- A Substitution Operation for Constraints Peter Jeavons 1 , David Cohen 1 and Martin Cooper 2
- A Unifying Framework Tractable Constraints
- Are there optimal reuse distance constraints for FAPs with random Tx
- Contemporary Mathematics Volume 00, 0000
- A Test for Tractability Peter Jeavons 1 , David Cohen 1 and Marc Gyssens 2
- Towards High Order Constraint Representations for the Frequency Assignment Problem
- On The Algebraic Structure Of Combinatorial Problems
- Constructing Constraints Peter Jeavons
- Derivation of Constraints and Database Relations
- Expressiveness of Binary Constraints for the Frequency Assignment Problem
- Constraints and Universal Algebra Peter Jeavons, David Cohen
- Recovering a Relation from a Decomposition Using Constraint Satisfaction
- Tractable Constraints on Ordered Domains Peter Jeavons
- Noname manuscript No. (will be inserted by the editor)
- A SECOND DERIVATIVE SQP METHOD WITH IMPOSED Nicholas I. M. Gould Daniel P. Robinson
- Discrete Gene Regulatory Networks (dGRNs): A novel approach to configuring sensor networks
- A Bramble-Pasciak-like method with applications in optimization H. Sue Dollar
- What Does Aspect-Oriented Programming Mean for Functional Programmers?
- Analysing and Visualising Security and Usability in IRIS Shamal Faily
- Authenticating ad hoc networks by comparison of short digests
- A Systematic Derivation of the STG Machine Verified in Coq
- Constraints, Consistency, and Closure Peter Jeavons, David Cohen
- Characterising Tractable Constraints Martin Cooper
- Closure Properties of Constraints \Lambda Peter Jeavons, David Cohen
- Decomposing Constraint Satisfaction Problems
- , , 1--19 () fl Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.
- Why higher order constraints are necessary to model frequency assignment problems
- Modeling Alveolar Volume Changes During Periodic Breathing in Heterogeneously Ventilated Lungs
- Identifying Eciently Solvable Cases David Cohen 1 , Martin Cooper 2 , Peter Jeavons 3 , and Andrei Krokhin 4
- Form Follows Function Model-Driven Engineering for Clinical Trials
- Foundations of Schema Mapping Management Marcelo Arenas Jorge Prez Juan Reutter Cristian Riveros
- Refactoring Pattern Matching , Jeremy Gibbons
- Presentations, seminars and tutorials 1. 7 April 2011, at 5:20pm. Rational authentication protocols. Host: Dr. Tom
- A Maximal Tractable Class of Soft Constraints David Cohen
- Exploring a Quantum Theory with Graph Rewriting and Computer Algebra
- Inverting Schema Mappings: Bridging the Gap between Theory and Practice
- Lenses, coalgebraically: View updates through the looking glass
- On the construction of digest functions for manual authentication protocols
- Structural Decomposition Methods and What They are Good For
- Two Requirements for Usable and Secure Software Engineering
- Weak Cost Monadic Logic Over Infinite Trees Michael Vanden Boom
- Rational authentication protocols Long H. Nguyen
- Abstract--In silico models of cancer progression are numerous and diverse. Integration of different cancer models
- Persona Cases: A Technique for grounding Personas Shamal Faily
- The Recovery of a Schema Mapping: Bringing Exchanged Data Back
- Report no. 07/21 Linear Instability of asymmetric Poiseuille flows
- Optimization Methods for the Partner Units Markus Aschinger1
- Probabilistic Search with Agile UAVs Sonia Waharte, Andrew Symington, Niki Trigoni
- Revealing the hidden lives of underground animals using magneto-inductive tracking
- Foundations of Rule-Based Query Answering Francois Bry1
- Property Specifications for Workflow Modelling Peter Y. H. Wong and Jeremy Gibbons
- Science of Computer Programming 75 (2010) 10481076 Contents lists available at ScienceDirect
- Computing Science Group Nominal Game Semantics
- Report no. 08/15 Using global interpolation to evaluate the
- Report no. 09/3 GMRES for oscillatory matrix-valued differential equations
- Communicating Process Architectures 2009 Peter Welch, Herman Roebbers and Tobe Announced (Eds.)
- Outline Introduction Experimental Design Results Analysis and Discussion Summary and conclusion Two Heads are Better Than One
- Model-driven support for a vaccine study in Kathmandu Jim Davies, Jeremy Gibbons, Steve Harris,
- Graphical modelling for simulation and formal analysis of wireless network protocols
- Barry is not the weakest link: Eliciting Secure System Requirements with Personas
- A Meta-Model for Usable Secure Requirements Engineering
- Metadata-Driven Software for Clinical Trials Charles Crichton, Jim Davies, Jeremy Gibbons, Steve Harris, Andrew Tsui
- LACL Seminar 16 March 2009
- Accelerating Cancer Research Using Semantics-Driven Technology James Brenton
- Formal verification of not fully symmetric systems using counter abstraction
- Model Checking Succinct and Parametric One-Counter Automata
- Report no. 08/20 Barycentric-Remez algorithms for best polynomial
- Tackling the Partner Units Configuration Problem Markus Aschinger, Conrad Drescher, Georg Gottlob, Peter Jeavons, Evgenij Thorstensen
- A Functional Implementation of the Formal Template Language
- A SECOND DERIVATIVE SQP METHOD : THEORETICAL ISSUES Nicholas I. M. Gould Daniel P. Robinson
- Evolution and Sustainability of a Wildlife Monitoring Sensor Network
- Report no. 09/02 Fast, numerically stable computation of oscillatory integrals with
- Programming Research Group THE GROUP THEORETIC ORIGIN
- Report no. 08/13 Chebfun: A New Kind of Numerical Computing
- The Theory and Practice of Concurrency
- GADTless Programming in Haskell 98 Martin Sulzmann1
- Computing Science THE EXPRESSIVE POWER OF VALUED CONSTRAINTS
- QUANTUM GROUP Categorical Models of Quantum Circuits
- Oxford University Computing Laboratory Cost-effective development of flexible
- Semantics-driven Development for Electronic Government Applications
- The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure
- To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
- Genetic regulatory networks are large graphical structures and their inference is a central problem in bioinformatics. However, be-
- Gradual Refinement Blending Pattern Matching with Data Abstraction
- A SECOND DERIVATIVE SQP METHOD : LOCAL CONVERGENCE Nick I. M. Gould Daniel P. Robinson
- Generating short-output digest functions L.H. Nguyen and A.W. Roscoe
- A Saturation Method for the Modal Mu-Calculus with Backwards Modalities over Pushdown Systems
- Cornelius Namiluko, Jun Ho Huh, John Lyle and Andrew Martin
- An Underwater Robotic Network for Monitoring Nuclear Waste Storage Pools
- EFFECT OF RAINFALL ON LINK QUALITY IN AN OUTDOOR FOREST DEPLOYMENT
- Demo Abstract: Magneto-inductive tracking of underground Andrew Markham and Niki Trigoni
- Authentication protocols in pervasive computing
- Security and Usability: Analysis and Evaluation Ronald Kainda and Ivan Flechais and A.W. Roscoe
- Secure and Usable Out-Of-Band Channels for Ad hoc Mobile Device Interactions
- Learning in a changing world, an algebraic modal logical approach
- An Adventure into Hungarian Word Order with Cyclic Pregroups Mehrnoosh Sadrzadeh
- Computing Science Group A Cut-Free Sequent Calculus for Algebraic Dynamic
- Metadata Standards for Semantic Interoperability in Electronic Government
- Probabilistic Target Detection by Camera-Equipped UAVs Andrew Symington, Sonia Waharte, Simon Julier, Niki Trigoni
- Semantic Technologies in Electronic Government Tutorial and Workshop
- Computing Science INTELLECTUAL PROPERTY PROTECTION USING
- Complexity and Infinite Games on Finite Graphs
- Analysing Mu-Calculus Properties of Pushdown Systems (Tool Presentation)
- Supporting Search and Rescue Operations with Sonia Waharte and Niki Trigoni
- Computing Laboratory PHASE GROUPS AND LOCAL HIDDEN VARIABLES
- Computing Science WHICH SUBMODULAR FUNCTIONS
- Report no. 08/19 Preconditioned GMRES for oscillatory integrals
- Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content
- Reachability in Parametric Counter Automata Christoph Haase , Stephan Kreutzer, Joel Ouaknine, and James Worrell