Computer Laboratory

List of PhD theses

This is a list of all the PhD theses so far recommended by the Computer Science Degree Committee to the Board of Graduate Studies for approval (which can in some cases mean that there are still corrections to be made before final approval). Fully approved Cambridge PhDs are listed in the University Library thesis catalog.

All authors are encouraged to publish their approved thesis as a Computer Laboratory Technical Report. Where available, the table below links to that public tech-report version of the thesis and/or the local PDF version collected by Lise Gough in /usr/groups/studentadmin/PhD_theses. (The latter files are only accessible to members of the Computer Laboratory and may in some cases not yet contain any final corrections required by the examiners.)

Note: If a Computer Laboratory research student's PhD is not listed here, then it might have been dealt with by the Mathematics Degree Committee (this includes any pre-1987 Computer Laboratory PhD) or by the Engineering Degree Committee (this applies to some early ones in the Digital Technology Group).

Data source: The table below is automatically generated from the Research_Students table on the departmental SQL server, maintained by Lise Gough, to whom enquiries about these records should be addressed.

authortitlesupervisorstartedsubmitted
approved
thesis
Andreas KoltesReconfigurable memory systems for embedded microprocessors rdm342010-10-01
Omar-Salim ChoudaryEfficient multivariate statistical techniques for extracting secrets from electronic devices mgk252010-10-01
Mark BattyThe C11 and C++11 Concurrency Model pes202009-01-05
Henrik LiengSurface modelling for 2D imagery nad102011-10-01TR-862
Charalampos RotsosScalable Software Defined Networking awm222009-04-10
Chloe BrownThe role of space in social groups: Analysis and technological applications cm5422011-10-01
Janina VoigtAliasing contracts: a unifying approach to object-oriented alias protection am212011-10-01
Steffen LoeschProgram equivalence in function metaprogramming via nominal Scott domains gw1042010-10-01TR-860
Steven HerbertWireless communications in vehicles ijw242010-10-01
Nik SultanaHigher-order proof translation lp152008-10-01
Jonathan WoodruffCHERI: A RISC capability machine for practical memory safety swm112010-10-01TR-858
Agata Brajdicrkh232009-10-01
Syed Ali Mustafa ZaidiAccelerating Control-Flow Intensive Code in Spatial Hardware djg112009-10-01
Christopher Smowtonam212009-10-01TR-865
Matej UrbasMechanising heterogeneous reasoning in theorem provers mj2012009-10-01local PDF
Thomas LippincottUnsupervised approaches to syntactic verb frame acquisition for biomedicine alk232009-10-01local PDF
Ching-Yun ChangTransformations for linguistic steganography sc6092009-10-01
Jukka Lehtosalodjg112009-10-01
Matko Botincanmjcg2009-10-01local PDF
Awais Atharsht252009-10-01TR-856
Tadas Baltrusaitispr102009-10-01TR-861, local PDF
Steven Smithsmh222005-10-01
Anastasios NoulasHuman urban mobility in location-based social networks: Analysis, models and applications cm5422010-01-05
James Gregory Jardinesht252009-10-01TR-848, local PDF
Jisun AnMulti-faceted analysis of news sharing in social networking sites jac222010-01-05
Wei Ming KhooDecompilation as search rja142009-10-01TR-844
Daniel BatesExploiting tightly-coupled cores rdm342009-10-01TR-846, local PDF
Nicholas PilkingtonHyperparameter optimisation for multiple kernels sbh112009-10-01
Narseo Vallina-RodriguezThe hidden costs of mobile applications: A cross-layer analysis of energy and spectrum waste of mobile applications jac222009-01-05
Ian DaviesWorkload measurement in command and control pr102008-10-01
Milos PuzovicHardware/software interface dynamic multicore scheduling djg112008-10-01local PDF
Dominic OrchardProgramming contextual computations am212008-10-01TR-854
Helen YannakoudakisAutomated assessment of English-learner writing ejb12009-10-01TR-842
Marek ReiMinimally supervised dependency-based methods for natural language processing ejb12009-10-01TR-840
John WickersonConcurrent verification for sequential programs gw1042008-10-01TR-834
Maximilian BolingbrokeSupercompilation for call-by-need languages am212008-10-01TR-835, local PDF
Kiran RachuriSmartphones based Social Sensing: Adaptive Sampling, Sensing and Computation Offloading cm5422009-10-01
Paul James FoxMassively parallel neural computation swm112009-04-10TR-830, local PDF
Leo WhiteExtending old languages for the new architectures am212008-10-01
Christopher Thompson-WalshSemantics and extension of a biological modelling language gw1042008-10-01
Soren PreibuschPrivacy choices online: preferences, incentives and enforcement arb332008-10-01local PDF
Colin KellyAutomatic extraction of property norm-like data from large text corpora alk232008-10-01TR-839
Benjamin RobertsLanguage semantics for secure information flow analysis ss3682008-10-01
Wei ChenCompressive sensing for wireless sensor networks ijw242009-10-01local PDF
Gregory ChadwickCommunication centric, multi-core, fine-grained processor architecture swm112008-10-01TR-832
Lin SunAutomatic induction of verb classes using clustering alk232008-10-01local PDF
Jonathan AndersonPrivacy engineering for social networks. fms272008-10-01TR-825, local PDF
Aisha Elsaftydjg112007-01-05local PDF
Salvatore ScellatoSpatial properties of online social services: measurement, analysis and applications cm5422009-04-10local PDF
Charles ReamsModelling energy efficiency for computation am212008-10-01TR-821
Joseph BonneauSecurity and privacy in the social web rja142008-10-01TR-819
Meredydd LuffCommunication for programmability and performance on multi-core processors swm112009-01-05TR-831, local PDF
Christopher NashSupporting virtuosity and flow in computer music afb212006-10-01
Robin MessageProgramming for humans- a new paradigm for domain-specific languages am212007-10-01TR-843
Syed HaiderComputational systems biology-based feature selection for cancer prognosis pl2192009-01-05
Eric KoskinenTemporal verification of programs mjcg2008-10-01
John TangTemporal network metrics and their application to real world networks cm5422008-10-01
Shailendra FuloriaRobust security for the electricity network rja142009-01-05
Hyoungshick KimComplex network analysis for secure and robust communications rja142008-10-01
Stephan KitchovitchComputational modelling and analysis of seasonal influenza transmission and evolution pl2192008-10-01
Christian RichardtColour videos with depth acquisition, processing and evaluation nad102007-10-01TR-815
Simon FothergillAutomatic assessment of kinaesthetic performance applied to rowing ah122005-10-01
Richard RussellPlanning with preferences using maximum satisfiability sbh112007-10-01TR-822
Sherif AkoushExploiting surplus renewable energy in datacentre computing ah122007-10-01local PDF
Philip TaylorSpecification of policy languages for network routing protocols in the Bellman-Ford family tgg222007-10-01
Vilius NaudziunasDesign and implementation of a language for path algebras tgg222008-10-01
Ruoshui LiuPlanning and deployment of wireless sensor networks ijw242007-10-01
Arno PaulyComputable metamathematics and its applications to game theory ad2602008-10-01local PDF
Viet Anh NguyenBayesian approaches to biological network predictions pl2192007-10-01
Pedro BrandaoAbstracting information on body area networks jmb252007-04-17TR-812
Derek MurrayA distributed execution engine supporting data-dependent control flow smh222007-10-01local PDF
Andrew LewisReconstructing compressed photo and video data mgk252007-10-01TR-813
Anilkumar SorathiyaComputational modelling approaches to HIV-1 dynamics pl2192007-10-01
Ian LeungFast network analysis and applications in real-world networks pl2192008-01-05local PDF
Md Abdul AlimOn the Interaction of Internet Routing Protocols tgg222007-10-01
Silvia BreuMining and tracking in evolving software am212006-04-17TR-838, local PDF
Nishanth SastrySocial network support for data delivery infrastructures jac222007-04-17
Amitabha RoySoftware lock elision for x86 machine code smh222007-10-01TR-801, local PDF
Johanna GeissLatent semantic sentence clustering for multi-document summarization sht252007-04-17TR-802, local PDF
Ola MahmoudSecond-order algebraic theories mpf232007-01-05TR-807, local PDF
Laurel RiekExpression synthesis on robots pr102007-10-01local PDF
Ekaterina ShutovaComputational approaches to figurative language sht252007-10-01TR-803
Simon HayA model personal energy meter ah122007-10-01TR-805, local PDF
Jean MartinaVerification of security protocols based on multicase communication lcp152006-10-01TR-816
Julien QuintardTowards a worldwide storage infrastructure jmb252007-10-01
Nick Barrow-WilliamsProximity coherence for chip-multiprocessors swm112007-10-01TR-810, local PDF
Thomas TuerkA separation logic framework for HOL mjcg2007-01-05TR-799
John MillerDistributed virtual environment scalability and security jac222006-10-01TR-809
Stephen KellBlack-box composition of mismatched software compnents djg112006-10-01TR-845, local PDF
Jonathan MakFacilitating program parallelisation - a profiling-based approach am212007-10-01TR-796, local PDF
Weisi GuoPower allocation for wireless collaborative networks ijw242007-04-17
Robert WatsonNew approaches to operating system security extensibility rja142005-10-01TR-818, local PDF
Richard BergmairMonte Carlo Semantics: Robust inference and logical pattern processing based on integrated deep and shallow representations aac102006-10-01
Bogdan RomanScalable Cross-Layer Wireless Medium Access Control ijw242006-10-01
Yuguo HeHierarchies in first-order logic and parameterized complexity ad2602006-10-01local PDF
Bjarki HolmDescriptive complexity of linear algebra ad2602006-10-01local PDF
James SrinivasanImproving cache utilisation swm112003-01-05TR-800, local PDF
Boris FeiginInterpretational overhead in system software am212006-10-01TR-797
James BridgeMachine learning and automated theorem proving lcp152006-10-01TR-792, local PDF
Oliver WoodmanPedestrian localisation for indoor environments ah122006-10-01local PDF
Shazia AfzalAffect inference in learning environments: a functional view of facial affect analysis using naturalistic data pr102006-10-01TR-793, local PDF
Periklis AkritidisPractical memory safety for C smh222006-10-01TR-798, local PDF
Aurelie HerbelotUnspecified quantification aac102006-10-01TR-795, local PDF
Daniel GreenfieldRentian locality in chip multiprocessors swm112006-04-17local PDF
Oeistein AndersenGrammatical error prediction ejb12006-10-01TR-794, local PDF
Theo MarkettosActive electromagnetic attacks on secure hardware swm112003-10-01TR-811, local PDF
Mohan GanesalingamThe Language of Mathematics aac102007-10-01local PDF
Thomas CashmanNURBS-compatible subdivision surfaces nad102006-10-01TR-773
Richard Van der WathComputational modelling of hematopoietic stem cell division and regulation dynamics pl2192005-10-01
Daniel O'KeeffeDistributed complex event detection for pervasive computing jmb252003-10-01TR-783
Pradipta BiswasInclusive user modelling pr102006-10-01local PDF
Andreas VlachosSemi-supervised learning for biomedical information extraction ejb12006-10-01TR-791
Chung Kil HurCategorical equational systems: algebraic models and equational reasoning mpf232004-10-01local PDF
Sriram SrinivasanKilim: A server framework with lightweight actors, isolation types and Zero-copy messaging jmb252005-10-01TR-769
John BillingsSpecifying and compiling Internet routing protocols tgg222005-10-01
Yan WuPropagation modelling for wireless sensor networks deployed to perform civil infrastructure monitoring ijw242006-10-01
Wei LiToward online behavioural traffic classification awm222007-10-01
Jatinder SinghControlling the dissemination and disclosure of healthcare events jmb252005-10-01TR-770
Olexiy GotsmanLogics and analyses for concurrent heap-manipulating programs mjcg2005-10-01TR-758
Anthony HylickManaging energy consumption of hard disk drives by optimizing system interaction ah122005-10-01local PDF
Behzad BastaniOpen evolvable systems design by process-oriented modeling djg112003-10-01
Matthew LakinAn executable meta-language for inductive definitions with binders amp122005-10-01TR-772
Saar DrimerSecurity for volatile FPGAs mgk252005-10-01TR-763
Cecily MorrisonBodies-in-Space: investigating technology usage in co-present group interaction afb212006-10-01TR-771
Aaron CobleAnonymity, information and machine-assisted proof lcp152005-10-01TR-785, local PDF
Julian SmithTowards robust inexact geometric computation nad102003-10-01TR-766, local PDF
Ranald CloustonEquational logic for names and binders amp122005-10-01
Daniel BernhardtEmotion inference from human body motion pr102005-10-01TR-787
Alexander GurneyConstruction and verification of routing algebras tgg222005-10-01local PDF
Rok StrnisaFormalising, improving, and reusing the Java module system pes202005-10-01
Min LinChannel modelling for wireless sensor networks ijw242004-10-01
William CarsonPerformance modelling and design of bit-interleaved coded modulation ijw242005-10-01
Grzegorz MilosEfficient and effective sharing of memory in virtual machine monitors smh222005-10-01
Luis VargasIntegrating databases and Publish/Subscribe jmb252004-10-01
Mark AdcockImproving cache performance by runtime data movement am212004-10-01TR-757, local PDF
Rosemary FrancisNetworks for Field Programmable Gate Arrays swm112006-04-17TR-828
Jonathan HaymanPetri net semantics gw1042004-10-01TR-782
Philip PaulMicroelectronic Security Measures swm112005-10-01TR-829, local PDF
Magnus MyreenFormal verification of machine-code programs mjcg2005-10-01TR-765, local PDF
David TurnerNominal domain theory for concurrency gw1042004-10-01
Eric HendersonA text representation language for contextual and distributional processing aac102002-10-01
Arnab BanerjeeCommunication flows in power-efficient networks-on-chips swm112005-10-01TR-786
Timos AntonopoulosExpressive Power of Graph Languages ad2602004-01-05
Minor GordonSmall-scale, event-based overlays jmb252005-10-01TR-781, local PDF
Jonathan DaviesProgramming networks of vehicles ah122004-10-01TR-761
David CottinghamVehicular wireless communication ah122004-10-01TR-741
Atif AlviControlling pervasive domains with ontologies and rules djg112004-10-01
Caroline GasperinStatistical anaphora resolution in biomedical texts ejb12003-10-01TR-764, local PDF
Evangelia KalyvianakiResource provisioning for virtualized server applications smh222002-10-01TR-762
Na XuStatic contract checking for Haskell am212004-10-01TR-737
Diarmuid Ó SéaghdhaLearning compound noun semantics aac102004-10-01TR-735
Salman TaherianState-based Publish/Subscribe for Sensor Systems jmb252003-10-01TR-739
Shishir NagarajaRobust covert network topologies rja142003-10-01local PDF
Tomasz MacuraAutomating the quantitative analysis of micoscopy images km102004-10-01local PDF
Philip TuddenhamTabletop interfaces for remote collaboration pr102004-10-01TR-734
Anna RitchieCitation context analysis for information retrieval sht252004-10-01TR-744
James ReynoldsAn automatic proof-generating translation from high-order to first-order logic (with applications to linking HOL4 and ACL2) mjcg2004-10-01local PDF
Matthew JohnsonA new approach to Internet banking swm112004-10-01TR-731, local PDF
Alban RrustemiComputing surfaces - a platform for scalable interactive displays swm112004-10-01TR-732, local PDF
Tyler MooreCooperative attack and defense in distributed networks rja142004-10-01TR-718
Gerhard HanckeSecurity of proximity identification systems mgk252003-10-01TR-752, local PDF
Euan HarrisRate limiting in an event-driven BGP speaker jac222002-10-01local PDF
Sofiane NaciControlling prevasive domains with ontologies and rules am212004-10-01local PDF
Yu-En LuDistributed proximity query processing smh222004-01-05
Anton LokhmotovProgramming and compiling for embedded SIMD architectures am212004-10-01
Mbou Eyole-MononoEnergy-efficient sentient computing ah122004-10-01TR-722
Darren EdgeTangible user interfaces for peripheral interaction: episodic engagement with objects of physical, digital and social significance afb212004-10-01TR-733
Andrew Naish-GuzmanSparse and robust kernal methods sbh112003-10-01
Lauri PesonenA capability-based access control architecture for multi-domain publish/subscribe systems jmb252003-10-01TR-720
Gregory HughesLecture Adaptation for students with disabilities pr102004-10-01
Wenjun HuA tale of two prototypes: Practical network coding for wireless mesh networks jac222003-10-01
William HollingsworthUsing lexical chains to characterise scientific text sht252003-10-01
Shahzad KhanNegation and antonymy in sentiment classification ejb12004-10-01
Benjamin MedlockInvestigating classification for natural language processing tasks ejb12004-10-01TR-721
Rebecca WatsonOptimising the speed and accuracy of a Statistical GLR Parser ejb12004-10-01TR-743
Michael ComptonFormal verification of process algebra systems lcp152002-10-01local PDF
Steven MurdochCovert channel vulnerabilities in anonymity systems mgk252002-10-01TR-706, local PDF
Paul HunterComplexity and infinite games on finite graphs ad2602002-10-01TR-704
Pan HuiPeople are the network: Experimental design and evaluation of social based forwarding algorithms jac222004-10-01TR-713
Viktor VafeiadisModular fine-grained concurrency verification am212004-10-01TR-726, local PDF
Andy OzmentVulnerability discovery & software security rja142003-10-01
Simon HollisPulse-based, on-chip interconnect swm112003-10-01TR-698
Ian CaulfieldComplexity-effective superscalar embedded processors using instruction-level distributed processing swm112002-10-01TR-707
Alan LawrenceOptimizing compilation with the value state dependence graph am212002-10-01TR-705
Feng HaoOn using fuzzy data in security machanisms rja142004-04-17TR-715
Doug SantryA cluster storage system for modern virtual machines iap2003-01-05
Richard SouthernAnimation manifolds for representing topological alteration nad102003-10-01TR-723
Jacques FournierVector microprocessors for cryptography swm112003-10-01TR-701
Lucy Brace-EvansEvent structures with persistence gw1042003-10-01TR-710
William BillingsleyThe Intelligent Book: technologies for intelligent and adaptive textbooks focussing on Discrete Mathematics pr102002-10-01TR-719
Martin VechevDerivation and evaluation of concurrent collectors mr102003-10-01
Alisdair Stuart WrenRelationships for object-oriented programming languages amp122003-10-01TR-702
Tal Sobol-ShiklerLe ton fait la musique: analysis of expressions in speech pr102002-10-01TR-740
Ulrich PaquetBayesian inference for latent variable models sbh112003-10-01TR-724
Timothy MoretonA wide-area file system for migrating virtual machines iap2002-10-01TR-714
Jolyon ClulowOn the security of real-world devices rja142003-10-01
Mark GrundlandColor, style and composition in image processing nad102001-01-05local PDF
Chi-kin ChauNetworks and disputes rg312003-10-01
Manuel CostaEnd-to-end containment of Internet worm epidemics jac222003-10-01
Russ RossCluster storage for commodity computation iap2003-04-10TR-690, local PDF
Christopher PurcellScaling mount concurrency: scalability and progress in concurrent algorithms kaf2003-10-01TR-697
Samuel StatonName-passing process calculi: operational models and structural operational semantics mpf232002-10-01TR-688
Alexander HoUnderstanding systems with virtual machines smh222002-10-01local PDF
Juliano IyodaTranslating HOL functions to hardware mjcg2002-10-01TR-682
Eiko YonekiECCO: data centric asynchronous communication jmb252002-10-01TR-677
Eng Keong LuaThe structure of Internet latency jac222003-10-01
Christian KreibichStructural traffic analysis for network security monitoring jac222002-10-01
Andrew TwiggCompact forbidden-set routing km102002-10-01TR-678, local PDF
Ole H JensenMobile Processes in Bigraphs pes201995-01-01
Boris DragovicCASPEr: containment-aware security for pervasive computing environments jac222002-10-01
Anil MadhavapeddyCreating high-performance statically type-safe network applications djg112002-10-01TR-775
Sarah ThompsonOn the application of program analysis and transformation to high reliability electronics am212003-10-01TR-670
Gareth StoyleA theory of dynamic software updates pes202001-10-01local PDF
Timothy DeeganThe main name system jac222002-10-01
Maja VukovicContext aware service composition pr102003-01-05TR-700
Stephen RymillPsychologically-based simulation of human behaviour nad102002-10-01TR-717, local PDF
Paula ButteryComputational models for first language acquisition ejb12002-04-10TR-675
Tolga UzunerEffective network complexity jac222002-01-05
Eben UptonCompiling with data dependence graphs mr102001-10-01local PDF
Hui-Yun LiSecurity evaluation at design time for cryptographic hardware swm112003-01-05TR-665
Andrew WarfieldVirtual devices for virtual machines smh222002-10-01local PDF
Calicrates Policroniades-BorrazDecomposing file data into discernible items iap2001-10-01TR-672
Meng How LimLandmark guided forwarding jac222002-10-01TR-674
Julian ChesterfieldJoint source-channel UEP coding for multimedia streaming in the wireless wide area network environment jac222002-10-01
Piotr ZielinskiMinimizing latency of agreement protocols mgk252001-10-01TR-667
Karl JeacleTCP-XM jac222002-10-01
Richard ClaytonAnonymity and traceability in cyberspace rja142000-10-01TR-653, local PDF
David SpenceLocation based code placement in distributed systems jac222002-10-01local PDF
Matthew ParkinsonLocal reasoning for Java amp122001-10-01TR-654
Moritz BeckerCASSANDRA: flexible trust management and its application to electronic health records pes202001-10-01TR-648
Judita PreissProbabilistic word sense disambiguation ejb12001-10-01TR-673
Marco Palomino-ZunigaDistributed creation and maintenance of web content indices km102000-10-01
Jia MengThe integration of higher order interactive proof with first order automatic theorem proving lcp152002-10-01
Mohamed HassanMultiresolution in geometric modelling: subdivision mark points and ternary subdivison nad102000-10-01local PDF
Alberto FernandesSpectrum management for revenue maximisation in DSL djg112001-10-01
Nathan DimmockUsing trust and risk for access control in global computing jmb252002-01-05TR-643
Rana El-KalioubyMind-reading machines: automated inference of complex mental states pr102001-10-01TR-636
Jeremy SingerStatic program analysis based on virtual register renaming mr102001-10-01TR-660
Carsten MoenningIntrinsic point-based surface processing nad102001-10-01TR-658
Hyun Jin ChoiSecurity protocol design by composition lcp152000-04-10TR-657
Christopher TownOntology based visual information processing jgd10002001-10-01local PDF
Joerg LeplerCooperation and deviation in market-based resource allocation mr101999-01-01TR-622
Mark ShinwellThe fresh approach: functional programming with names and binders amp122001-01-05TR-618, local PDF
Evangelos KotsovinosGlobal public computing smh222001-10-01TR-615
David EyersActive privilege management for distributed access control systems km102001-10-01TR-669
James Roy BulpinOperating system support for simultaneous multithreaded processors iap2000-10-01TR-619
Scott FairbanksHigh precision timing using self-timed circuits swm112001-10-01TR-738
Sergei SkorobogatovSemi-invasive attacks - a new approach to hardware security analysis rja142000-04-10TR-630
Arasnath KimisGeneric event services middleware jmb251999-10-01
Nicholas NethercoteDynamic binary analysis and instrumentation or building tools is easy am212001-10-01TR-606
Roongroj NopsuwanchaiDiscriminative training methods and their applications to handwriting recognition nad102000-10-01TR-652
Prem FernandoAutomatic recognition of ancient Syriac handwriting wfc2000-10-01
Robert Gordon HagueEnd-user programming in multiple languages pr102000-10-01TR-651
Steven McKellarAn extension to the OSI model of network management for large-scale collaborative performance measurement jmb252000-10-01
Simon FrankauHardware synthesis from stream-processing functional language swm112000-10-01TR-824, local PDF
Neil E JohnsonCode size optimization for embedded processors am212000-10-01TR-607
Marc Peter CardleAutomated editing of sound and motion pr102000-10-01
Hasan AmjadCombining model checking and theorem proving mjcg2000-10-01TR-601
Andrei SerjantovOn the anonymity of anonymity systems pes202000-10-01TR-604
Brian ShandTrust for resource control: self-enforcing automatic rational contracts between computers jmb252001-01-05TR-600
Peter PietzuchHermes: a scalable event-based middleware jmb252000-10-01TR-590, local PDF
Michael BondzaidiUnderstanding security APIs rja142000-10-01local PDF
George DanezisBetter anonymous communications rja142000-10-01TR-594
Andras BelokosztolszkiRole-based access control policy administration km102000-10-01TR-586
Silas BrownConversion of notations pr102000-10-01TR-591
Robert EnnalsAdaptive evaluation of non-strict programs am212000-10-01TR-730
Panit WatcharawitchMulTEP: a multi-threaded embedded processor swm112000-10-01TR-588
Steven BrooksConcise texture editing nad102000-01-05TR-584
Mark AshdownPersonal projected displays pr101999-10-01TR-585
Pablo ArrighiRepresentations of quantum operations with applications to quantum cryptography ad2602000-10-01TR-595
Keir Anthony FraserPractical lock-freedom iap1999-10-01TR-579
Advaith SiddharthanSyntactic simplification and text cohesion aac102000-10-01TR-597
Timothy GrangerReconfigurable wavelengh-switched optical networks for the internet core iml1998-10-01TR-575
David RicherbyFixed-point logics with choice ad2601999-10-01
Sang-Bum SuhAn effective multiple access policy for the home telephone wiring in a home LAN djg111998-10-01
Jianxin YanSecurity for online games rja141999-10-01
James HallMulti-layer network monitoring and analysis iml1998-10-01TR-571
Richard SharpHigher-level hardware synthesis am212000-10-01
Donnla B Nic GearailtDictionary characteristics in cross-language information retrieval ksj1997-10-01TR-616
Walt YaoTrust management for widely distributed systems jmb251998-10-01TR-608
Alan AbrahamsDeveloping and executing electronic commerce applications with occurrences jmb251999-10-01
Michael J BlainAnimating Liquids nad101997-10-01
Markus G KuhnCompromising emanations: eavesdropping risks of computer displays rja141997-10-01TR-577, local PDF
Alexis HombrecherReconciling event taxonomies across administrative domains km101998-10-01
Ulrich LangAccess policies for middleware rja141998-10-01TR-564
Keith WansbroughSimple polymorphic usage analysis amp121998-10-01TR-623
Charalampos ManifavasMicropayment transaction costs rja141995-10-01
Jana SukkariehNatural language for knowledge representation SGP1996-10-01
Austin N DonnellyResource control in network elements iml1997-04-01TR-534
Susan PanchoContributions of formal security proofs rja141998-10-01
Paul CunninghamVerification of asynchronous circuits pr101998-10-01TR-587
Joseph Ell HurdFormal verification of probabilistic alogorithms mjcg1998-10-01TR-566
David B StewartQuality of service for storage systems jmb251998-10-01
Umar SaifArchitectures for ubiquitous systems djg111998-10-01TR-527
Lucian J WischikExplicit fusions: theory and implementation PAG1997-10-01
Richard M MortierInternet traffic engineering iap1997-10-01TR-532
Agathoniki TrigoniSemantic optimization of OQL queries km101998-10-01TR-547
Kerry RoddenEvaluating similarity-based visualisations as interfaces for image browsing jmb251995-10-01TR-543
Richard R WattsThe development of an uncertain reasoning system pr101997-10-01
Aline VillavicencioThe acquisition of a unification-based generalised categorial grammar ejb11997-10-01TR-533
Anna-Leena KorhonenSubcategorization acquisition ejb11997-10-01TR-530
Daryl J StewartA uniform sematics for Verilog and VHDL suitable for both simulation and verification MJCG1997-10-01
David C AbensourFinite state and statistical methods for natural language processing SGP1997-10-01
Mantsika MatooaneParallel systems in symbolic and algebraic computation AN1998-04-01TR-537
Timothy M EdmondsAdaptation for mobile systems ah121997-10-01
Mark F P GilliesPractical behavioural animation based on vision and attention nad101998-01-01
Martin ChoquetteLocal evidence in document retrieval KSJ1996-10-01TR-519
Andrew W MooreMeasurement-based management of network resources iml1997-10-01TR-528
Timothy L HarrisExtensible virtual machines SAC1997-10-01TR-525
Asis UnyapothNomadic pi-calculi: expressing and verifying communication infrastructure for mobile computation pes201996-10-01TR-514
James J LeiferOperational congruences for reactive systems AJRGM1995-10-01TR-521
Stephen O ChildsDisk quality of service in a general purpose operating system jmb251997-10-01
Dickon ReedThe effects of code layout on performance IML1997-04-01
Ioannis PapaefstathiouIncreasing packet network bandwidth through low level compression IML1997-10-01
Sylvia F KnightNatural language processing for Aerospace documentation SGP1997-10-01
Jonathan D PfautzDepth perception in computer graphics pr101996-10-01TR-546
Paul D HankinA study of objects ADG1995-10-01
Francesco StajanoSecurity for ubiquitous computing rja141998-01-01
Rebecca IsaacsDynamic provisioning of resource-assured and programmable virtual private networks IML1997-01-01TR-516
Paul B MenageResource control of untrusted code in an open programmable network SAC1996-10-01TR-561
Reuben R ThomasMite: a basis for ubiquitous virtual machines mr101995-10-01
Tony PolichroniadisHigh level control of vitual actors nad101997-10-01
Sheng F LiStateless client computing ah121996-10-01
Wojciech BasalajProximity visualisation of abstract data km101997-10-01TR-509
Zhixue WuA New Approach To Implementing Atomic Data Types JKMM1989-04-10TR-338
Neil LawrenceVariational inference in probabilistic models WFC1998-01-01
Andrew J PenroseExtending lossless image compression nad101996-10-01TR-526
Radina StefanovaPower in radio networks ah121996-10-01
Christian UrbanClassical logic and computation GMB1996-10-01
David M LeaskLow power radio networking ah121996-01-01
James E GainEnhancing spatial deformation for virtual sculpting nad101997-04-01TR-499
Breton M SaundersFast animation dynamics pr101995-10-01
Yolanta BeresnevichieneA role and context based security model RMN1994-10-01TR-558
Giampaola BellaThe inductive verification of cryptographic protocols lcp151996-10-01TR-493
Kan ZhangOn Secure Information Flow in Computer Systems RMN1994-10-01
Pavel T WojciechowskiNomadic pict: language and infrastructure design for mobile computation km101995-10-01TR-492
Mark D SpiteriAn architecture for the notification, storage and retrieval of events jmb251995-10-01TR-494
Donald O OparahAdaptive resource management in a multimedia operating system IML1994-10-01
David M IngramIntegrated Quality of Service management jmb251996-10-01TR-501
Mohammad KhorsheedAutomatic recognition of words in Arabic manuscripts WFC1997-04-01TR-495
Oi Yee (Olivia) KwongWord sense selection in texts: an integrated model KSJ1996-10-01TR-504
Shaw ChuangSecurity management in ATM networks IML1993-04-01
Jong-Hyeon LeeDesigning a reliable publishing framework rja141996-10-01TR-489
Calum A M GrantSoftware visualization in Prolog pr101996-10-01TR-511
Oliver SeidelMetadata support for connecting application components asynchronously km101995-10-01
Che-Hao (Albert) ChangReasoning about security protocols RMN1994-01-01
Hendrik J BosElastic network control IML1995-10-01TR-483
Geraint PriceThe interaction between fault tolerance and security RMN1994-10-01TR-479
Fabien A P PetitcolasInformation hiding and its application to copyright protection rja141996-10-01
Clemens M BallarinComputer algebra and theorem proving lcp151996-01-01TR-473
Richard I TuckerAutomatic summarising and the CLASP system KSJ1993-10-01TR-484
James R ThomasStretching a point: aspect and temporal discourse SGP1994-10-01TR-486
Ben Y ReisSimulating music learning with autonomous listening agents: entropy, ambiguity and context WFC1996-10-01TR-472
Bruno CrispoDelegation of responsibility RMN1996-10-01
Jacques D FleuriotA combination of geometry theorem proving and nonstandard analysis, with application to Newton's Principia lcp151995-10-01TR-469
Mark StaplesA mechanised theory of refinement MJCG1994-10-01
Florian KammuellerModular reasoning in Isabelle lcp151995-10-01TR-470
Duncan P GrisbyA distributed adaptive window system ah121995-10-01
Steven P WilcoxSynthesis of asynchronous circuits pr101995-10-01TR-468
Richard J BradburyArchitectures for the control of home area networks djg111995-10-01
Steven M HandProviding quality of service in memory management IML1994-10-01
Jacobus E Van Der MerweOpen service support for ATM IML1994-10-01TR-450
Donald R SymeDeclarative theorem proving for operational semantics MJCG1994-10-01
Mohamed AfsharAn open parallel architecture for data-intensive applications JKMM1992-10-01TR-459
Ralph BecketEfficient knowledge and action planning in first order logic Manny Rayn1993-10-01
Michael NorrishC formalised in HOL MJCG1994-10-01TR-453
Andrew M R WardSensor-driven computing ah121995-10-01
John B P NaylonA wireless ATM local area network ah121994-10-01
Panayis Fourniotis PavlatosCompiler optimisation of typeless languages mr101993-10-01
Malgorzata E StysA processing model of information structure in machine translation KSJ1992-10-01
Giles J NelsonContext-aware and location systems ah121993-10-01
John RooneyThe structure of open ATM control architectures IML1995-01-01TR-451
Peter J C BrownSelective mesh refinement for rendering pr101994-10-01TR-490
M Jennifer Li Kam WaA measurement-based approach to flow control in ATM networks djg111993-10-01
Ian J LewisPrologPF: parallel logic and functions on the Delphi Machine WFC1995-04-01
Ian PrattThe user-safe device I/O architecture DRM1993-10-01
Hyun S ParkThe Korean Core Language Engine SGP1994-10-01
Stefan G HildManaging mobile connections pr101994-10-01
Christopher T FaigleDMS-Splines and radiosity Sabin1994-04-01
Feng ShiAn architecture for scalable and deterministic video servers ah121993-10-01TR-438
Stanley J MroseMultiresolution curve and surface design: theory and application of spline wavelets jgd10001994-10-01
Daniel L GordonScheduling in optically based ATM switching fabrics IML1992-10-01
Xiaobao ChenAn end-to-end communication support architecture for multi-service applications IML1993-10-01
Timothy J MillsContent modelling in multimedia information retrieval systems: the Cobra retrieval system km101994-10-01
Joshua X RossAn evaluation based approach to process calculi amp121992-10-01TR-456
Ian JacksonWho goes here? Confidentiality of location through anonymity RMN1993-10-01
David A HallsApplying mobile code to distributed systems jmb251994-10-01TR-439
Michael RoeCryptography and evidence RMN1992-10-01TR-780
Eirik HektoenStatistical parse selection using semantic cooccurrences ejb11991-10-01
Karl MacDormanSymbol grounding: learning categorical and sensorimotor predictions for coordination in autonomous robots WFC1991-10-01TR-423
Tanya BowdenNatural language techniques for error correction SGP1992-10-01
Victor CarrenoTransition assertions: a higher-order logic based method for the specification and verification of real-time systems MJCG1990-10-01
Gavin John StarkStream handling in multimedia communication systems ah121990-10-01
Steven L PopeApplication support for mobile computing jmb251993-10-01TR-415
Kam Hong ShumAdaptive parallelism for computing on heterogeneous clusters JKMM1993-04-01TR-404
Mark HumphrysAction selection methods using reinforcement learn jgd10001992-10-01TR-426
George KirazComputational approach to non-linear morphology SGP1992-10-01
Paul BarhamDevices in a multi-service operating system DRM1992-10-01TR-403
Chai-keong TohProtocol aspects of mobile radio networks djg111993-10-01
John HarrisonTheorem proving with the real numbers MJCG1992-10-01TR-408
Monica Nesi TheryFormalising process calculi in higher order logic MJCG1990-10-01TR-411
Scarlet SchwiderskiMonitoring the behaviour of distributed systems JKMM1992-10-01TR-400
Richard JB HaytonAn open architecture for secure interworking services JKMM1992-10-01TR-399
Jonathan SewellManaging complex models for computer graphics pr101992-10-01TR-420
Quentin Stafford-FraserVideo-augmented environments pr101992-10-01TR-419
Michael HincheyStructural design and formal methods lcp151992-10-01
William S HarbisonTrusting in computer systems RMN1989-10-01TR-437
Andrew J KennedyProgramming languages and dimensions am211992-01-01TR-391
Sanjay SaraswatPerformance analysis of Delphi machine WFC1992-10-01TR-385
Noha AdlyManagement of replicated data in large scale systems jmb251992-01-01TR-383
Uwe NimscheckRendering for free form deformations Sabin1992-10-01TR-381
Simon Andr CrosbyPerformance management in ATM networks IML1990-10-01TR-393
Oliver Michael CastleSynthetic image generation for a multiple-view autostereo display NEW1990-10-01TR-382
Arturo TrujilloLexicalist machine translation of spatial prepositions ejb11989-01-01
Timothy RoscoeThe structure of a multi-service operating system IML1991-10-01TR-376
Richard J BlackExplicit network scheduling DRM1991-10-01TR-361
Ian D B StarkNames and higher-order functions amp121991-10-01TR-363
Ross J AndersonRobust computer security RMN1992-01-01
Simon W MooreMultithreaded processor design DRM1991-10-01TR-358
Feng HuangRestructuring virtual memory to support distributed computing environments jmb251990-10-01TR-375
Nicholas Benedict Van SomerenHigh Quality De-Interlacing Of Television Images NEW1990-10-01
Subir Kumar BiswasHandling Realtime Traffic In Mobile Networks ah121990-10-01TR-351
Jane Louis HunterIntegrated sound synchronisation for computer animation NEW1991-01-01TR-348
Michael John TurnerThe Contour Tree Image encoding technique and file format NEW1990-10-01TR-344
Narm Hee LeeRouting in high speed integrated services networks RMN1991-01-01
Akira NakamuraAn investigation of real-time synchronisation RMN1991-04-01
Eoin Andrew HydenOperating System Support For Quality Of Service IML1990-10-01TR-340
Simon R KelleyCongestion control for unreserved traffic in ATM networks IML1990-01-01
Richard BoultonEfficiency In A Fully-Expansive Theorem Prover MJCG1990-10-01TR-337
Gavin M BiermanOn intuitionistic linear logic am211990-10-01TR-346
Sai Lai LoA modular and extensible network storage architecture jmb251988-01-01TR-326
Pierre David WellnerInteracting with paper on the Digitaldesk pr101991-01-01TR-330
Mark David HayterA workstation architecture to support multimedia DRM1990-10-01TR-319
Steven M G FreemanAn architecture for distributed user interfaces pr101989-10-01TR-342
Adrian M T WrigleyReal-time ray tracing on a novel HDTV framestore NEW1989-01-01
David M EversDistributed Computing With Objects pr101989-10-01TR-332
James Doug GrundyA method of program refinement MJCG1990-10-01TR-318
Barney D PellStrategy generation and evaluation for meta-game playing SGP1989-10-01TR-315
Guanxing LiSupporting distributed realtime computing jmb251989-01-01TR-322
John Peter Van TasselFemto-Vhdl: The Semantics Of A Subset Of Vhdl And Its Embedding In The Hol Proof Assistant MJCG1990-10-01TR-317
Michael R WarnerCharging and resource control for open dist systems DJW1990-04-01
Richard S CrouchThe Temporal Properties Of English Conditionals And Modals SGP1987-10-01TR-325
John CarrollPractical Unification-Based Parsing Of Natural Language ejb11992-02-01TR-314
J Matthew S DoarMulticast In The Asynchronous Transfer Mode Environment IML1989-10-01TR-298
Kish ShenStudies of and/or parallelism in Prolog am211987-01-01
P Nicholas BentonStrictness Analysis Of Lazy Functional Programs am211988-10-01TR-309
Cormac John SreenanSynchronisation services for digital continuous media RMN1988-01-01TR-292
Andrew D GordonFunctional programming and Input/Output lcp151987-10-01TR-285
Eike RitterCategorical Abstract Machines For Higher-Order Typed Lambda Calculi amp121989-10-01TR-297
David ElworthyThe semantics of noun phrase anaphora ejb11989-10-01TR-289
Innes FergusonTouring machines: an architecture for dynamic, rational, mobile agents WFC1988-10-01TR-273
Lee FedderGenerating natural language text from the output of an application program SGP1988-10-01
Kamiar SehatEvaluation of caches and cache coherency ah121986-10-01
Paul W JardetzkyNetwork file server design for continuous media RMN1988-10-01TR-268
John Michael LevineA flexible bidirectional dialogue system SGP1986-10-01
T Mark A LomasAspects of Computer Network Security RMN1986-10-01
Neil A DodgsonImage resampling NEW1989-10-01TR-261
Ian BensonReasoning About Contingent Events In Distributed Systems WFC1987-10-01
Martin D CoenInteractive program derivation lcp151988-10-01TR-272
Xiao quian ChenCongestion control and routing in integrated broadband networks IML1988-10-01
Rajeev GoréCut-Free Sequent And Tableau Systems For Propositional Normal Modal Logics WFC1988-10-01
Chu Suan AngContinuous media in fast networks ah121987-10-01
Rachel Cardell-OliverThe formal verification of hard real-time systems MJCG1988-10-01TR-255
Xiaofeng JiangMultipoint digital video communications ah121988-10-01TR-251
Siu Chi HsuComputer support for large character set languages NEW1988-10-01
Mads RosendahlAbstract interpretation and attribute grammars am211987-01-01
Chaoying MaDesigning a universal name service RMN1988-01-01TR-270
Thomas U VogelLearning In Large State Spaces With An Application To Biped Robot Walking WFC1988-01-01TR-241
Wing Hung LauRealistic 3D image composition NEW1988-10-01
Glenford E MappAn object-oriented approach to virtual memory management IML1988-01-01TR-242
Stephen M V HailesThe Design And Implementation Of Troy, A Distributed Object-Based Language scc1987-10-01
Olivia R NagioffAlgorithms for Image Encoding ah121985-01-01
Peter W DickmanDistributed Object Management In A Non-Small Graph Of Autonomous Networks With Few Failures IML1987-10-01
Michael Joseph DixonSystem support for multi-service traffic jmb251987-10-01TR-245
Jeremy BallSEMORICA: a system examining motion and object representation issues in computer animation NEW1987-10-01
Roy CroleProgramming metalogics with a fixpoint type amp121987-10-01TR-247
Heng WangModelling and image generation NEW1987-01-01TR-235
Benjamin MaciasAn incremental parser for govenment-binding theory SGP1986-10-01
John BradshawUsing Knowledge Of Purpose And Knowledge Of Structure As A Basis For Evaluating The Behaviour Of Mechanical Systems Young1987-10-01TR-236
David R MilwardAxiomatic grammar, non-constituent coordination and incremental interpretation SGP1987-01-01
Phillip YellandModels of modularity: a study of object-oriented programming am211986-10-01
Juanito CamilleriPriority in process calculi gw1041987-10-01TR-227
Cosmos NicolaouA Distributed Architecture for Multimedia Communication Systems IML1987-01-01TR-220
KwokYam LamA new approach for improving system availability DJW1987-10-01TR-226
Mian WeiA distributed compilation system RMN1983-10-01
Bhaskar R HaritaDynamic bandwidth management IML1986-10-01TR-217
Susan E ThompsonA storage service for structured data jmb251986-10-01
Raphael YahalomManaging the order of transactions in widely-distruted data systems JKMM1986-01-01TR-231
Kamal ChaudharyVLSI Routing pr101987-10-01
Karen L WrenchA distributed and-or parallel Prolog network mr101987-01-01
Michael Luke TunmerCombinator reduction on networks of small processors AN1986-10-01
Gianpaulo TommasiProcedural Methods In Computer Graphics NEW1985-01-01
Richard C HutchingsThe computer comprehension of systematic metaphor KSJ1986-10-01
Li GongCryptographic protocols for distributed systems DJW1987-10-01
Paul CurzonA structured approach to the verification of low level microcode mr101986-10-01TR-215
David A WolframThe clausal theory of types lcp151987-01-01
Victor PoznanskiA Relevance-Based Utterance Processing System KSJ1985-10-01TR-246
Charles W RestivoDeductive synthesis and planning WFC1987-10-01
Stuart Philip HawkinsVideo replay in computer animation NEW1985-10-01TR-207
Jeffery J JoyceMulti-level verification of microproccesor- based MJCG1986-10-01TR-195
Timothy GleesonAspects of abstraction in computing RMN1986-10-01
Derek McAuleyConfiguration and binding in distributed systems IML1985-01-01TR-186
Thomas Frederick MelhamFormalising abstraction mechanisim for hardware ve MJCG1984-10-01TR-201
Guo- Qiang ZhangThe logic of domains gw1041985-01-01TR-185
Stephen James Roger HarrisonRaytracing image synthesis techniques NEW1985-10-01
Roger Stuart CalnanThe integration of Voice within a digital network RMN1984-10-01
Peter NewmanDesign of a multicast fast packet switch RMN1985-01-01TR-165
Richard David WilliamsOrganisation and analysis of spatial data NEW1985-01-01
Michael BurrowsCaching, migration and replication of files in a distributed file system DJW1984-10-01TR-153
Paul KargerImproving security and performance for capability ah121986-01-01TR-149
Piete T M BrooksDistribution of functions in computer networks RMN1980-10-01
Alberto CamilleriExecuting behavioural definitions in higher order MJCG1984-10-01TR-140
Thomas James W ClarkeSupport for heap-based programming AN1984-10-01
Miriam Ellen LeeserReasoning about the function & timing of integrate WFC1984-10-01TR-132
Murray P ShanahanSet-based processing of horn clauses WFC1984-10-01
Andrew Franklin SeaborneFiling in a heterogeneous network jmb251984-10-01TR-169
Carole S KleinExploiting Or-parallelism in Prolog using multiple WFC1986-10-01TR-216
David J GreavesThe design of a metropolitan area backbone ring ah121985-10-01