Building Dependable Object-Oriented Software. (download PDF).
  46. A. Mikhailova and A. Romanovsky Supporting Evolution of Interface Exceptions. (download PDF).
  47. L.J. Steggles Rewriting Logic and Elan: Prototyping Tools for Petri Nets with Time. (download PDF).
  48. Rossiter, B.N. and M.A. Heather and D.A. Nelson A Categorical Formalism for Interoperability based on the Information Resource Dictionary Standard (IRDS). (download PDF).
  49. L.F. Marshall Some Shadows of Eternity: The Internet and Memorials to the Dead. (download PDF).
  50. L.F. Marshall Static Testing Tools for tcl. (download PDF).
  51. A. Yakovlev, F. Xia and D. Shang Synthesis of a Signal-type Asynchronous Data Communication Mechanism and its Hardware Implementation. (download PDF).

2001

(back to top)

  1. P. Veríssimo and F. Neves Service and Protocol Architecture for the MAFTIA Middleware. (download PDF).
  2. Steggles, L.J. Algebraic Prototyping Tools for Petri Nets with Time. (download PDF).
  3. P.D. Ezhilchelvan, S.K. Shrivastava and M.C. Little A Model and Architecture for Conducting Hierarchically Structured Auctions. (download PDF).
  4. A. Romanovsky Exception Handling in Component-Based System Development. (download PDF).
  5. Zamli, K.Z. and P.A. Lee Taxonomy of Process Modeling Languages. (download PDF).
  6. M. Koutny and V. Khomenko An Efficient Algorithm for Unfolding Petri Nets. (download PDF).
  7. C. Molina and L.F. Marshall True Anonymity Without Mixes. (download PDF).
  8. C. Molina and L.F. Marshall Anonymous and Confidential Communications from an IP Addressless Computer. (download PDF).
  9. S. Aljareh and B.N. Rossiter Towards Security in Multi-agency Clinical Information Services. (download PDF).
  10. P. Popov, S. Riddle, A. Romanovsky and L. Strigini On Systematic Design of Protectors for Employing OTS Items. (download PDF).
  11. L.B. Arief and N.A. Speirs A UML Tool for an Automatic Generation of Simulation Programs. (download PDF).
  12. A. Romanovsky Looking Ahead in Atomic Actions with Exception Handling. (download PDF).
  13. K. Heljanko, V. Khomenko and M. Koutny Parallelisation of the Petri Net Unfolding Algorithm. (download PDF).
  14. N. Henderson Introducing Real-time Interactions. (download PDF).
  15. A. Romanovsky and Bo. Sanden Except for Exception Handling. (download PDF).
  16. V. Khomenko, M. Koutny and A. Yakovlev Detecting State Coding Conflicts in STGs Using Integer Programming. (download PDF).
  17. C. Gacek, T Lawrie and L.B. Arief The Many Meanings Of Open Source. (download PDF).
  18. Welch, I., Armstrong, J. M., Cachin, C., Correia, M., Costes, A., Miranda, H., Neves, N. F., Neves, N. M., Poritz, J. A., Randell, B., Rodrigues, L., Stroud, R. J., Veríssimo, P. and Waidner, M. First Specification of APIs and Protocols for the MAFTIA Middleware. (download PDF).
  19. A. Avizienis, J.-C. Laprie and B. Randell Fundamental Concepts of Dependability. (download PDF).
  20. C.B. Jones On the Search for Tractable Ways of Reasoning about Programs. (download PDF).
  21. V. Khomenko, M. Koutny and W Vogler Canonical Prefixes of Petri-Net Unfoldings. (download PDF).
  22. C. Molina and L.F. Marshall Untraceability of Mobile Internet Users. (download PDF).
  23. A. Bystrov and A. Yakovlev Asynchronous Circuit Synthesis by Direct Mapping: Interfacing to Environment. (download PDF).
  24. A. Bystrov, M. Koutny and A. Yakovlev Visualisation of Partial Order Models in VLSI Design Flow. (download PDF).
  25. Besnard, D. and A.T. Lawrie Bridging Industrial Design and Software Engineering Through Constraints Identification, Solution Space Optimisation and Reuse.. (download PDF).
  26. C.B. Jones, M-O. Killijian, H. Kopetz, E. Marsden, N. Moffat, M. Paulitsch, D. Powell, B. Randell, A. Romanovsky and R.J. Stroud Revised Version of DSoS Conceptual Model. (download PDF).
  27. O. Maevsky,, D.J. Kinniment, A. Yakovlev and A. Bystrov Analysis of the Oscillation Problem in Tri-Flops. (download PDF).
  28. Parastatidis, S. Run-time Support for Parallel Object-Oriented Computing. (download PDF).
  29. Powell, D., Stroud, R.J., Adelsbach, A., Alessandri, D., Cachin, C., Creese, S., Dacier, M., Deswarte, Y., Kursawe, K., Laprie, J.C., Pfitzmann, B., Randell, B., Riordan, J., Veríssimo, P. and Waidner, M. Conceptual Model and Architecture. (download PDF).
  30. D.J. Kinniment, O.V. Maevsky, A. Bystrov, G. Russell and A. Yakovlev On-Chip structures for Timing Measurement and Test. (download PDF).
  31. F. Al-Humaidan and B.N. Rossiter A Taxonomy and Evaluation for Systems Analysis Methodologies in a Workflow Context: Structured Systems Analysis Design Method (SSADM), Unified Modelling Language (UML), Unified Process, Soft Systems Methodology (SSM) and Organisation Process Modelling (O. (download PDF).
  32. J. Burton, M. Koutny, G. Pappalardo and M. Pietkiewicz-Koutny Compositional Development in the Event of Interface Difference. (download PDF).
  33. Cook, N.O., Shrivastava, S.K. and Wheater, S.M. Distributed Object Middleware to Support Dependable Information Sharing between Organisations. (download PDF).
  34. A. Bystrov and A. Yakovlev Synthesis of Asynchronous Circuits with Predictable Latency. (download PDF).

2002

(back to top)

  1. P. Watson Databases and The Grid. (download PDF).
  2. Henderson, N. and S. Paynter The Formal Classification and Verification of Simpson’s 4-slot Asynchronous Communication Mechanism. (download PDF).
  3. J. Burton, M. Koutny and G. Pappalardo Relating Communicating Processes with Different Interfaces. (download PDF).
  4. Burton. J. Compositional Verification of a Network of CSP Processes: Using FDR2 to Verify Refinement in the Event of Interface Difference. (download PDF).
  5. Devillers, R., M. Klaudel, M. Koutny and F. Pommereau Asynchronous Box Calculus. (download PDF).
  6. Arief, L.B., D. Bosio, C. Gacek and M. Rouncefield Dependability Issues in Open Source Software – DIRC Project Activity 5 Final Report. (download PDF).
  7. Yakovlev, A., S.B. Furber, and R. Krenz Design, Analysis and Implementation of a Self-Timed Duplex Communication System. (download PDF).
  8. Lawrie, A.T. and C.B. Jones Goal-Diversity in the Design of Dependable Computer-Based Systems. (download PDF).
  9. V. Khomenko and M. Koutny Branching Processes of High-Level Petri Nets. (download PDF).
  10. Alijareh, S. and B.N. Rossiter Modelling Collaboration in Trusted Multi-agency Environment. (download PDF).
  11. Romanovsky, A., P. Periorellis and A.F. Zorzo On Structuring Integrated Web Applications for Fault Tolerance. (download PDF).
  12. Patino Martinez, M., R. Jimenez Peris and A. Romanovsky Bridging the Gap between Hardware and Software Fault Tolerance. (download PDF).
  13. Alfoudari,S. and L.J. Steggles Formalizing Design Patterns: A Case Study of the Iterator Pattern. (download PDF).
  14. Madalinski, A., A. Bystrov and A. Yakovlev Visualisation of Coding Conflicts in Asynchronous Circuit Design. (download PDF).
  15. H.C.M. Kleijn and M. Koutny Process Semantics of General Inhibitor Nets. (download PDF).
  16. C.B. Jones, A. Romanovsky and I. Welch A Structured Approach to Handling On-Line Interface Upgrades. (download PDF).
  17. B.N. Rossiter and M.A. Heather Anticipatory Adjointness of E-Science Computation on the Grid. (download PDF).
  18. Udeye, T. and C. Phillips PAJAMA – An Objected-Oriented Package for Parallel Matrix Computations. (download PDF).
  19. Madalinski, A., Bystrov, A. and Yakovlev, A. ICU: A tool for Identifying State Coding Conflicts using STG unfoldings. (download PDF).
  20. Oliveras, C.S. Systems, Advisory Systems and Safety. (download PDF).
  21. Neves,N. F., Veríssimo, P. Complete Specification of APIs and Protocols for the MAFTIA Middleware. (download PDF).
  22. Besnard, D., Greathead, D. A coginitve approach to safe violations. (download PDF).
  23. Lee, P.A., Phillips, C. An Assessment of C++ as an Introductory Teaching Language. (download PDF).
  24. Khomenko, V., Koutny, M., Yakovlev, A. Detecting State Coding Conflicts in STG Unfoldings Using SAT. (download PDF).
  25. Romanovsky, A., Fabre, J-C., Issarny, V., Jones, C., Levy, N., Marsden, E., Periorellis, P., Rodriguez, M., Tartanoglu, F., Welch, I. Further Results on Architectures and Dependability Mechanisms for Dependable SoSs. (download PDF).
  26. Guerra, P.A. de C., Rubira, C.M.F., Romanovsky, A. and de Lemos, R. Integrating COTS Software Components into Dependable Software Architectures. (download PDF).
  27. Anderson, T., Feng, M., Riddle, S., Romanovsky, A. Protective Wrapper Development: A Case Study. (download PDF).
  28. Di Marzo Serugendo, G. and Romanovsky, A. Designing Fault-Tolerant Mobile Systems. (download PDF).
  29. Cacitti, L., Besnard, D. Interface changes generating accidents. A schema-based approach of negative transfer. (download PDF).
  30. Owen, D.J., Ezhilchelvan, P.D. Verifiable Fault-Tolerant Transformation of a Real-Time Legacy System. (download PDF).
  31. Tartanoglu, F., Issarny, V., Romanovsky, A., Levy N. Coordinated Forward Error Recovery for Web Services. (download PDF).

2003

(back to top)

  1. Gaudel, M., Issarny, V., Jones, C., Kopetz, H., Marsden, E., Moffat, N., Paulitsch, M., Powell, D., Randell, B., Romanovsky, A., Stroud, R., Taiani, F. Final Version of DSoS Conceptual Model (CSDA1). (download PDF).
  2. Powell, D., Stroud, R. Conceptual Model and Architecture for MAFTIA. (download PDF).
  3. Welch, I., Warne, J., Ryan, P., Stroud, R. Architectural Analysis of MAFTIA’s Intrusion Tolerance Capablities. (download PDF).
  4. Paynter, S. E., Henderson N. and Armstrong, J. M. Ramifications of Metastability in Bit Variables Explored Via Simpson’s 4-Slot Mechanism. (download PDF).
  5. Arief, B., Besnard D. Technical and Human Issues in Computer-Based Systems Security. (download PDF).
  6. Besnard, D., Greathead, D. When mental models go wrong. Co-occurrences in dynamic, critical systems.. (download PDF).
  7. Vollset, E. and Ezhilchelvan, P. A Survey of Reliable Broadcast Protocols for Mobile Ad-hoc Networks. (download PDF).
  8. Lee, P. A. and Webber, J Taxonomy for Visual Parallel Programming. (download PDF).
  9. Besnard, D., Arief, B. Computer security impaired by legal users. (download PDF).
  10. Steggles, L. J. Verifying an Infinite Systolic Algorithm using Third-Order Algebraic Methods. (download PDF).
  11. Wright, K. Adaptive Methods for Piecewise Polynomial Collocation for Ordinary Differential Equations. (download PDF).
  12. Woodman, S.J., Morgan, G., Parkin, S.E. Portal Replication for Web Application Availability Via SOAP. (download PDF).
  13. Anderson, T., Feng, M., Riddle, S., Romanovsky, A. Error Recovery for a Boiler System with OTS PID Controller. (download PDF).
  14. Palmer, J., Mitrani, I. Dynamic Server Allocation in Heterogeneous Clusters. (download PDF).
  15. Henderson, N. Proving the Correctness of Simpson’s 4-slot ACM Using An Assertional Rely-Guarantee proof method. (download PDF).
  16. Dobson, J. and Periorellis, P. Models of Organisational Failure (PCE4). (download PDF).
  17. Periorellis, P. Travel Agent Case Study, Systems Integration. (download PDF).
  18. Periorellis, P. Addressing Dependability in Multiple Domains of Management. (download PDF).
  19. Cooper, D. E. , Ezhilchelvan, P. , Mitrani, I. High Coverage Multicasting for Mobile Ad-hoc Networks. (download PDF).
  20. Jones, C. A Formal Basis for some Dependability Notions. (download PDF).
  21. Jones, C. Operational Semantics: concepts and their expression. (download PDF).
  22. Randell, B. On Failures and Faults. (download PDF).
  23. Hayes, I., Jackson, M. and Jones, C. Determining the specification of a control system from that of its environment. (download PDF).
  24. Bryans, J. and Ryan, P. A Dependability Analysis of the Chaum Digital Voting Scheme.. (download PDF).
  25. Molina-Jimenez, C., Shrivastava, S., Solaiman, E., and Warne, J. Contract Representation for Run-time Monitoring and Enforcement. (download PDF).
  26. Solaiman, E., Molina-Jimenez, C. and Shrivastava, S. Model Checking Correctness Properties of Electronic Contracts. (download PDF).
  27. Gacek, C. and Arief, B. Proceedings of the Open Source Software Development Workshop. (download PDF).
  28. Khomenko, V., Koutny, M. and Yakovlev, A. Logic Synthesis Avoiding State Space Explosion. (download PDF).
  29. Cook, N., Shrivastava, S. and Wheater, S. Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. (download PDF).
  30. Parastatidis, S. and Watson, P. NEReSC Core Grid Middleware. (download PDF).
  31. Pitsilis, G. and Marshall, L. Choosing reputable Resources in Atomistic Peer-to-Peer Environments. (download PDF).
  32. Ezhilchelvan, P., Brasileiro, F., and Speirs, N. A Timeout-Based Message Ordering Protocol for a Lightweight Software Implementation of TMR Systems. (download PDF).
  33. Besnard, D. and Baxter, G. Human compensations for undependable systems. (download PDF).
  34. Ezhilchelvan, P. D., and Shrivastava, S. K. Systematic Development of a Family of Fair Exchange Protocols. (download PDF).
  35. Anderson, T., Feng, M., Riddle, S., and Romanovsky, A. Investigative Case Study: Protective Wrapping of OTS items in Simulated Environments. (download PDF).
  36. Vollset, E. and Ezhilchelvan, P. An Efficient Reliable Broadcast protocol for Mobile Ad-hoc Networks. (download PDF).
  37. Palmer, J. and Mitrani, I. Optimal Server Allocation in Reconfigurable Clusters with Multiple Job Types. (download PDF).

2004

(back to top)

  1. Mpoeleng, D., Ezhilchelvan, P.D. and Speirs, N.A. From Crash Tolerance to Authenticated Byzantine Tolerance: a Structured Approach, the Cost and Benefits. (download PDF).
  2. Parastatidis, S., Webber, J., Watson, P. and Rischbeck, T. A Grid Application Framework based on Web Services Specifications and Practices. (download PDF).
  3. Lee, P.A., Hamilton, M.D., and Parastatidis, S A Visual Language for Parallel, Object-Oriented Programming. (download PDF).
  4. Shaw, O., Koelmans, A., Steggles, J. and Wipat, A. Applying Petri Nets to Systems Biology using XML Technologies. (download PDF).
  5. Armstrong, J DERIDASC Scientific Background. (download PDF).
  6. Armstrong, J.M. Critical Thinking About ‘Critical Thinking’. (download PDF).
  7. Armstrong, J.M. and Paynter, S.P. Safe Systems: Construction, Destruction, and Deconstruction. (download PDF).
  8. Armstrong, J.M. Danger: Derrida at Work. (download PDF).
  9. Armstrong, J.M. and Paynter S.P. The Deconstruction of Safety Arguments Through Adversarial Counter-argument. (download PDF).
  10. Di Ferdinando, A., Ezhilchelvan, P. and Mitrani, I. Design and Evaluation of a QoS-Adaptive System for Reliable Multicasting. (download PDF).
  11. Cook, N., Robinson, P., and Shrivastava, S. Component Middleware to Support Non-repudiable Service Interactions. (download PDF).
  12. Molina-Jimenez, C., Shrivastava, S., Crowcroft, J. and Gevros P. On the Monitoring of Contractual Service Level Agreements. (download PDF).
  13. Smith, J. and Watson, P. A Rollback-Recovery Protocol for Wide Area Pipelined Data Flow Computations. (download PDF).
  14. Devito Da Cunha, A. & Greathead, D. Code review and personality: is performance linked to MBTI type?. (download PDF).
  15. Vollset, E. and Ezhilchelvan, P. Design and Evaluation of an Efficient Reliable Manycast protocol for Ad-hoc Networks. (download PDF).
  16. Jones, C. and Randell, B Dependable Pervasive Systems. (download PDF).
  17. Bryans, J., Koutny, M. and Ryan, P. Modelling Opacity using Petri Nets. (download PDF).
  18. Khomenko, V. Computing Shortest Violation Traces in Model Checking Based on Petri Net Unfoldings and SAT. (download PDF).
  19. Thomas, N. Challenges and Opportunities in Grid Performability. (download PDF).
  20. Ryan, P and Bryans, J A Simplified Version of the Chaum Voting Scheme. (download PDF).
  21. Coleman, J., Jefferson, N. and Jones, C. Black Tie Optional: Modelling Programming Language Concepts. (download PDF).
  22. Fisher, M., Kubicek, C., McKee, P., Mitrani, I., Palmer, J. and Smith, R. Dynamic Allocation of Servers in a Grid Hosting Environment. (download PDF).
  23. Devillers, R., Klaudel, H., Koutny, M Petri net semantics of the finite pi-calculus. (download PDF).
  24. Palmer, J. and Mitrani, I. Optimal Tree Structures for Large-Scale Grids. (download PDF).
  25. Woodman, S.J., Palmer, D.J., Shrivastava, S.K. and Wheater, S.M. Distributed Enactment of Composite Web Services. (download PDF).
  26. Woodman, S.J., Palmer, D.J., Shrivastava, S.K. and Wheater, S.M. Notations for the Specification and Verification of Composite Web Services. (download PDF).
  27. Parastatidis, S., Webber, J. and Watson, P. Using Web Services to Build Grid Applications – The “No Risk” WSGAF Profile. (download PDF).
  28. Parastatidis, S., Webber, J. Assessing the Risk and Value of Adopting Emerging and Unstable Web Services Specifications. (download PDF).
  29. Anderson, T., Randell, B., Romanovsky, A. Wrapping the Future. (download PDF).
  30. Hoare, T., Jones, C., Randell, B. Extending the Horizons of DSE (GC6). (download PDF).
  31. Periorellis, P., Townson, C., English, P. Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering. (download PDF).
  32. Bryans, J. W., Kounty, M., Ryan, P. Y. A. Modelling Dynamic Opacity using Petri Nets with Silent Actions. (download PDF).
  33. vanderMeulen, M., Riddle, S., Strigini, L., Jefferson, N. Protective Wrapping of Off-the-Shelf Components. (download PDF).
  34. Khomenko, V., Madalinski, A., Yakovlev, A. Resolution of Encoding Conflicts by Signal Insertion and Concurrency Reduction Based on STG Unfoldings. (download PDF).
  35. Paynter, S.E., Henderson, N., Armstrong, J.M. Metastability in Asynchronous Wait-Free Protocols. (download PDF).
  36. Andras, P. A Model for Emergent Chaotic Order in Small Neural Networks. (download PDF).
  37. Smith, J., Watson, P Applying Low-Overhead Rollback-Recovery to Wide Area Distributed Query Processing. (download PDF).
  38. Mohammad, A., Speirs,N. A Wan Emulator for CORBA Applications. (download PDF).
  39. Gorbenko, A., Kharchenko, V., Popov, P., Romanovsky, A., Boyarchuk, A. Development of Dependable Web Services out of Undependable Web Components. (download PDF).
  40. Ryan, P.Y.A A Variant of the Chaum Voter-verifiable Scheme. (download PDF).
  41. Tartanoglu, F., Levy, N., Issarny, V., Romanovsky, A. Using the B Method for the Formalization of Coordinated Atomic Actions. (download PDF).
  42. Palmer, J., Mitrani, I. Optimal Tree Structures for Large Service Networks. (download PDF).
  43. Gacek, C. Standards and Open Source Software: Twins, Cousins, or Just Neighbours?. (download PDF).
  44. Bryans, J. W., Koutny, M., Mazare, L., Ryan, P. Y. A. Opacity Generalised to Transition Systems. (download PDF).
  45. Killhourhy, K. S., Maxion, R. A. Investigating a Possible Flaw in a Masquerade Detection System. (download PDF).
  46. Tan, K. M. C., Maxion, R. A. Performance Evaluation of Anomaly-Based Detection Mechanisms. (download PDF).
  47. Maxion, R. A., Roberts, R. R. Proper Use of ROC Curves in Intrusion/Anomaly Detection. (download PDF).
  48. Reeder, R. W., Maxion, R. A. Error Analysis of a Security-Oriented User Interface. (download PDF).
  49. Loer,K., Harrison, M. A framework and supporting tool for the model-based analysis for dependable interactive systems in the context of industrial design. (download PDF).
  50. Pitsilis, G., Marshall, L. A Model of Trust Derivation from Evidence for Use in Recommendation Systems. (download PDF).
  51. Pitsilis, G., Marshall, L. Trust as a key to improving Recommendation Systems. (download PDF).
  52. Loer, K., Harrison, M.D. Analysing and modelling context in mobile systems to support design. (download PDF).
  53. Randell, B. Dependability, Structure and Infrastructure. (download PDF).
  54. Iliasov, A., Romanovsky, A. Exception Handling in Coordination-based Mobile Environments. (download PDF).
  55. Gorbenko, A., Kharchenko, V., Popov, P., Romanovsky, A. Dependable Composite Web Services with Components Upgraded Online: Solutions, Models and Implementation. (download PDF).
  56. Chaum, D., Ryan, P.Y.A., Schneider, S.A. A Practical, Voter-verifiable Election Scheme. (download PDF).
  57. Sun Y., Wipat A., Pocock M., Lee P., Watson P., Flanagan K. and Worthington J. A Grid-based System for Microbial Genome Comparison and Analysis. (download PDF).
  58. Vollset E.W., Ezhilchelvan P.D. Enabling reliable many-to-many communication in ad-hoc pervasive environments. (download PDF).

2005

(back to top)

  1. Jones, C. B. Splitting Atoms Safely. (download PDF).
  2. Khomenko, V., Kondratyev, A., Koutny, M., Vogler, W. Merged Processes – a New Condensed Representation of Petri Net Behaviour. (download PDF).
  3. Burton, J. Refinement-after-hiding: a small case study. (download PDF).
  4. Jones, C., Lomet, D., Romanovsky, A., Weikum, G., Fekete, A., Gaudel, M.C., Korth, H. F., Lemos, R., Moss, E., Rajwar, R., Ramamritham, K., Randell, B., Rodrigues, L. The Atomic Manifesto: a Story in Four Quarks. (download PDF).
  5. Devillers, R., Klaudel, H., Koutny, M. A Petri net translation of pi-calculus terms. (download PDF).
  6. Morgan, G. Scalable Massively Multiplayer Online Games. (download PDF).
  7. Yan, J., Randell, B. Security in Computer Games: from Pong to Online Poker. (download PDF).
  8. Watson, P., Fowler, C. An Architecture for the Dynamic Deployment of Web Services on a Grid or the Internet. (download PDF).
  9. Randell, B. Reminiscences of Project Y and the ACS Project. (download PDF).
  10. Jones, C. B. Specification before Satisfaction. (download PDF).
  11. Smith, J., Watson, P. Fault-Tolerance in Distributed Query Processing. (download PDF).
  12. Coleman, J. Examining BPEL’s Compensation Construct. (download PDF).
  13. Niaouris, A., Koutny, M. An Algebra of Timed-Arc Petri Nets. (download PDF).
  14. Coleman, J., Jones, C., Oliver, I., Romanovsky, A., Troubitsyna, E. RODIN (Rigorous Open Development Environment for Complex Systems). (download PDF).
  15. Gorbenko, A., Kharchenko, V., Popov, P., Romanovsky, A. Dependable Composite Web Services with Components Upgraded Online. (download PDF).
  16. Parastatidis, S., Webber, J., Woodman, S., Kuo, D., Greenfield, P. An Introduction to the SOAP Service Description Language. (download PDF).
  17. Parastatidis, S., Webber, J. The SOAP Service Description Language. (download PDF).
  18. Parastatidis, S., Webber, J. MEP SSDL Protocol Framework. (download PDF).
  19. Parastatidis, S., Webber, J. CSP SSDL Protocol Framework. (download PDF).
  20. Kuo, D., Greenfield, P., Parastatidis, S., Webber, J. Rules-based SSDL Protocol Framework. (download PDF).
  21. Woodman, S., Parastatidis, S., Webber, J. Sequencing Constraints SSDL Protocol Framework. (download PDF).
  22. Burton, J. The Theory and Practice of Refinement-After-Hiding. (download PDF).
  23. Burton, J. Relaxing Atomicity and Verifying Correctness: Considering the Case of an Asynchronous Communication Mechanism. (download PDF).
  24. Arkley, P., Riddle, S. Overcoming the Traceability Benefit Problem. (download PDF).
  25. Wu, J., Periorellis, P. Authorization-Authentication Using XACML and SAML. (download PDF).
  26. Periorellis, P. Trust Position – GOLD. (download PDF).
  27. Shaw, O.J., Steggles, L.J., Wipat, A. Automatic Parameterisation of Stochastic Petri Net Models of Biological Networks. (download PDF).
  28. Pitsilis, G., Marshall, L. A proposal for Trust-Enabled P2P Recommendation Systems. (download PDF).
  29. Randell, B., Ryan, P.Y.A. Voting Technologies and Trust. (download PDF).
  30. Devillers, R., Klaudel, H., Koutny, M. A Petri Net Semantics of a Simple Process Algebra for Mobility. (download PDF).
  31. Robinson, P., Cook, N., Shrivastava, S. Implementing Fair Non-repudiable Interactions with Web Services. (download PDF).
  32. Molina-Jimenez, C., Shrivastava, S., Warne, J. A Method for Specifying Contract Mediated Interactions. (download PDF).
  33. Butler, M., Jones, C., Romanovsky, A., Troubitsyna, E. Proceedings of the Workshop on Rigorous Engineering of Fault-Tolerant Systems (REFT 2005). (download PDF).
  34. Thomas, N. 21st UK Performance Engineering Workshop. (download PDF).
  35. Iliasov, A., Romanovsky, A. CAMA: Structured Coordination Space and Exception Propagation Mechanism for Mobile Agents. (download PDF).
  36. Batarfi, O., Snow, C. R. An Approach to the Formalisation of a Certification Policy. (download PDF).
  37. Kleijn, H. C. M., Koutny, M., Rozenberg, G. Towards a Petri net semantics for membrane systems. (download PDF).
  38. Burton, J., Jones, C. B. Investigating Atomicity and Observability. (download PDF).
  39. Cooper, D.E., Ezhilchelvan, P., Mitrani, I., Vollset,E. Optimization of Encounter Gossip Propagation in Mobile Ad-Hoc Networks. (download PDF).
  40. Parastatidis, S., Webber, J. Service-oriented, Distributed, High-Performance Computing. (download PDF).
  41. Conlin, A., Cook, N., Hiden, H., Periorellis, P., Smith, R. GOLD Architecture Document. (download PDF).
  42. Bryans, J. Reasoning about XACML policies using CSP. (download PDF).
  43. Vollset, E., Ezhilchelvan, P.D. Design and Performance-Study of Crash-Tolerant Protocols for Broadcasting and Reaching Consensus in MANETs. (download PDF).
  44. Parastatidis, S., Watson, P., Webber, J. Grid Computing Using Web Services. (download PDF).
  45. CastorFilho, F., Romanovsky, A., Rubira, C. M. F. Verification of Coordinated Exception Handling. (download PDF).
  46. Ezhilchelvan, P. D., Shrivastava, S. A Family of Trusted Third Party based Fair-Exchange Protocols. (download PDF).
  47. Ryan, P. Y. A., Peacock, T. Prêt á Voter: a System Perspective. (download PDF).
  48. Khomenko, V. Derivation of Set and Reset Covers for gC Elements and Standard C Implementation Using STG Unfoldings. (download PDF).
  49. Sun, Y., Wipat, A., Pocock, M., Lee, P., Flanagan, K., Worthington, J. Exploring Microbial Genome Sequences to Identify Protein Families on the Grid. (download PDF).
  50. Kleijn, H.C.M., Koutny, M. Infinite Process Semantics of Inhibitor Nets. (download PDF).
  51. Bonnet, F., Ezhilchelvan, P.D.,Vollset, E.W. Quiescent Consensus in Mobile Ad-hoc Networks using Eventually Storage-Free Broadcasts. (download PDF).
  52. Vollset, E.W. Design and Evaluation of Crash Tolerant Protocols for Mobile Ad-hoc Networks. (download PDF).
  53. Wu, J., Periorellis, P. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH. (download PDF).
  54. Palmer, J., Mitrani, I. Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers. (download PDF).
  55. Robinson, P., Cook, N., Shrivastava, S. A Framework for the Rigorous Implementation of Security Protocols. (download PDF).
  56. Li, P., Chen, Y., Romanovsky, A. Measuring the dependability of Web Services for use in e-Science experiments. (download PDF).

2006

(back to top)

  1. Becker, S., Brogi, A., Gorton, I., Overhage, S., Romanovsky, A., Tivoli, M. Towards an Engineering Approach to Component Adaptation. (download PDF).
  2. Periorellis P., Cook N., Conlin, A., Hiden, H.G., Watson P., Smith R., Wright A. Service Oriented Middleware for the Formation and Operation of Virtual Organisations: The GOLD Project. (download PDF).
  3. Kleijn, H.C.M., Koutny, M., Rozenberg, G. Processes of Petri Nets with Localities. (download PDF).
  4. Gibson, F., Wipat, A., Pocock, M., Morris, N. A data model for the representation of a gel electrophoresis experiment. (download PDF).
  5. Arief, B., Iliasov, A., Romanovsky, A. On Using the CAMA Framework for Developing Open Mobile Fault Tolerant Agent Systems. (download PDF).
  6. Madalinski, A., Khomenko, V., Yakovlev, A. Interactive Resolution of Encoding Conflicts in Asynchronous Circuits Based on STG Unfoldings. (download PDF).
  7. Arkley, P., Riddle, S., Brookes, T. Tailoring Traceability Information to Business Needs. (download PDF).
  8. Koutny, M., Pietkiewicz-Koutny, M. Transition Systems of Elementary Net Systems with Localities. (download PDF).
  9. Koutny, M.,Pappalardo, G.,Pietkiewicz-Koutny, M. Towards an Algebra of Abstractions for Communicating Processes. (download PDF).
  10. Henderson, N., Paynter, S. Real-time Interactions: An Abstract Notation for Specifying and Analysing the Timing Properties of Real-time Systems.. (download PDF).
  11. Sugden, B., Wilson, R., Cornford, J. Re-configuring the health supplier market: Changing relationships in the primary care supplier market in England. (download PDF).
  12. Khomenko, V. Behaviour-Preserving Transition Insertions in Unfolding Prefixes. (download PDF).
  13. Khomenko, V., Koutny, M., Niaouris, A. Applying Petri Net Unfoldings for Verification of Mobile Systems. (download PDF).
  14. Ferrari, G., Ezhilchelvan, E., Mitrani, I. Performance Modelling and Evaluation of E-Business Systems. (download PDF).
  15. Coleman, J. W., Jones, C. B. Guaranteeing the soundness of rely/guarantee rules. (download PDF).
  16. Ryan, P. Y. A., Schneider, S. A. Pret a Voter with Re-encryption Mixes. (download PDF).
  17. Smith, J., Watson, P. Failure Recovery Alternatives In Grid Based Distributed Query Processing: A Case Study. (download PDF).
  18. Ryan, P. Y. A., Peacock, T. Opacity – Further Insights on an Information Flow Property. (download PDF).
  19. Peacock, T., Ryan, P. Y. A. Coercion-resistance as Opacity in Voting Systems. (download PDF).
  20. Ribeiro de Mello, E., Parastatidis, S., Reinecke, P., Smith, C., van Moorsel, A., Webber, J. Secure and Provable Service Support for Human-Intensive Real-Estate Processes. (download PDF).
  21. Smith, C., van Moorsel, A. On Efficient Stateful Resource Management. (download PDF).
  22. Steggles, L. J., Banks, R., Wipat, A. Modelling and Analysing Genetic Networks: From Boolean Networks to Petri Nets. (download PDF).
  23. Bryans, J. W., Fitzgerald, J. S., Jones, C. B., Mozolevsky, I. Dimensions of Dynamic Coalitions. (download PDF).
  24. Jones, C. B., Hayes, I. J., Jackson, M. A. Specifying systems that connect to the physical world. (download PDF).
  25. Ryan, P. Y. A. Pret a Voter with Paillier Encryption. (download PDF).
  26. Ryan, P. Y. A. Verified Encrypted Paper Audit Trails. (download PDF).
  27. Inayat, Q., Ezhilchelvan, P. A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of Byzantium. (download PDF).
  28. Conlin, A., Hiden, H., Wright, A. A chemical process development case study as a source of requirements for the GOLD project. (download PDF).
  29. Fitzgerald, J. S., Larsen, P. G., Plat, N. Towards Next Generation Tools for VDM: Contributions to the First International Overture Workshop, Newcastle, July 2005. (download PDF).
  30. Yan, J. Bot, Cyborg and Automated Turing Test. (download PDF).
  31. Ryan, P. Y. A., Peacock, T. Threat Analysis of Cryptographic Election Schemes. (download PDF).
  32. Ryan, P. Y. A., Peacock, T. Putting the Human back in Voting Protocols. (download PDF).
  33. Yan, J., Cho, P. L. Enhancing Signature-based Collaborative Spam Detection with Bloom Filters. (download PDF).
  34. Coleman, J. W. Determining the Specification of a Control System: an Illustrative Example. (download PDF).
  35. Kistijantoro, A. I., Morgan, G., Shrivastava, S. K. Transaction Manager Failover: A Case Study Using JBOSS Application Server. (download PDF).
  36. Bryans, J. W., Fitzgerald, J. S., Periorellis, P. Model Based Analysis and Validation of Access Control Policies. (download PDF).
  37. Kaiser, M., Hilgetag, C. C. Nonoptimal Component Placement, but Short Processing Paths, due to Long-Distance Projections in Neural Systems. (download PDF).
  38. Coleman, J. W., Jefferson, N. P., Jones, C. B. Comments on several years of teaching of modelling programming language concepts. (download PDF).
  39. Mukherjee, A., Watson, P. Adding Dynamism To OGSA-DQP: Incorporating The DynaSOAr Framework In Distributed Query Processing. (download PDF).
  40. Harrison, M. D., Loer, K. Time as a dimension in the design and analysis of interactive systems. (download PDF).
  41. Bryans, J. W., Fitzgerald, J. S., Jones, C. B., Mozolevsky, I. Formal Modelling of Dynamic Coalitions, with an Application in Chemical Engineering. (download PDF).
  42. Slegers, J., Mitrani, I., Thomas, N. Server allocation in Grid systems with on/off sources. (download PDF).
  43. Fitzgerald, J. S. Perspectives on Formal Methods in the Last 25 years. (download PDF).
  44. Fitzgerald, J. S. The Typed Logic of Partial Functions and the Vienna Development Method. (download PDF).
  45. Kleijn, J., Koutny, M. Processes of Nets with Range Arcs. (download PDF).
  46. Kleijn, J., Koutny, M. Processes of Membrane Systems with Promoters and Inhibitors. (download PDF).
  47. Coleman, J. W., Jones, C. B. A structural proof of the soundness of rely/guarantee rules. (download PDF).
  48. Ryan, P. Y. A. The Computer Ate my Vote. (download PDF).
  49. Laibinis, L., Iliasov, A., Troubitsyna, E., Romanovsky, A. Formal Approach to Ensuring Interoperability of Mobile Agents. (download PDF).
  50. Jones, C. B. RODIN: Intermediate report on methodology. (download PDF).
  51. Romanovsky, A. A Looming Fault Tolerance Software Crisis?. (download PDF).
  52. Larsen, P. G., Fitzgerald, J. S., Riddle, S. Learning by Doing: Practical Courses in Lightweight Formal Methods using VDM++. (download PDF).
  53. Iliasov, A., Romanovsky, A., Arief, B., Laibinis, L., Troubitsyna, E. On Rigorous Design and Implementation of Fault Tolerant Ambient Systems. (download PDF).
  54. Randell, B., Koutny, M. Failures: Their Definition, Modelling and Analysis. (download PDF).

2007

(back to top)

  1. Khomenko, V. Efficient Automatic Resolution of Encoding Conflicts Using STG Unfoldings. (download PDF).
  2. Drummond, S., Devlin, M. Software Engineering Students’ Cross-site Collaboration: An Experience Report. (download PDF).
  3. Devlin, M., Marshall, L., Phillips, C. Active Learning in Computing: Engaging Learners in a Cross-Site Team Project. (download PDF).
  4. Chatain, T., Khomenko, V. A Note on the Well-Foundedness of Adequate Orders Used for Truncating Unfoldings. (download PDF).
  5. Fitzgerald, J. S., Larsen, P. G. Triumphs and Challenges for the Industrial Application of Model-Oriented Formal Methods. (download PDF).
  6. Koutny, M., Pietkiewicz-Koutny, M. Synthesis of Elementary Net Systems with Context Arcs and Localities. (download PDF).
  7. Tjostheim, T., Peacock, T., Ryan, P. Y. A. A Model for Systematic Analysis of Voting Systems. (download PDF).
  8. Mukherjee, A., Watson, P. Virtual Machines in DynaSOAr: Creating an on-demand ad-hoc Virtual Grid. (download PDF).
  9. Cao, H., Olivier, P., Jackson, D., Armstrong, A., Huang, L. Enhancing privacy in public spaces through crossmodal displays. (download PDF).
  10. Cao, H., Olivier, P., Jackson, D., Armstrong, A. Mobile Devices in Crossmodal Interfaces. (download PDF).
  11. Gilroy, S. W., Olivier, P., Cao, H., Jackson, D., Kray, C., Lin, D. CROSSBOARD: Crossmodal Access of Dense Public Displays . (download PDF).
  12. Andras, P., Herald, N. D. J., Charlton, B. G. An analysis of the dynamics of British academic science. (download PDF).
  13. Banks, R., Steggles, L. J. A High-Level Petri Net Framework for Multi-Valued Genetic Regulatory Networks. (download PDF).
  14. Lamprecht, C. J., van Moorsel, A. P. Adaptive SSL: Design, Implementation and Overhead Analysis. (download PDF).
  15. Cook, N. Middleware Support for Non-repudiable Business-to-Business Interactions. (download PDF).
  16. Gorbenko, A., Mikhaylichenko, A., Kharchenko, V., Romanovsky, A. Experimenting With Exception Handling Mechanisms Of Web Services Implemented Using Different Development Kits. (download PDF).
  17. Jambli, M. N., Tully, A. Cross-Layer Design for Information Dissemination in Wireless Sensor Networks: State-of-the-Art and Research Challenges. (download PDF).
  18. Tjostheim, T., Peacock, T., Ryan, P. Y. A. A Case Study in System-Based Analysis: The ThreeBallot Voting System and Prêt à Voter. (download PDF).
  19. Iliasov, A. Mobile Code for Coordination. (download PDF).
  20. Ryan, P. Y. A. Pret a Voter with Paillier Encryption. (download PDF).
  21. Gamble, C. A Minimal Web Service Architectural Style. (download PDF).
  22. Lister, A. L., Jones, A. R., Pocock, M., Shaw, O., Wipat, A. Implementing the FuGE Object Model: a Systems Biology Data Portal and Integrator. (download PDF).
  23. Fitzgerald, J. S., Larsen, P. G., Tjell, S., Verhoef, M. Validation Support for Distributed Real-Time Embedded Systems in VDM++. (download PDF).
  24. Di Marzo Serugendo, G., Fitzgerald, J. S., Romanovsky, A., Guelfi, N. Generic Framework for the Engineering of Self-Adaptive and Self-Organising Systems. (download PDF).
  25. Gamble, C. Detecting Architectural Mismatches Between Web Services. (download PDF).
  26. Andrews, Z., Fitzgerald, J., Verhoef, M. Resilience Modelling Through Discrete Event and Continuous Time Co-Simulation. (download PDF).
  27. Anderson, T., Andrews, Z. H., Fitzgerald, J. S., Randell, B., Glaser, H., Millard, I. C. The ReSIST Resilience Knowledge Base. (download PDF).
  28. Hook, J., Olivier, P. Control Blocks: Tangible Tools for Tabletop Groupware. (download PDF).
  29. Palmer, J., Mitrani, I., Mazzucco, M., McKee, P., Fisher, M. Optimizing revenue: Service Provisioning Systems with QoS Contracts. (download PDF).
  30. Randell, B. A Computer Scientist’s Reactions to NPfIT. (download PDF).
  31. Chen, Y., Romanovsky, A. Improving Service Availability without Improving Availability of Individual Services. (download PDF).
  32. Yan, J., Salah El Ahmad, A. Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms. (download PDF).
  33. Bryans, J. W., Fitzgerald, J. S., Periorellis, P. A Formal Approach to Dependable Evolution of Access Control Policies in Dynamic Collaborations. (download PDF).
  34. Bryans, J. W., Fitzgerald, J. S. Formal Engineering of XACML Access Control Policies in VDM++. (download PDF).
  35. Coleman, J. W., Jones, C. B. A structural proof of the soundness of rely/guarantee rules (revised). (download PDF).
  36. Sulaiman, A. N., Olivier, P. How do people collaborate using paper documents around a table. An observational study.. (download PDF).
  37. Fitzgerald, J. S., Larsen, P. G. Balancing Insight and Effort: the Industrial Uptake of Formal Methods. (download PDF).
  38. Butler, M., Jones, C. B., Romanovsky, A., Troubitsyna, E. Proceedings of the Workshop on Methods, Models and Tools for Fault Tolerance. (download PDF).
  39. Ribeiro de Mello, E., van Moorsel, A., da Silva Fraga, J Evaluation of P2P Search Algorithms for Discovering Trust Paths. (download PDF).
  40. Smith, C., van Moorsel, A. Mitigating Provider Uncertainty in Service Provision Contracts. (download PDF).
  41. Selvarajah, K., Tully, A. Smartdust and ZigBee for Transport Applications. (download PDF).
  42. Jambli, M. N., Tully, A., Selvarajah, K., Lachenmann, A. A Cross-Layer Framework Design for the Embedded Middleware in Mobility Applications (EMMA) Project. (download PDF).
  43. de Leusse, P., Periorellis, P., Watson, P. Enterprise Service Bus: An overview. (download PDF).
  44. Ryan, P. Y. A. Pret a Voter with a Human-Readable, Paper Audit Trail. (download PDF).
  45. Smith, J., Watson, P. Experiments Towards Adaptation of Concurrent Workflows. (download PDF).
  46. Andreou, M. S., van Moorsel, A. IP Traceback in a Switched Ethernet Network. (download PDF).
  47. Zhao, Y., Thomas, N. Modelling secure secret key exchange using stochastic process algebra. (download PDF).
  48. Watson, P., Jackson, T., Pitsilis, G., Gibson, F., Austin, J., Fletcher, M., Liang, B., Lord, P. The CARMEN Neuroscience Server. (download PDF).
  49. Lister, A. L., Pocock, M., Wipat, A. Integration of constraints documented in SBML, SBO, and the SBML Manual facilitates validation of biological models. (download PDF).
  50. Fitzgerald, J. S., Jones, C. B. The Connection between Two Ways of Reasoning about Partial Functions. (download PDF).
  51. Jones, C. B., Hayes, I. J., Jackson, M. A. Deriving specifications for systems that are connected to the physical world. (download PDF).
  52. Jones, C. B. Understanding programming language concepts via Operational Semantics. (download PDF).
  53. Mazzucco, M., Mitrani, I., Palmer, J., Fisher, M., McKee, P. Web Service Hosting and Revenue Maximization. (download PDF).
  54. Ferrari, G. QoS Control of E-business Systems through Performance Modelling and Estimation. (download PDF).
  55. Kleijn, J., Koutny, M. Formal Languages and Concurrent Behaviours. (download PDF).
  56. Shaw, O. J. Modelling Bacterial Regulatory Networks with Petri Nets. (download PDF).
  57. Muccini, H., Romanovsky, A. Architecting Fault Tolerant Systems. (download PDF).
  58. Randell, B., Rushby, J. M. Distributed Secure Systems: Then and Now. (download PDF).
  59. Andras, P., Herald, N. D. J., Charlton B. G. Science production in top 20 UK universities is catching-up with the US universities. (download PDF).
  60. Bryans, J., Fitzgerald, J. Validating Access Control Policies for Virtual Organisations. (download PDF).
  61. Devlin, M., Phillips, C., Marshall, L. Making Computing Science Students More Employable with Problem-Based Learning and Cross-Site TeamWork. (download PDF).
  62. Parkin, S. E., van Moorsel, A. A Trust-economic Perspective on Information Security Technologies. (download PDF).
  63. Fitzgerald, J. S., Larsen, P. G., Sahara, S. VDMTools: advances in support for formal modeling in VDM. (download PDF).
  64. Chaum, D., van der Graaf, J., Ryan, P. Y. A., Vora, P. Secret Ballot Elections with Unconditional Integrity. (download PDF).
  65. Macedo, H.D., Larsen, P.G., Fitzgerald, J. Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System using VDM. (download PDF).
  66. Devlin, M., Drummond, S., Hatch, A. Using Collaborative Technology in CS Education to facilitate Cross-Site Software Development. (download PDF).
  67. Gacek, C., Gamble, C. Mismatch Avoidance with Web Services. (download PDF).
  68. Arief, B., Blythe, P., Fairchild, R., Selvarajah, K., Tully, A. INTEGRATING SMARTDUST INTO INTELLIGENT TRANSPORTATION SYSTEMS. (download PDF).
  69. Smith, J., Watson, P. Wrapper Based Adaptive Management of Concurrent Workflow Executions. (download PDF).

2008

(back to top)

  1. Meyer, R., Khomenko, V., Strazny, T. A Practical Approach to Verification of Mobile Systems Using Net Unfoldings. (download PDF).
  2. Tariq, Q. I. Design and Performance Analysis of Fail-Signal Based Consensus Protocols for Byzantine Faults. (download PDF).
  3. Ezhilchelvan, P. Responsive Fault-Tolerant Computing in the era of Terascale Integration – State of Art Report. (download PDF).
  4. He, Y., Tully, A. Query Processing for Mobile Wireless Sensor Networks: State-of-the-art and Research Challenges. (download PDF).
  5. Mukherjee, A., Watson, P. Exploiting Dynamic Deployment in a Distributed Query Processor for the Grid. (download PDF).
  6. Araujo, R., Ryan, P. Y. A. Improving Farnel, Threeballot, and Randell-Ryan Voting Schemes . (download PDF).
  7. Pitsilis, G. K. Choosing Reputable Resources in Unstructured Peer-to-Peer Networks using Trust Overlays. (download PDF).
  8. Lundin, D., Ryan, P. Y. A. Human readable paper verification of Pret a Voter. (download PDF).
  9. Ryan, P. Y. A. The Code d’Azur and Phoenix Ciphers-A Note on a New Class of Block Ciphers Based on Matrix Transposition. (download PDF).
  10. Hao, F., Ryan, P. Y. A. Password Authenticated Key Exchange by Juggling. (download PDF).
  11. Iliasov, A., Romanovsky, A. Refinement Patterns for Fault Tolerant Systems. (download PDF).
  12. Iliasov, A. Refinement Patterns. (download PDF).
  13. Mukherjee, A. Exploiting Dynamic Deployment in a Distributed Query Processor for the Grid. (download PDF).
  14. Gacek, C., Giese, H., Hadar, E. Friends or Foes? – A Conceptual Analysis of Self-Adaptation and IT Change Management. (download PDF).
  15. Gacek, C., Gamble, C. Minimal Web Services Style — Architectural Style Description and Example Instantiation. (download PDF).
  16. Gacek, C., Gamble, C. Mismatch Avoidance in Web Services Based Software Architectures. (download PDF).
  17. Darondeau, P., Koutny, M., Pietkiewicz-Koutny, M., Yakovlev, A. Synthesis of Nets with Step Firing Policies. (download PDF).
  18. Parkin, S. E., Yassin-Kassab, R., van Moorsel, A. The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies. (download PDF).
  19. von Arnim, A., Arief, B., Fusée, A. Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies. (download PDF).
  20. Coleman, J. W. Constructing a Tractable Reasoning Framework upon a Fine-Grained Structural Operational Semantics. (download PDF).
  21. Mukherjee, A. and Watson, P.. On using Virtual Machines for Adaptive Distributed Query Processing in Grids. (download PDF).
  22. Bell, M., Suresh, V., Watson, P. and Blythe P. UTMC Compliant Database to Support Technologies of the Future. (download PDF).
  23. Banks, R., Khomenko, V., and Steggles, J., A Case for Using Signal Transition Graphs for Analysing and Refining Genetic Networks. (download PDF).
  24. Sulaiman A. N., Olivier P. Attribute Gates. (download PDF).
  25. Smith, J., Watson, P.. Towards Concurrent SLA-based Management in a Composite Service Data Centre. (download PDF).
  26. Colquhoun, J., Watson, P. A Peer-to-Peer Database Server based on BitTorrent. (download PDF).
  27. Cooper, D. E., Ezhilchelvan, P., Mitrani, I. A Real World Evaluation of Encounter Gossip. (download PDF).
  28. Bryans, J. W., Fitzgerald, J. S., Greathead, D., Jones, C. B., Payne, R. J. A Dynamic Coalitions Workbench: Final Report. (download PDF).
  29. Andreou, M., van Moorsel, A. COTraSE: Connection Oriented Traceback in Switched Ethernet. (download PDF).
  30. Yan, J., Salah El Ahmad, A. A Low-cost Attack on a Microsoft CAPTCHA. (download PDF).
  31. Strano, M., Molina-Jimenez, C., Shrivastava, S. A Model for Checking Contractual Compliance of Business Operations. (download PDF).
  32. Gacek, C. AA – A Software Architecture Aware Environment for Dependable Systems. (download PDF).
  33. Katramados, I., Barlow, A., Selvarajah, K., Shooter, C., Tully, A., Blythe, P. T. Heterogeneous sensor integration for intelligent transport systems. (download PDF).
  34. Selvarajah, K., Tully, A., Blythe, P. T. Zigbee for intelligent transport system applications. (download PDF).
  35. Bryans, J., Fitzgerald, J Proceedings of Formal Aspects of Virtual Organisations 2008. (download PDF).
  36. Fitzgerald J.S., Larsen P.G., Sahara S. Modelling and Analysis in VDM: Proceedings of the Fourth VDM/Overture Workshop. (download PDF).
  37. Khomenko, V., Meyer, R. Checking pi-Calculus Structural Congruence is Graph Isomorphism Complete. (download PDF).
  38. Coles, R., Griffin, J., Johnson, H., Monahan, B., Parkin, S., Pym, D., Sasse, A., van Moorsel, A. Trust Economics Feasibility Study. (download PDF).
  39. Kleijn, J., Koutny, M. CHINA 2008 (Concurrency metHods: Issues aNd Applications). (download PDF).
  40. Iliasov, A., Troubitsyna, E., Laibinis, L., Romanovsky, A. Guided Formal Development: Patterns for Modelling and Refinement. (download PDF).
  41. Chen, Y., Romanovsky, A. Mediating Web Services for Dependability. (download PDF).
  42. Castor Filho, F., Romanovsky, A., Rubira, C. M. F. Improving the Reliability of Cooperative Concurrent Systems with Exception Flow Analysis . (download PDF).
  43. Yassin Kassab, R., van Moorsel, A. Mapping WSLA on Reward Constructs in Möbius . (download PDF).
  44. Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., Ryan, P. Y. A., Shen, E., Sherman, A. T. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. (download PDF).
  45. Coleman, J. W. Expression Decomposition in a Rely/Guarantee Context. (download PDF).
  46. Sulaiman, A. N., Olivier, P., Heslop, P. TangiSoft: Designing a Tangible Direct-Touch Tabletop Keyboard. (download PDF).
  47. Devlin, M., Phillips, C., Marshall, L. Organised Chaos – Learning Outcomes from trialling Active Learning Methods in Computing Science. (download PDF).
  48. Devlin, M., Drummond, S., Phillips, C., Marshall, L. Improving Assessment in Software Engineering Student Team Projects. (download PDF).
  49. Zhao, Y., Thomas, N. Efficient solutions of a PEPA model of key distribution centre with a cost function. (download PDF).
  50. Zhang, H., van Moorsel, A. Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust. (download PDF).
  51. Ryan, P. Y. A. Prêt à Voter with Paillier Encryption – extended journal version. (download PDF).
  52. Strano, M., Molina-Jimenez, C., Shrivastava, S. A Rule-based Notation to Specify Executable Electronic Contracts. (download PDF).
  53. Chen, Y. WS-Mediator for Improving Dependability of Service Composition. (download PDF).
  54. Kleijn, J., Koutny, M. Petri Nets and Membrane Computing. (download PDF).
  55. Kleijn, J., Koutny, M. Steps and Coverability in Inhibitor Nets. (download PDF).
  56. Kleijn, J., Koutny, M. A Petri Net Model for Membrane Systems with Dynamic Structure. (download PDF).
  57. Koutny, M., Randell, B. Structured Occurrence Nets: A formalism for aiding system failure prevention and analysis techniques. (download PDF).
  58. Bhattacharyya, A., Fitzgerald, J. S. Development of a Formalism for Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems: A Technical Diary. (download PDF).
  59. Gorbenko, A., Kharchenko, V., Tarasyuk, O., Chen, Y., Romanovsky, A. The Threat of Uncertainty in Service-Oriented Architecture. (download PDF).
  60. Laibinis, L., Troubitsyna, E., Iliasov, A., Romanovsky, A. Formal development of cooperative exception handling for mobile agent systems. (download PDF).
  61. Payne, R. J. RPL: A Policy Language For Dynamic Reconfiguration. (download PDF).
  62. Iliasov, A., Troubitsyna, E., Laibinis, L., Romanovsky, A. Patterns for Refinement Automation. (download PDF).
  63. Smith, J., Watson, P. Concurrent Management of Composite Services According to Response Time SLAs. (download PDF).
  64. Yan, J., Salah El Ahmad, A. Is cheap labour behind the scene? – Low-cost automated attacks on Yahoo CAPTCHAs. (download PDF).
  65. Thomas, N. Mean value analysis for a class of PEPA models. (download PDF).
  66. Thomas, N. Using ODEs from PEPA models to derive asymptotic solutions for a class of closed queueing networks. (download PDF).
  67. Sulaiman, A. N., Olivier, P., Heslop, P. TangiSoft: A Tangible Direct-Touch Tabletop Keyboard. (download PDF).
  68. Bryans, J., Fitzgerald, J., Romanovsky, A., Roth, A. Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware. (download PDF).
  69. Glaser, H., Millard, I., Anderson, T., Andrews, Z., Fitzgerald, J., Randell, B. A Knowledge Base for Dependability and Security Research. (download PDF).

2009

(back to top)

  1. Suresh, V., Watson, P., Bell, M. C., Neasham, J. Decision Support for Intelligent Traffic and Environment Management. (download PDF).
  2. Kleijn, J., Koutny, M. Applying Step Coverability Trees to Communicating Component-Based Systems. (download PDF).
  3. Colquhoun, J. A BitTorrent-based Peer-to-Peer Database Server. (download PDF).
  4. Chen, Y., Gorbenko, A., Kharchenko, V., Mamutov, S., Romanovsky, A., Tarasyuk, O. Benchmarking Dependability of a System Biology Application. (download PDF).
  5. Stepanova, D., Parkin, S. E., van Moorsel, A. A Knowledge Base for Justified Information Security Decision-Making. (download PDF).
  6. Zhang, H., van Moorsel, A. Fast Generation of Scale Free Networks with Directed Arcs. (download PDF).
  7. Parkin, S. E., van Moorsel, A. An Information Security Ontology Incorporating Human-Behavioral Implications. (download PDF).
  8. Khomenko, V. A Usable Reachability Analyser. (download PDF).
  9. Koutny, M., Pietkiewicz-Koutny, M. Towards Efficient Synthesis of ENL-systems. (download PDF).
  10. Koutny, M., Pietkiewicz-Koutny, M. Synthesis of PTL-nets with Partially Localised Conflicts. (download PDF).
  11. Iliasov, A., Dotti, F. L., Romanovsky, A. Structuring Specifications with Modes. (download PDF).
  12. Dodda, R., Smith, C., van Moorsel, A. An Architecture for Cross-Cloud System Management. (download PDF).
  13. Colquhoun, J., Watson, P. Evaluating a P2P Database Server based on BitTorrent. (download PDF).
  14. Ezhilchelvan, P., Clarke, D., Mitrani, I., Shrivastava, S. Sustaining Intrusion-Tolerance by Proactive Replacement. (download PDF).
  15. Coleman, J. W. The Beginnings of a Model for Atomicity Refinement of Expressions. (download PDF).
  16. Smith, C., van Moorsel, A. An Empirical Evaluation Of Web Services Architectures From An Economic Perspective. (download PDF).
  17. Molina-Jimenez, C., Shrivastava, S., Strano, M. Exception Handling in Electronic Contracting. (download PDF).
  18. Strano, M., Molina-Jimenez, C., Shrivastava, S. Implementing a Rule-Based Contract Compliance Checker. (download PDF).
  19. Mazzara, M. Different Perspectives for Reasoning about Problems and Faults. (download PDF).
  20. Mazzara, M. Deriving Specifications of Dependable Systems: toward a method. (download PDF).
  21. Inglesant, P., Machulak, M., Parkin, S., van Moorsel, A., and Williams, J. (eds.) Proceedings of the First Trust Economics Workshop. (download PDF).
  22. Andrews, Z. Towards a Stochastic Event-B for Designing Dependable Systems. (download PDF).
  23. Parkin, S., van Moorsel, A. Risk Modelling of Access Control Policies with Human Behavioural Factors. (download PDF).
  24. Machulak, M., Parkin, S.E., van Moorsel, A. Architecting Dependable Access Control Systems for Multi Domain Computing Environments . (download PDF).
  25. Machulak, M., van Moorsel, A. A Novel Approach to Access Control for the Web. (download PDF).
  26. Machulak, M., Little, M. C., Halliday, J.J. Metadata Support for Transactional Web Services. (download PDF).
  27. Iliasov, A. On Event-B and Control Flow. (download PDF).
  28. Mazzara, M., Dragoni, N A Formal Semantics for the WS-BPEL Recovery Framework. The Pi-Calculus Way. (download PDF).
  29. Smith, C., Van Moorsel, A., Pienkowski, D., Li, F. An Institutional Approach to Trust in Electronic Transactions. (download PDF).
  30. Randell, B., Koutny, M. Structured Occurence Nets: A formalism for aiding system failure prevention and analysis techniques. (download PDF).
  31. Jones, C. B. From Problem Frames to HJJ (and its known unknowns). (download PDF).
  32. Wolf, S., Fitzgerald, J., Gorm Larsen, P. Methods for the Development of Distributed Real-Time Embedded Systems using VDM. (download PDF).
  33. Machulak, M., van Moorsel, A. Use Cases for User-Centric Access Control for the Web. (download PDF).
  34. Jones, C. B., Pierce, K.G. Elucidating Concurrent Algorithms via Layers of Abstraction and Reification. (download PDF).
  35. Bell, M., Suresh, V., Galatioto, F., Watson, P Decision Support for Intelligent Traffic and Environment Management. (download PDF).
  36. Eve, J. On O(n^2 log n) algorithms for n x n matrix operations. (download PDF).
  37. Randell, B., Koutny, M. Structured Occurrence Nets: Incomplete, contradictory and uncertain failure evidence. (download PDF).
  38. Kharrufa, A.S., Olivier, P., Leat, D. Digital Mysteries: Designing for Learning at the Tabletop. (download PDF).
  39. Mace, J.C., Parkin, S., van Moorsel, A. Ontology Editing Tool for Information Security and Human Factors Experts. (download PDF).
  40. Morgan, G., Lee, J. K. Controversy in Video Game Invention: The Infallible Pioneer Patents. (download PDF).
  41. Bartindale, T., Jackson, D., Olivier, P FiberSense – Multi-touch Fibre Optic Sensing on Non-Planar Surfaces. (download PDF).
  42. Bryans, J.W., Fitzgerald, J.S. Proceedings of Formal Aspects of Virtual Organisations 2009. (download PDF).
  43. Larsen, P.G., Bryans, J.W. Proceedings of the 7th OVERTURE workshop. (download PDF).
  44. Bryans, J. W., Fitzgerald, J. S., Romanovsky, A., Roth, A. Patterns for Modelling Time and Consistency in Business Information Systems. (download PDF).
  45. Jones, C. B. The role of auxiliary variables in the formal development of concurrent programs. (download PDF).
  46. Yan, J., A. S. El Ahmad. The Robustness of CAPTCHAs: A Security Engineering Perspective. (download PDF).
  47. Zhao, Y., Thomas, N Efficient Analysis of PEPA model of Non-repudiation Protocols. (download PDF).
  48. Gorbenko, A., Kharchenko, V., Mamutov, S., Tarasyuk, O., Chen, Y., Romanovsky, A. Real Distribution of Response Time Instability in Service-Oriented Architecture . (download PDF).

2010

(back to top)

  1. Colquhoun, J., Watson, P. A P2P Database Server Based on BitTorrent. (download PDF).
  2. Colquhoun, J., Watson, P. Query Matching in a BitTorrent-Based P2P Database System. (download PDF).
  3. Jones, C. B., Pierce, K.G. What Can the pi-calculus Tell Us About the Mondex Purse System?. (download PDF).
  4. Jones, C. B., Pierce, K.G. Splitting Atoms with Rely/Guarantee Conditions Coupled with Data Reification. (download PDF).
  5. M. Jastram, L.Laibinis, F. Lösch, M. Mazzara (Eds.) Proceedings of the First Deploy Technical Workshop. (download PDF).
  6. Lopatkin, I., Iliasov, A., Romanovsky, A. On Fault Tolerance Reuse during Refinement. (download PDF).
  7. Khomenko, V A New Type of Behaviour-Preserving Transition Insertions in Unfolding Prefixes. (download PDF).
  8. Randell, B Reminiscences of Whetstone ALGOL. (download PDF).
  9. Machulak, M., van Moorsel, A. Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications. (download PDF).
  10. Mazzara, M., Bhattacharyya, A On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems. (download PDF).
  11. Mazzara, M. Issues about the Adoption of Formal Methods for Dependable Composition of Web Services. (download PDF).
  12. Koutny, M., Pietkiewicz-Koutny, M. Synthesis of General Petri Nets with Localities. (download PDF).
  13. Machulak, M.P., Maler, E.L., Catalano, D., van Moorsel, A User-Managed Access to Web Resources. (download PDF).
  14. Redmill, F. ALARP Explored. (download PDF).
  15. Students of MSc SDIA 2008-09 Designing a Distributed File-Processing System Using Amazon Web Services. (download PDF).
  16. MSc ITEC students, 2009-10. A Comparative Study of System Designs for distributed file processing. (download PDF).
  17. Randell, B. Newcastle’s French Connection. (download PDF).
  18. Bryans, J.W., Wei, W. Formal Analysis of BPMN models using Event-B. (download PDF).
  19. Andrews, Z., McIver, A., Meinicke, L., Morgan, C. Probabilistic Aspects of Flash Filestores. (download PDF).
  20. El Ahmad, A. S., Yan, J Colour, usability and security: a case study. (download PDF).
  21. Yassin Kassab, R., van Moorsel, A. Predicting Compliance of WSLA Contracts Using Automated Model Creation. (download PDF).
  22. Grotsev, D., Iliasov, A., Romanovsky, A. Formal Stepwise Development of Scalable and Reliable Multiagent Systems. (download PDF).
  23. Cala, J., Watson, P. Automatic Software Deployment in the Azure Cloud. (download PDF).
  24. Iliasov, A., Troubitsyna, E., Laibinis, L., Romanovsky, A., Varpaaniemi, K., Ilic, D., Latvala, T. Developing Mode-Rich Satellite Software by Refinement in Event B. (download PDF).
  25. Alekeish, K., Ezhilchelvan, P. Consensus in Sparse, Mobile Ad-hoc Networks. (download PDF).
  26. Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A. A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions. (download PDF).
  27. Jones, C.B., Grov, G., Bundy, A. Ideas for a high-level proof strategy language. (download PDF).
  28. Mace, J.C. Printer Identification Techniques and Their Privacy Implications. (download PDF).
  29. Mace, J. C., Parkin, S.E., van Moorsel, A. A Collaborative Ontology Development Tool for Information Security Managers. (download PDF).
  30. Fitzgerald, J., Gorm Larsen, P., Pierce K., Verhoef, M., Wolff, S. Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems. (download PDF).
  31. Mortimer, D., Cook, N A Declarative Approach to Configuring Business-to-Business Conversations. (download PDF).
  32. Khomenko, V Logic Decomposition of Asynchronous Circuits Using STG Unfoldings. (download PDF).
  33. Grov, G., Jones, C. B. AI4FM: A new project seeking challenges!. (download PDF).

2011

(back to top)

  1. Lopatkin I, Iliasov A, Romanovsky A. Rigorous Development of Dependable Systems using Fault Tolerance Views. (download PDF).
  2. Weile J, Pocock M, Cockell SJ, Lord P, Dewar JM, Holstein E, Wilkinson D, Lydall D, Hallinan J, Wipat A. Customisable views on semantically integrated networks for systems biology. (download PDF).
  3. Mazzara M, Abouzaid F, Dragoni N, Bhattacharyya A. Design, Modelling and Analysis of a Workflow Reconfiguration. (download PDF).
  4. Misirli G, Hallinan JS, Pocock M, Cockell SJ, Weile J, Wipat A. BacillOndex: An Integrated Data Resource for Systems and Synthetic Biology. (download PDF).
  5. Zeng W, van Moorsel A. Quantitative Evaluation of Enterprise DRM Technology. (download PDF).
  6. Stahl F, Parkin SE, van Moorsel A. Cooperative Information Security Knowledge: Content Validation and incentives to contribute. (download PDF).
  7. Watson P, Leahy D, Cala J, Sykora V, Hiden H, Woodman S, Taylor M, Searson D. Cloud Computing for Chemical Activity Prediction. (download PDF).
  8. Randell B. Occurrence Nets Then and Now: The Path to Structured Occurrence Nets. (download PDF).
  9. Kleijn J, Koutny M, Rozenberg G. Modelling Reaction Systems with Petri Nets. (download PDF).
  10. Yassin Kassab R, van Moorsel A. Formal Mapping of WSLA Contracts on Stochastic Models. (download PDF).
  11. Mace JC, van Moorsel A, Watson P. The Case for Dynamic Security Solutions in Public Cloud Workflow Deployments. (download PDF).
  12. Missier P. Incremental workflow improvement through analysis of its data provenance. (download PDF).
  13. Gamble C, Riddle S. Dependability Explicit Metadata: Extended Report on Properties, Policies and Exemplary Application to Case Studies. (download PDF).
  14. Gamble C, Riddle S. Dependability Explicit Metadata: Experimental Results and Research Issues. (download PDF).
  15. Payne RJ, Fitzgerald JS. Contract-Based Interface Specification Language for Functional and Non-Functional Properties. (download PDF).
  16. Suresh V, Ezhilchelvan P, Watson P. Scalable and Responsive Event Processing in the Cloud. (download PDF).
  17. Colquhoun J, Devlin M, Marshall L. SHAPE your CLASS: Improving the Lecture Experience. (download PDF).
  18. Abdullah J, van Moorsel A. Uncertainty and Uncertainty Tolerance in Service Provisioning. (download PDF).
  19. Ingram C, Riddle S. Linking Software Design Metrics to Component Change-Proneness. (download PDF).
  20. Suresh V, Ezhilchelvan P, Watson P, Pham C, Jackson D, Olivier P. Distributed Event Processing For Activity Recognition. (download PDF).
  21. Mihoob A, Molina-Jimenez C, Shrivastava S. Consumer Side Resource Accounting in the Cloud. (download PDF).
  22. Hao F, Ryan PYA. How to Sync with Alice. (download PDF).
  23. Lopatkin I, Iliasov A, Romanovsky A, Prokhorova Y, Troubitsyna E. Patterns for Representing FMEA in Formal Specification of Control Systems. (download PDF).
  24. Gorbenko A, Kharchenko V, Tarasyuk O, Romanovsky A. Using Diversity in Cloud-Based Deployment Environment to Avoid Intrusions. (download PDF).
  25. Farj K, Speirs N, Chen Y. A Fault Injection Method for Testing Dependable Web Service Systems. (download PDF).
  26. Fitzgerald JS, Larsen PG, Pierce KG, Verhoef MHG. A Formal Approach to Collaborative Modelling and Co-simulation for Embedded Systems. (download PDF).
  27. Abouzaid F, Bhattacharyya A, Dragoni N, Fitzgerald JS, Mazzara M, Zhou M. A Case Study of Workflow Reconfiguration: Design, Modelling, Analysis and Implementation. (download PDF).
  28. Hao F. On Robust Key Agreement Based on Public Key Authentication. (download PDF).
  29. Ezhilchelvan P. Near Certain Multicast Delivery Guarantees Amidst Perturbations in Computer Clusters. (download PDF).
  30. Hao F, Kreeger MN. Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting. (download PDF).
  31. Watson P. A Multi-Level Security Model for Partitioning Workflows over Federated Clouds. (download PDF).
  32. Bendisposto J, Jones C, Leuschel M, Romanovsky A, (eds). Proceedings of the 11th International Workshop on Automated Verification of Critical Systems. (download PDF).
  33. Hayes IJ, Burns A, Dongol B, Jones CB. Comparing Models of Nondeterministic Expression Evaluation. (download PDF).
  34. Madalinski A, Khomenko V. Predictability Verification with Parallel LTL-X Model Checking Based on Petri Net Unfoldings. (download PDF).
  35. Abdelsadiq A, Molina-Jimenez C, Shrivastava S. A High-Level Model-Checking Tool for Verifying Electronic Contracts. (download PDF).
  36. Pierce K, Fitzgerald J, Gamble C. Modelling Faults and Fault Tolerance Mechanisms in a Paper Pinch Co-model. (download PDF).
  37. Konios A. Ambient Systems and Taxonomy Approaches. (download PDF).
  38. Velykiene R, Jones CB. A Fast Track Analysis of ICT Constraints on Evolving Physical Infrastructure. (download PDF).
  39. Phithakkitnukoon S, Smoreda Z, Olivier P. Socio-geography of Human Mobility: A study using longitudinal mobile phone data. (download PDF).
  40. Kleijn J, Koutny M, Rozenberg G. Petri Nets for Biologically Motivated Computing. (download PDF).
  41. Kleijn J, Koutny M. Localities in Systems with a/sync Communication. (download PDF).
  42. Kleijn J, Koutny M. Mutex Causality in Processes and Traces of General Elementary Nets. (download PDF).
  43. Kleijn J, Koutny M. Membrane Systems with Qualitative Evolution Rules. (download PDF).
  44. Koutny M, Pietkiewicz-Koutny M. Synthesis Problem for Petri Nets with Localities. (download PDF).
  45. Kleijn J, Koutny M. The Mutex Paradigm of Concurrency. (download PDF).
  46. Kleijn J, Koutny M. Causality in Structured Occurrence Nets. (download PDF).
  47. Ciobanu G, Koutny M. Timed Migration and Interaction with Access Permissions. (download PDF).
  48. Ciobanu G, Koutny M. Timed Mobility in Process Algebra and Petri Nets. (download PDF).
  49. van der Vlugt S, Kleijn J, Koutny M. Coverability and Inhibitor Arcs: an example. (download PDF).
  50. Kleijn J, Koutny M. Causality in Extensions of Petri Nets. (download PDF).
  51. Ehrenfeucht A, Kleijn J, Koutny M, Rozenberg G. Relevance of Entities in Reaction Systems. (download PDF).
  52. Duan Z, Klaudel H, Koutny M. ITL Semantics of Composite Petri Nets. (download PDF).
  53. Kleijn J, Koutny M, Pietkiewicz-Koutny M. Regions of Petri Nets with a/sync Connections. (download PDF).
  54. Kleijn J, Koutny M, Pietkiewicz-Koutny M, Rozenberg G. Step Semantics of Boolean Nets. (download PDF).
  55. Sharp C, Morgan G. A Many Systems Interpretation of Concurrency Control. (download PDF).
  56. Missier P, Ludäscher B, Dey S, Wang M, McPhillips T, Bowers S, Agun M, Altintas I. Golden-Trail: Retrieving the Data History that Matters from a Comprehensive Provenance Repository. (download PDF).
  57. Mikulski L, Koutny M. Hasse Diagrams of Combined Traces. (download PDF).
  58. James K, Lycett SJ, Wipat A, Hallinan JS. Multiple Gold Standards Address Bias in Functional Network Integration. (download PDF).
  59. Ciobanu G, Koutny M. PerTiMo: A Model of Spatial Migration with Safe Access Permissions. (download PDF).
  60. Bryans J, Koutny M, Mu C. Towards Quantitative Analysis of Opacity. (download PDF).
  61. Ehrenfeucht A, Kleijn J, Koutny M, Rozenberg G. Qualitative and Quantitative Aspects of a Model for Processes Inspired by the Functioning of the Living Cell. (download PDF).
  62. Mokhov A, Khomenko V, Alekseyev A, Yakovlev A. Algebra of Parametrised Graphs. (download PDF).
  63. Andrews Z, Bryans J, Fitzgerald J, Hughes J, Payne R, Pierce K, Riddle S. Modelling and Refinement of the MONDEX Electronic Purse in VDM. (download PDF).

2012

(back to top)

  1. Mazzara M, Jones C, Iliasov A. Lessons from DEPLOYment. (download PDF).
  2. Jones CB, Lovert MJ, Steggles LJ. A Semantic Analysis of Logics that Cope with Partial Terms. (download PDF).
  3. Hao F, Randell B, Clarke D. Self-Enforcing Electronic Voting. (download PDF).
  4. Hao F, Clarke D. Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. (download PDF).
  5. Jones CB, Lovert MJ, Steggles LJ. Towards a Mechanisation of a Logic that Copes with Partial Terms. (download PDF).
  6. Phithakkitnukoon S, Leong TW, Smoreda Z, Olivier P. Weather Effects on Mobile Social Interaction: A case study of mobile phone users in Lisbon, Portugal. (download PDF).
  7. Smith C, van Moorsel A. Driving Privacy Controls with Social Context. (download PDF).
  8. Gmehlich R, Grau K, Jackson M, Jones C, Loesch F, Mazzara M. Towards a Formalism-Based Toolkit for Automotive Applications. (download PDF).
  9. Goulding D, Smith R, Clark L, Ushaw G, Morgan G. Real-time ambient occlusion on the Playstation 3. (download PDF).
  10. Payne R, Bryans J. Modelling the Major Incident Procedure Manual: A System of Systems Case Study. (download PDF).
  11. Ingram C, Riddle S. Using Early Stage Project Data to Predict Change-Proneness. (download PDF).
  12. Meyer R, Khomenko V, Huchting R. A Polynomial Translation of pi-Calculus (FCP) to Safe Petri Nets. (download PDF).
  13. Suresh V, Ezhilchelvan P, Watson P. Scalable and Responsive Event Processing in the Cloud. (download PDF).
  14. Missier P, Randell B, Koutny M. Modelling Provenance using Structured Occurrence Networks. (download PDF).
  15. Missier P, Belhajjame K. A PROV encoding for provenance analysis using deductive rules. (download PDF).
  16. Aidarov K, Ezhilchelvan P, Mitrani I. Energy-aware management of customer streams. (download PDF).
  17. Fitzgerald J, Pierce K, Gamble C. A Rigorous Approach to the Design of Resilient Cyber-physical Systems through Co-Simulation. (download PDF).
  18. Emms M, Arief B, Defty T, Hannon J, Hao F, van Moorsel A. The Dangers of Verify PIN on Contactless Cards. (download PDF).
  19. Alsuhibany SA, Alonaizi A, Smith C, van Moorsel A. Optimising the Release Order of Defensive Mechanisms. (download PDF).
  20. Hayes IJ, Jones CB, Colvin RJ. Refining rely-guarantee thinking. (download PDF).
  21. Payne R, Bryans J, Fitzgerald J, Riddle S. Interface Specification for System-of-Systems Architectures. (download PDF).
  22. Bell MJ, Gillespie CS, Swan D, Lord P. An approach to describing and analysing bulk biological annotation quality: A case study using UniProtKB. (download PDF).
  23. Fitzgerald J, Bryans J, Payne R. A Formal Model-based Approach to Engineering Systems-of-Systems. (download PDF).
  24. Jones CB. Abstraction as a unifying link for formal approaches to concurrency. (download PDF).
  25. Ciobanu G, Koutny M, Steggles J. A Timed Mobility Semantics based on Rewriting Strategies. (download PDF).
  26. Randell B. A Turing Enigma. (download PDF).
  27. Muccini H, Romanovsky A. Architecting Fault Tolerant Systems. (download PDF).
  28. Velykis A. Inferring the Proof Process. (download PDF).
  29. Plat N, Ballegaard Nielsen C, Riddle S. Proceedings of the 10th Overture Workshop. (download PDF).
  30. Andrews Z, Fitzgerald J, Payne R, Romanovsky A. Fault Modelling for Systems of Systems. (download PDF).
  31. Fitzgerald J, Mak T, Romanovsky A, Yakovlev A. Workshop Proceedings: Trustworthy Cyber-Physical Systems. (download PDF).
  32. Khomenko V. Poster Session at The Newcastle Connection 2012. (download PDF).
  33. Fernandes J, Koutny M, Pietkiewicz-Koutny M, Sokolov D, Yakovlev A. Step Persistence in the Design of GALS Systems. (download PDF).
  34. Romanovsky A, Warwick J. Newcastle Experience of Coordinating the FP7 DEPLOY Integrated Project. (download PDF).
  35. Romanovsky A. Deployment of Formal Methods in Industry: the Legacy of the FP7 ICT DEPLOY Integrated Project. (download PDF).
  36. Iliasov A, Romanovsky A. SAFECAP domain language for reasoning about safety and capacity. (download PDF).
  37. Missier P, Woodman S, Hiden H, Watson P. Provenance and data differencing for workflow reproducibility analysis. (download PDF).
  38. Iliasov A, Romanovsky A. The SafeCap toolset for improving railway capacity while ensuring its safety. (download PDF).
  39. Ishikawa F, Romanovsky A. Proceedings: Workshop on the experience of and advances in developing dependable systems in Event-B. (download PDF).
  40. Kleijn J, Koutny M, Pietkiewicz-Koutny M, Rozenberg G. Membrane Systems and Petri Net Synthesis. (download PDF).
  41. Mikulski L, Koutny M. Folded Hasse Diagrams of Combined Traces. (download PDF).
  42. Sharp C, Morgan G. Towards Removing the Concurrency Control Bottleneck. (download PDF).
  43. Jones C. A specification for ACMs. (download PDF).
  44. Koutny M, Mikulski L, Pietkiewicz-Koutny M. A Taxonomy of Persistent and Nonviolent Steps. (download PDF).
  45. Jackson D, Olivier P. Panopticon: A Parallel Video Overview Technique. (download PDF).
  46. Li B. Verification and Simulation Tool for Communication Structured Occurrence Nets. (download PDF).
  47. Hao F, Clarke D. How to Delete a Secret. (download PDF).

2013

(back to top)

  1. Mikulski L, Piatkowski M, Smyczynski S. Lexicographical Generations of Combined Traces. (download PDF).
  2. Missier P, Bryans J, Danger R, Curcin V. Preserving privacy in shared provenance data. (download PDF).
  3. Wongthai W, Liberal Rocha F, van Moorsel A. A Generic Logging Template for Infrastructure as a Service Cloud. (download PDF).
  4. Ushaw G, Ziogas E, Eyre J, Morgan G. An Efficient Application of Gesture Recognition from a 2D Camera for Rehabilitation of Patients with Impaired Dexterity. (download PDF).
  5. Emms M, Arief B, Little N, van Moorsel A. Risks of Offline Verify PIN on Contactless Cards. (download PDF).
  6. Clarke D, Hao F. Cryptanalysis of the Dragonfly Key Exchange Protocol. (download PDF).
  7. Bryans J, Payne R, Holt J, Perry S. Semi-Formal and Formal Interface Specification for System of Systems Architecture. (download PDF).
  8. Miu T, Missier P. Predicting the Execution Time of Workflow Blocks Based on Their Input Features. (download PDF).
  9. Klaudel H, Koutny M, Duan Z. Interval Temporal Logic Semantics of Box Algebra. (download PDF).
  10. Lopatkin I, Romanovsky A. A Method for Rigorous Development of Fault-Tolerant Systems. (download PDF).
  11. Missier P, Dey S, Belhajjame K, Cuevas-Vicenttin V, Ludaescher B. D-PROV: extending the PROV provenance model with workflow structure. (download PDF).
  12. Konios A, Pietkiewicz-Koutny M. Modelling Ambient Systems with Coloured Petri Nets. (download PDF).
  13. Janicki R, Kleijn J, Koutny M, Mikulski L. Causal Structures for General Concurrent Behaviours. (download PDF).
  14. Bertens L, Kleijn J, Hille S, Koutny M, Heiner M, Verbeek F. Modeling biological gradient formation: combining partial differential equations and Petri nets. (download PDF).
  15. Molina-Jimenez C, Shrivastava S, Wheater S. An Architecture for Negotiation and Enforcement of Resource Usage Policies. (download PDF).
  16. Iliasov A, Lopatkin I, Romanovsky A. The SafeCap Platform for Modelling Railway Safety and Capacity. (download PDF).
  17. Molina-Jimenez C, Shrivastava S. Establishing Conformance Between Contracts and Choreographies. (download PDF).
  18. Randell B. Incremental Construction of Structured Occurrence Nets. (download PDF).
  19. Hao F, Clarke D, Shepherd C. Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. (download PDF).
  20. Emms M, Arief B, Hannon J, van Moorsel A. POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. (download PDF).
  21. Zeng W, Mu C, Koutny M. A Flow Sensitive Security Model for Cloud Computing Systems. (download PDF).
  22. Solaiman K, Brook M, Ushaw G, Morgan G. A Read-Write-Validate Approach to Optimistic Concurrency Control for Energy Efficiency of Resource-Constrained Systems. (download PDF).
  23. Li B. Branching processes of communication structured PT-nets. (download PDF).
  24. Brook M, Sharp C, Ushaw G, Blewitt W, Morgan G. Volatility Management of High Frequency Trading Environments. (download PDF).
  25. Andrews Z, Holt J, Ingram C, Payne R, Perry S, Romanovsky A. Traceable Engineering of Fault-Tolerant SoSs. (download PDF).
  26. Bell MJ, Collison M, Lord P. Can inferred provenance and its visualisation be used to detect erroneous annotation? A case study using UniProtKB. (download PDF).
  27. Missier P, Bryans J, Gamble C, Curcin V, Danger R. Provenance graph abstraction by node grouping. (download PDF).
  28. Jones CB. Balancing Expressiveness in Formal Approaches to Concurrency. (download PDF).
  29. Hayes IJ, Jones CB, Colvin RJ. Reasoning about concurrent programs: Refining rely-guarantee thinking. (download PDF).
  30. Hiden H, Woodman S, Watson P. A framework for dynamically generating predictive models of workflow execution. (download PDF).
  31. Satvat K, Forshaw M, Hao F, Toreini E. On the Privacy of Private Browsing – A Forensic Approach. (download PDF).
  32. Freitas L, Jones CB, Velykis A, Whiteside I. How to say why (in AI4FM). (download PDF).
  33. Fernandes J, Koutny M, Mikulski L, Pietkiewicz-Kounty M, Sokolov D, Yakovlev A. Persistent and Nonviolent Steps and the Design of GALS Systems. (download PDF).
  34. Emms M, Arief B, Hannon J, van Moorsel A. POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. (download PDF).
  35. Solaimain K, Brook M, Ushaw G, Morgan G. Optimistic Concurrency Control for Energy Efficiency in the Wireless Environment. (download PDF).
  36. Wongthai W, Rocha F, van Moorsel A. Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud. (download PDF).

2014

(back to top)

  1. Freitas F, Whiteside I. Proof Patterns for Formal Methods. (download PDF).
  2. Iliasov A, Lopatkin I, Romanovsky A. Practical formal methods in railways – the SafeCap Approach. (download PDF).
  3. Lopatkin I, Romanovsky A. Rigorous Development of Fault-Tolerant Systems through Co-Refinement. (download PDF).
  4. Bryans J, Fitzgerald J, Payne R, Kristensen K. Maintaining Emergence in Systems of Systems Integration: a Contractual Approach using SysML. (download PDF).
  5. Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. Studying the Interplay of Concurrency, Performance, Energy and Reliability with ArchOn – an Architecture-open Resource-driven Cross-layer Modelling Framework. (download PDF).
  6. Sharp C, Morgan G. Introducing Semantic Conflict Resolution to Word Based Software Transactional Memory. (download PDF).
  7. Vlachokyriakos V, Dunphy P, Taylor N, Comber R, Olivier P. BallotShare: Exploring the design space of digital voting in a workplace environment. (download PDF).
  8. Solamain K, Brook M, Ushaw G, Morgan G. Optimistic Concurrency Control for Energy Efficiency in the Wireless Environment. (download PDF).
  9. Iliasov A, Lopatkin I, Mihut A, Romanovsky A. Real-time ATO reconfiguration for operational stability. (download PDF).
  10. Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. Resource-driven Modelling of Complex Digital Systems with Uncertainty. (download PDF).
  11. Jones CB, Lovert MJ, Steggles LJ. Revising Basic Theorem Proving Algorithms to Cope with the Logic of Partial Functions. (download PDF).
  12. Dias D, Freitas L, Jones C. Abstracting Interference in Postconditions. (download PDF).
  13. Payne R, Andrews Z, Schulze U. Proceedings of the Workshop on Engineering Dependable Systems of Systems (EDSoS) 2014. (download PDF).
  14. Gross T. Signatures and Efficient Proofs on Committed Graphs and NP-Statements. (download PDF).
  15. Gross T. Issuing CL-Signatures on Speed: Signing with a Constant Number of Exponentiations. (download PDF).
  16. Mauerhoefer L, Kawelke P, Poliakov I, Olivier P, Foster E. An exploration of the feasibility of using Google Glass for dietary assessment. (download PDF).
  17. Mauerhoefer L, Kawelke P, Poliakov I, Olivier P, Foster E. Testing the feasibility of Intake24 as an portion size estimation aid. (download PDF).
  18. Emms M, Arief B, Freitas L, Hannon J, van Moorsel A. Harvesting high value foreign currency transactions from EMV contactless cards without the PIN. (download PDF).
  19. Morisset C, Yevseyeva I, Gross T, van Moorsel A. Formalization of Influencing in Information Security. (download PDF).
  20. Misirli G, Hallinan J, Wipat A. Composable Modular Models for Synthetic Biology. (download PDF).
  21. Hayes IJ, Jones CB, Colvin RJ. Laws and semantics for rely-guarantee refinement. (download PDF).
  22. Emms M, Freitas L, van Moorsel A. Rigorous Design and Implementation of an Emulator for EMV Contactless Payments. (download PDF).
  23. Rhodes C, Blewitt W, Sharp C, Ushaw G, Morgan G. Smart Routing: A Novel Application of Collaborative Path-finding to Smart Parking Systems. (download PDF).
  24. Mehrnezhad M, Hao F, Shahandashti SF. Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors. (download PDF).
  25. Watson P, Little M. Multilevel Security for Deploying Distributed Applications on Clouds, Devices and Things. (download PDF).
  26. Dias D, Freitas L. Designing an unbounded buffer in rely-guarantee. (download PDF).
  27. Alajrami S, Romanovsky A, Watson P, Roth A. Towards Cloud-Based Software Process Modelling and Enactment. (download PDF).
  28. Iliasov A, Romanovsky A. SafeCap: The Train Advisory System for Real-Time Traffic Management. (download PDF).
  29. Hao F, Shahandashti SF. The SPEKE Protocol Revisited. (download PDF).
  30. Emerson R, Ezhilchelvan P. A Non-Blocking Atomic-Multicast Service for Scalable In-memory Transaction Systems. (download PDF).
  31. Janicki R, Kleijn J, Koutny M, Mikulski L. Generalising Traces. (download PDF).
  32. Janicki R, Kleijn J, Koutny M, Mikulski L. Order Structures for Subclasses of Generalised Traces. (download PDF).
  33. Simpson M, Blewitt W, Ushaw G, Morgan G. Utilisation of Video Game Physics Techniques in Real Time Simulation of the Wheel Rail Interface for Predicted Derailemt of Rail Vehicles. (download PDF).
  34. Mikulski L, Piatkowski M, Rytter W. Square-free words over partially commutative alphabets. (download PDF).
  35. Jones CB. Turing and Software Verification. (download PDF).

2015

(back to top)

  1. deGennaro A, Stankaitis P. Efficient encoding of instructions of ARM Cortex M0+ processor. (download PDF).
  2. Rafiev A, Xia F, Iliasov A, Gensh R, Aalsaud A, Romanovsky A, Yakovlev A. Power-proportional modelling fidelity. (download PDF).
  3. Iliasov A, Romanovsky A. Formal Modelling of Railway Safety and Capacity. (download PDF).
  4. Iliasov A, Rafiev A, Xia F, Gensh R, Romanovsky A, Yakovlev A. A formal specification and prototyping language for multi-core system management. (download PDF).
  5. Battle N, Fitzgerald J. Proceedings of the 12th Overture Workshop, Newcastle University, 21 June, 2014. (download PDF).
  6. Jones C, Yatapanage N. Tackling Separation via Abstraction (with proofs). (download PDF).
  7. Li B, Randell B. SONCraft user manual. (download PDF).
  8. Ingram C, Payne R, Fitzgerald J, Diogo Couto L. Model-based Engineering of Emergence in a Collaborative SoS: Exploiting SysML & Formalism. (download PDF).
  9. Forshaw M, Thomas N, McGough AS. Trace-driven simulation for energy consumption in High Throughput Computing systems. (download PDF).
  10. Forshaw M, McGough AS. Reduction of wasted energy in a volunteer computing system through Reinforcement Learning. (download PDF).
  11. McGough S, Forshaw M, Gerrard C, Wheater S, Allen B, Robinson P. Comparison of a cost-effective virtual Cloud cluster with an existing campus cluster. (download PDF).
  12. Dunphy P, Nicholson J, Vlachokyriakos V, Briggs P, Olivier P. Crowdsourcing and CCTV: the Effect of Interface, Financial Bonus and Video Type. (download PDF).
  13. Toreini E, Randell B, Hao F. An Acoustic Side Channel Attack on Enigma. (download PDF).
  14. Iliasov A, Laibinis L, Troubitsyna E, Adjepon-Yamoah D, Romanovsky A. Refinement-based Approach to Co-engineering Requirements and Formal Models. (download PDF).
  15. Shrivastava S, Little M. Designing Atomic Business Functions. (download PDF).
  16. Alajrami S, Romanovsky A, Watson P. On Cloud-Based Software Processes. (download PDF).
  17. Tarasyuk O, Gorbenko A, Romanovsky A, Kharchenko V. The Impact of Consistency on System Latency in Fault Tolerant Internet Computing. (download PDF).
  18. Solaiman E, Sfyrakis I, Molina-Jimenez C. Dynamic Testing and Deployment of a Contract Monitoring Service. (download PDF).
  19. Clarke D, Toreini E, Hao F. Determining User Passwords From Partial Information. (download PDF).
  20. Bhattacharyya A, Mokhov A, Pierce K. A Comparison of Formalisms for Modelling and Analysis of Dynamic Reconfiguration of Dependable Systems. (download PDF).
  21. Li B, Koutny M. Unfolding CSPT-nets. (download PDF).
  22. Solaiman E, Sun W, Molina-Jimenez C. A Tool for the Automatic Verification of BPMN Choreographies. (download PDF).
  23. Warrender J, Lord P. Scaffolding the Mitochondrial Disease Ontology from extant knowledge sources. (download PDF).
  24. Warrender J, Lord P. How, What and Why to test an ontology. (download PDF).
  25. Mace J, Morisset C, van Moorsel A. Quantitative Workflow Resiliency. (download PDF).
  26. Mace J, Morisset C, van Moorsel A. Modelling User Availability in Workflow Resiliency Analysis. (download PDF).
  27. Mace J, Morisset C, van Moorsel A. Impact of Policy Design on Workflow Resiliency Computation Time. (download PDF).
  28. Ali T, Clarke D, McCorry P. Bitcoin: Perils of an Unregulated Global P2P Currency. (download PDF).
  29. Gensh R, Aalsaud A, Rafiev A, Xia F, Iliasov A, Romanovsky A, Yakovlev A. Experiments with Odroid-XU3 board. (download PDF).
  30. Jones CB, Yatapanage N. Reasoning about Separation using Abstraction and Reification (including proofs). (download PDF).
  31. Ezhilchelvan P, Mitrani I. Evaluating the Probability of Malicious Co-residency in Public Clouds. (download PDF).
  32. Adjepon-Yamoah D, Romanovsky A, Iliasov A. A Reactive Architecture for Cloud-Based System Engineering. (download PDF).
  33. Kamil S, Thomas N. An Empirical Study Comparing the PEPA Eclipse Plug-in and GPA Tools. (download PDF).

2016

(back to top)

  1. Solaiman E, Sfyrakis I, Molina-Jimenez C. High Level Model Checker Based Testing Of Electronic Contracts. (download PDF).
  2. Cala J, Marei E, Xu Y, Takeda K, Missier P. Scalable and Efficient Whole-exome Data Processing Using Workflows on the Cloud. (download PDF).
  3. Li B, Koutny M, Randell B. SONCraft: A Tool for Construction, Simulation and Verification of Structured Occurrence Nets. (download PDF).
  4. Alajrami S, Gallina B, Romanovsky A. Enabling Global Software Development via Cloud-Based Software Process Enactment. (download PDF).

Background

(back to top)

The Technical Report information has been re-constructed by downloading and processing copies of historical web pages, originally published by the School or University, and preserved by The Internet Archive. The canonical database which originally populated those pages was lost as part of the institution’s re-organisation of IT departments. Prior to that, part of the database was migrated to a centrally-managed system, principally responsible for managing the University’s REF submission, but that migration process lost information which was not REF relevant (such as co-authors that were not REF eligible, including all students).

This is being worked on by Jon Dowland.