Computer Laboratory

List of PhD theses

This is a list of all the PhD theses so far recommended by the Computer Science Degree Committee to the Board of Graduate Studies for approval (which can in some cases mean that there are still corrections to be made before final approval). Fully approved Cambridge PhDs are listed in the University Library thesis catalog.

All authors are encouraged to publish their approved thesis as a Computer Laboratory Technical Report. Where available, the table below links to that public tech-report version of the thesis and/or the local PDF version collected by Lise Gough in /usr/groups/studentadmin/PhD_theses. (The latter files are only accessible to members of the Computer Laboratory and may in some cases not yet contain any final corrections required by the examiners.)

Note: If a Computer Laboratory research student's PhD is not listed here, then it might have been dealt with by the Mathematics Degree Committee (this includes any pre-1987 Computer Laboratory PhD) or by the Engineering Degree Committee (this applies to some early ones in the Digital Technology Group).

Data source: The table below is automatically generated from the Research_Students table on the departmental SQL server, maintained by Lise Gough, to whom enquiries about these records should be addressed.

Omar-Salim ChoudaryEfficient multivariate statistical techniques for extracting secrets from electronic devices 2014-10-21
Mark BattyThe C11 and C++11 Concurrency Model 2014-10-21
Henrik LiengSurface modelling for 2D imagery 2014-10-21
Charalampos RotsosScalable Software Defined Networking 2014-10-21
Chloe BrownA role of space in social groups: Analysis and technological applications 2014-10-21
Janina VoigtAliasing contracts: a unifying approach to object-oriented alias protection 2014-10-21
Steffen LoeschProgram equivalence in function metaprogramming via nominal Scott domains 2014-10-21
Steven HerbertWireless communications in vehicles 2014-10-21
Nik SultanaHigher-order proof translation 2014-07-01
Jonathan WoodruffCHERI: A RISC capability machine for practical memory safety 2014-05-06TR-858
Agata Brajdic2014-07-01
Syed Ali Mustafa ZaidiAccelerating Control-Flow Intensive Code in Spatial Hardware 2014-07-01
Christopher Smowton2014-07-01
Matej UrbasMechanising heterogeneous reasoning in theorem provers 2014-07-01local PDF
Thomas LippincottUnsupervised approaches to syntactic verb frame acquisition for biomedicine 2014-03-11local PDF
Ching-Yun ChangTransformations for linguistic steganography 2013-03-12
Jukka Lehtosalo2014-01-21
Matko Botincan2014-01-21local PDF
Awais Athar2014-01-21TR-856
Tadas Baltrusaitis2014-01-21local PDF
Steven Smith2014-01-21
Anastasios NoulasHuman urban mobility in location-based social networks: Analysis, models and applications 2013-10-22
James Gregory Jardine2013-12-03TR-848, local PDF
Jisun AnMulti-faceted analysis of news sharing in social networking sites 2013-10-22
Wei Ming KhooDecompilation as search 2013-10-22TR-844
Daniel BatesExploiting tightly-coupled cores 2013-12-03TR-846, local PDF
Nicholas PilkingtonHyperparameter optimisation for multiple kernels 2013-12-03
Narseo Vallina-RodriguezThe hidden costs of mobile applications: A cross-layer analysis of energy and spectrum waste of mobile applications 2013-10-22
Ian DaviesWorkload measurement in command and control 2013-07-02
Milos PuzovicHardware/software interface dynamic multicore scheduling 2013-07-02local PDF
Dominic OrchardProgramming contextual computations 2013-07-02TR-854
Helen YannakoudakisAutomated assessment of English-learner writing 2013-05-07TR-842
Marek ReiMinimally supervised dependency-based methods for natural language processing 2013-05-07TR-840
John WickersonConcurrent verification for sequential programs 2013-05-07TR-834
Maximilian BolingbrokeSupercompilation for call-by-need languages 2013-03-12TR-835, local PDF
Kiran RachuriSmartphones based Social Sensing: Adaptive Sampling, Sensing and Computation Offloading 2013-03-12
Paul James FoxMassively parallel neural computation 2013-01-22TR-830, local PDF
Leo WhiteExtending old languages for the new architectures 2013-03-12
Christopher Thompson-WalshSemantics and extension of a biological modelling language 2013-01-22
Soren PreibuschPrivacy choices online: preferences, incentives and enforcement 2013-01-22local PDF
Colin KellyAutomatic extraction of property norm-like data from large text corpora 2013-01-22TR-839
Benjamin RobertsLanguage semantics for secure information flow analysis 2013-01-22
Wei ChenCompressive sensing for wireless sensor networks 2012-12-04local PDF
Gregory ChadwickCommunication centric, multi-core, fine-grained processor architecture 2013-01-22TR-832
Lin SunAutomatic induction of verb classes using clustering 2012-12-04local PDF
Jonathan AndersonPrivacy engineering for social networks. 2012-10-16TR-825, local PDF
Aisha Elsafty2013-03-12local PDF
Salvatore ScellatoSpatial properties of online social services: measurement, analysis and applications 2012-10-16local PDF
Charles ReamsModelling energy efficiency for computation 2012-07-03TR-821
Joseph BonneauSecurity and privacy in the social web 2012-05-08TR-819
Meredydd LuffCommunication for programmability and performance on multi-core processors 2012-10-16TR-831, local PDF
Christopher NashSupporting virtuosity and flow in computer music 2012-07-03
Robin MessageProgramming for humans- a new paradigm for domain-specific languages 2012-05-08TR-843
Syed HaiderComputational systems biology-based feature selection for cancer prognosis 2012-03-13
Eric KoskinenTemporal verification of programs 2012-05-08
John TangTemporal network metrics and their application to real world networks 2012-03-13
Shailendra FuloriaRobust security for the electricity network 2012-01-24
Hyoungshick KimComplex network analysis for secure and robust communications 2012-01-24
Stephan KitchovitchComputational modelling and analysis of seasonal influenza transmission and evolution 2012-03-13
Christian RichardtColour videos with depth acquisition, processing and evaluation 2012-01-24TR-815
Simon FothergillAutomatic assessment of kinaesthetic performance applied to rowing 2013-10-22
Richard RussellPlanning with preferences using maximum satisfiability 2012-03-13TR-822
Sherif AkoushExploiting surplus renewable energy in datacentre computing 2012-01-24local PDF
Philip TaylorSpecification of policy languages for network routing protocols in the Bellman-Ford family 2012-01-24
Vilius NaudziunasDesign and implementation of a language for path algebras 2011-12-06
Ruoshui LiuPlanning and deployment of wireless sensor networks 2011-12-06
Arno PaulyComputable metamathematics and its applications to game theory 2012-01-24local PDF
Viet Anh NguyenBayesian approaches to biological network predictions 2011-10-11
Pedro BrandaoAbstracting information on body area networks 2011-10-11TR-812
Derek MurrayA distributed execution engine supporting data-dependent control flow 2011-12-06local PDF
Andrew LewisReconstructing compressed photo and video data 2011-10-11TR-813
Anilkumar SorathiyaComputational modelling approaches to HIV-1 dynamics 2011-10-11
Ian LeungFast network analysis and applications in real-world networks 2011-10-11local PDF
Md Abdul AlimOn the Interaction of Internet Routing Protocols 2011-10-11
Silvia BreuMining and tracking in evolving software 2011-12-06TR-838, local PDF
Nishanth SastrySocial network support for data delivery infrastructures 2011-07-04
Amitabha RoySoftware lock elision for x86 machine code 2011-07-04TR-801, local PDF
Johanna GeissLatent semantic sentence clustering for multi-document summarization 2011-07-04TR-802, local PDF
Ola MahmoudSecond-order algebraic theories 2011-10-11TR-807, local PDF
Laurel RiekExpression synthesis on robots 2011-07-04local PDF
Ekaterina ShutovaComputational approaches to figurative language 2011-05-10TR-803
Simon HayA model personal energy meter 2011-05-10TR-805, local PDF
Jean MartinaVerification of security protocols based on multicase communication 2011-05-10TR-816
Julien QuintardTowards a worldwide storage infrastructure 2011-07-04
Nick Barrow-WilliamsProximity coherence for chip-multiprocessors 2011-07-04TR-810, local PDF
Thomas TuerkA separation logic framework for HOL 2011-05-10TR-799
John MillerDistributed virtual environment scalability and security 2011-07-04TR-809
Stephen KellBlack-box composition of mismatched software compnents 2011-05-10TR-845, local PDF
Jonathan MakFacilitating program parallelisation - a profiling-based approach 2011-03-15TR-796, local PDF
Weisi GuoPower allocation for wireless collaborative networks 2011-03-15
Robert WatsonNew approaches to operating system security extensibility 2011-01-25TR-818, local PDF
Richard BergmairMonte Carlo Semantics: Robust inference and logical pattern processing based on integrated deep and shallow representations 2011-03-15
Bogdan RomanScalable Cross-Layer Wireless Medium Access Control 2011-01-25
Yuguo HeHierarchies in first-order logic and parameterized complexity 2010-12-07local PDF
Bjarki HolmDescriptive complexity of linear algebra 2011-03-15local PDF
James SrinivasanImproving cache utilisation 2011-01-25TR-800, local PDF
Boris FeiginInterpretational overhead in system software 2011-01-25TR-797
James BridgeMachine learning and automated theorem proving 2010-10-12TR-792, local PDF
Oliver WoodmanPedestrian localisation for indoor environments 2010-10-12local PDF
Shazia AfzalAffect inference in learning environments: a functional view of facial affect analysis using naturalistic data 2010-10-12TR-793, local PDF
Periklis AkritidisPractical memory safety for C 2010-10-12TR-798, local PDF
Aurelie HerbelotUnspecified quantification 2010-10-12TR-795, local PDF
Daniel GreenfieldRentian locality in chip multiprocessors 2010-07-01local PDF
Oeistein AndersenGrammatical error prediction 2010-07-01TR-794, local PDF
Theo MarkettosActive electromagnetic attacks on secure hardware 2010-07-01TR-811, local PDF
Mohan GanesalingamThe Language of Mathematics 2010-07-01local PDF
Thomas CashmanNURBS-compatible subdivision surfaces 2010-03-02TR-773
Richard Van der WathComputational modelling of hematopoietic stem cell division and regulation dynamics 2010-03-02
Daniel O'KeeffeDistributed complex event detection for pervasive computing 2010-03-02TR-783
Pradipta BiswasInclusive user modelling 2010-03-02local PDF
Andreas VlachosSemi-supervised learning for biomedical information extraction 2010-04-20TR-791
Chung Kil HurCategorical equational systems: algebraic models and equational reasoning 2010-03-02local PDF
Sriram SrinivasanKilim: A server framework with lightweight actors, isolation types and Zero-copy messaging 2010-01-19TR-769
John BillingsSpecifying and compiling Internet routing protocols 2010-01-19
Yan WuPropagation modelling for wireless sensor networks deployed to perform civil infrastructure monitoring 2010-01-19
Wei LiToward online behavioural traffic classification 2009-12-01
Jatinder SinghControlling the dissemination and disclosure of healthcare events 2009-12-01TR-770
Olexiy GotsmanLogics and analyses for concurrent heap-manipulating programs 2009-10-06TR-758
Anthony HylickManaging energy consumption of hard disk drives by optimizing system interaction 2010-04-20local PDF
Behzad BastaniOpen evolvable systems design by process-oriented modeling 2009-12-01
Matthew LakinAn executable meta-language for inductive definitions with binders 2009-12-01TR-772
Saar DrimerSecurity for volatile FPGAs 2009-10-06TR-763
Cecily MorrisonBodies-in-Space: investigating technology usage in co-present group interaction 2009-12-01TR-771
Aaron CobleAnonymity, information and machine-assisted proof 2009-12-01TR-785, local PDF
Julian SmithTowards robust inexact geometric computation 2009-12-01TR-766, local PDF
Ranald CloustonEquational logic for names and binders 2009-12-01
Daniel BernhardtEmotion inference from human body motion 2009-10-06TR-787
Alexander GurneyConstruction and verification of routing algebras 2009-12-01local PDF
Rok StrnisaFormalising, improving, and reusing the Java module system 2009-10-06
Min LinChannel modelling for wireless sensor networks 2009-10-06
William CarsonPerformance modelling and design of bit-interleaved coded modulation 2009-05-26
Grzegorz MilosEfficient and effective sharing of memory in virtual machine monitors 2009-10-06
Luis VargasIntegrating databases and Publish/Subscribe 2009-05-26
Mark AdcockImproving cache performance by runtime data movement 2009-05-26TR-757, local PDF
Rosemary FrancisNetworks for Field Programmable Gate Arrays 2009-07-02TR-828
Jonathan HaymanPetri net semantics 2009-07-02TR-782
Philip PaulMicroelectronic Security Measures 2009-07-02TR-829, local PDF
Magnus MyreenFormal verification of machine-code programs 2009-05-26TR-765, local PDF
David TurnerNominal domain theory for concurrency 2009-05-26
Eric HendersonA text representation language for contextual and distributional processing 2009-12-01
Arnab BanerjeeCommunication flows in power-efficient networks-on-chips 2009-03-10TR-786
Timos AntonopoulosExpressive Power of Graph Languages 2009-03-10
Minor GordonSmall-scale, event-based overlays 2009-01-20TR-781, local PDF
Jonathan DaviesProgramming networks of vehicles 2009-01-20TR-761
David CottinghamVehicular wireless communication 2009-01-20TR-741
Atif AlviControlling pervasive domains with ontologies and rules 2008-10-21
Caroline GasperinStatistical anaphora resolution in biomedical texts 2008-12-02TR-764, local PDF
Evangelia KalyvianakiResource provisioning for virtualized server applications 2008-12-02TR-762
Na XuStatic contract checking for Haskell 2008-12-02TR-737
Diarmuid Ó SéaghdhaLearning compound noun semantics 2008-10-21TR-735
Salman TaherianState-based Publish/Subscribe for Sensor Systems 2008-10-21TR-739
Shishir NagarajaRobust covert network topologies 2008-12-02local PDF
Tomasz MacuraAutomating the quantitative analysis of micoscopy images 2009-03-10local PDF
Philip TuddenhamTabletop interfaces for remote collaboration 2008-10-21TR-734
Anna RitchieCitation context analysis for information retrieval 2008-10-21TR-744
James ReynoldsAn automatic proof-generating translation from high-order to first-order logic (with applications to linking HOL4 and ACL2) 2008-10-21local PDF
Matthew JohnsonA new approach to Internet banking 2008-06-10TR-731, local PDF
Alban RrustemiComputing surfaces - a platform for scalable interactive displays 2008-06-10TR-732, local PDF
Tyler MooreCooperative attack and defense in distributed networks 2008-06-10TR-718
Gerhard HanckeSecurity of proximity identification systems 2008-10-21TR-752, local PDF
Euan HarrisRate limiting in an event-driven BGP speaker 2009-05-26local PDF
Sofiane NaciControlling prevasive domains with ontologies and rules 2008-06-10local PDF
Yu-En LuDistributed proximity query processing 2008-04-22
Anton LokhmotovProgramming and compiling for embedded SIMD architectures 2008-04-22
Mbou Eyole-MononoEnergy-efficient sentient computing 2008-04-22TR-722
Darren EdgeTangible user interfaces for peripheral interaction: episodic engagement with objects of physical, digital and social significance 2008-04-22TR-733
Andrew Naish-GuzmanSparse and robust kernal methods 2008-04-22
Lauri PesonenA capability-based access control architecture for multi-domain publish/subscribe systems 2008-03-11TR-720
Gregory HughesLecture Adaptation for students with disabilities 2008-06-10
Wenjun HuA tale of two prototypes: Practical network coding for wireless mesh networks 2008-01-22
William HollingsworthUsing lexical chains to characterise scientific text 2008-03-11
Shahzad KhanNegation and antonymy in sentiment classification 2008-01-22
Benjamin MedlockInvestigating classification for natural language processing tasks 2008-01-22TR-721
Rebecca WatsonOptimising the speed and accuracy of a Statistical GLR Parser 2007-11-27TR-743
Michael ComptonFormal verification of process algebra systems 2008-03-11local PDF
Steven MurdochCovert channel vulnerabilities in anonymity systems 2007-11-27TR-706, local PDF
Paul HunterComplexity and infinite games on finite graphs 2007-11-27TR-704
Pan HuiPeople are the network: Experimental design and evaluation of social based forwarding algorithms 2007-11-27TR-713
Viktor VafeiadisModular fine-grained concurrency verification 2007-11-27TR-726, local PDF
Andy OzmentVulnerability discovery & software security 2007-10-09
Simon HollisPulse-based, on-chip interconnect 2007-10-09TR-698
Ian CaulfieldComplexity-effective superscalar embedded processors using instruction-level distributed processing 2007-10-09TR-707
Alan LawrenceOptimizing compilation with the value state dependence graph 2007-11-27TR-705
Feng HaoOn using fuzzy data in security machanisms 2007-10-09TR-715
Doug SantryA cluster storage system for modern virtual machines 2007-10-09
Richard SouthernAnimation manifolds for representing topological alteration 2008-06-10TR-723
Jacques FournierVector microprocessors for cryptography 2007-10-09TR-701
Lucy Brace-EvansEvent structures with persistence 2007-10-09TR-710
William BillingsleyThe Intelligent Book: technologies for intelligent and adaptive textbooks focussing on Discrete Mathematics 2007-07-10TR-719
Martin VechevDerivation and evaluation of concurrent collectors 2007-10-09
Alisdair Stuart WrenRelationships for object-oriented programming languages 2007-10-09TR-702
Tal Sobol-ShiklerLe ton fait la musique: analysis of expressions in speech 2007-07-10TR-740
Ulrich PaquetBayesian inference for latent variable models 2007-06-12TR-724
Timothy MoretonA wide-area file system for migrating virtual machines 2007-04-17TR-714
Jolyon ClulowOn the security of real-world devices 2007-07-10
Mark GrundlandColor, style and composition in image processing 2007-07-10local PDF
Chi-kin ChauNetworks and disputes 2007-05-27
Manuel CostaEnd-to-end containment of Internet worm epidemics 2007-04-17
Russ RossCluster storage for commodity computation 2007-04-17TR-690, local PDF
Christopher PurcellScaling mount concurrency: scalability and progress in concurrent algorithms 2007-02-27TR-697
Samuel StatonName-passing process calculi: operational models and structural operational semantics 2007-06-12TR-688
Alexander HoUnderstanding systems with virtual machines 2007-04-17local PDF
Juliano IyodaTranslating HOL functions to hardware 2007-01-09TR-682
Eiko YonekiECCO: data centric asynchronous communication 2006-11-14TR-677
Eng Keong LuaThe structure of Internet latency 2006-11-14
Christian KreibichStructural traffic analysis for network security monitoring 2007-05-24
Andrew TwiggCompact forbidden-set routing 2006-10-10TR-678, local PDF
Ole H JensenMobile Processes in Bigraphs 2007-01-09
Boris DragovicCASPEr: containment-aware security for pervasive computing environments 2006-07-04
Anil MadhavapeddyCreating high-performance statically type-safe network applications 2006-10-10TR-775
Sarah ThompsonOn the application of program analysis and transformation to high reliability electronics 2006-07-01TR-670
Gareth StoyleA theory of dynamic software updates 2006-11-21local PDF
Timothy DeeganThe main name system 2006-07-04
Maja VukovicContext aware service composition 2006-10-10TR-700
Stephen RymillPsychologically-based simulation of human behaviour 2006-10-11TR-717, local PDF
Paula ButteryComputational models for first language acquisition 2006-04-21TR-675
Tolga UzunerEffective network complexity 2006-07-01
Eben UptonCompiling with data dependence graphs 2006-07-18local PDF
Hui-Yun LiSecurity evaluation at design time for cryptographic hardware 2006-04-21TR-665
Andrew WarfieldVirtual devices for virtual machines 2006-06-09local PDF
Calicrates Policroniades-BorrazDecomposing file data into discernible items 2006-05-31TR-672
Meng How LimLandmark guided forwarding 2006-02-09TR-674
Julian ChesterfieldJoint source-channel UEP coding for multimedia streaming in the wireless wide area network environment 2006-02-09
Piotr ZielinskiMinimizing latency of agreement protocols 2006-04-27TR-667
Karl JeacleTCP-XM 2006-02-09
Richard ClaytonAnonymity and traceability in cyberspace 2005-11-17TR-653, local PDF
David SpenceLocation based code placement in distributed systems 2006-03-01local PDF
Matthew ParkinsonLocal reasoning for Java 2005-11-17TR-654
Moritz BeckerCASSANDRA: flexible trust management and its application to electronic health records 2005-09-22TR-648
Judita PreissProbabilistic word sense disambiguation 2006-03-17TR-673
Marco Palomino-ZunigaDistributed creation and maintenance of web content indices 2005-10-15
Jia MengThe integration of higher order interactive proof with first order automatic theorem proving 2005-09-22
Mohamed HassanMultiresolution in geometric modelling: subdivision mark points and ternary subdivison 2005-10-04local PDF
Alberto FernandesSpectrum management for revenue maximisation in DSL 2005-09-22
Nathan DimmockUsing trust and risk for access control in global computing 2005-06-16TR-643
Rana El-KalioubyMind-reading machines: automated inference of complex mental states 2005-06-16TR-636
Jeremy SingerStatic program analysis based on virtual register renaming 2005-09-22TR-660
Carsten MoenningIntrinsic point-based surface processing 2005-05-24TR-658
Hyun Jin ChoiSecurity protocol design by composition 2006-01-12TR-657
Christopher TownOntology based visual information processing 2005-03-01local PDF
Joerg LeplerCooperation and deviation in market-based resource allocation 2005-01-05TR-622
Mark ShinwellThe fresh approach: functional programming with names and binders 2005-03-03TR-618, local PDF
Evangelos KotsovinosGlobal public computing 2005-02-26TR-615
David EyersActive privilege management for distributed access control systems 2005-06-16TR-669
James Roy BulpinOperating system support for simultaneous multithreaded processors 2005-02-26TR-619
Scott FairbanksHigh precision timing using self-timed circuits 2005-02-26TR-738
Sergei SkorobogatovSemi-invasive attacks - a new approach to hardware security analysis 2005-02-26TR-630
Arasnath KimisGeneric event services middleware 2004-11-11
Nicholas NethercoteDynamic binary analysis and instrumentation or building tools is easy 2004-11-11TR-606
Roongroj NopsuwanchaiDiscriminative training methods and their applications to handwriting recognition 2004-10-27TR-652
Prem FernandoAutomatic recognition of ancient Syriac handwriting 2004-11-11
Robert Gordon HagueEnd-user programming in multiple languages 2004-11-11TR-651
Steven McKellarAn extension to the OSI model of network management for large-scale collaborative performance measurement 2004-10-14
Simon FrankauHardware synthesis from stream-processing functional language 2004-11-11TR-824, local PDF
Neil E JohnsonCode size optimization for embedded processors 2004-10-14TR-607
Marc Peter CardleAutomated editing of sound and motion 2004-10-14
Hasan AmjadCombining model checking and theorem proving 2004-09-07TR-601
Andrei SerjantovOn the anonymity of anonymity systems 2004-07-13TR-604
Brian ShandTrust for resource control: self-enforcing automatic rational contracts between computers 2004-04-27TR-600
Peter PietzuchHermes: a scalable event-based middleware 2004-04-27TR-590, local PDF
Michael BondzaidiUnderstanding security APIs 2004-06-15local PDF
George DanezisBetter anonymous communications 2004-03-01TR-594
Andras BelokosztolszkiRole-based access control policy administration 2004-04-05TR-586
Silas BrownConversion of notations 2004-06-15TR-591
Robert EnnalsAdaptive evaluation of non-strict programs 2004-07-13TR-730
Panit WatcharawitchMulTEP: a multi-threaded embedded processor 2004-04-20TR-588
Steven BrooksConcise texture editing 2004-02-10TR-584
Mark AshdownPersonal projected displays 2004-03-09TR-585
Pablo ArrighiRepresentations of quantum operations with applications to quantum cryptography 2004-02-10TR-595
Keir Anthony FraserPractical lock-freedom 2004-02-10TR-579
Advaith SiddharthanSyntactic simplification and text cohesion 2004-01-06TR-597
Timothy GrangerReconfigurable wavelengh-switched optical networks for the internet core 2004-02-10TR-575
David RicherbyFixed-point logics with choice 2003-12-05
Sang-Bum SuhAn effective multiple access policy for the home telephone wiring in a home LAN 2006-07-11
Jianxin YanSecurity for online games 2003-08-21
James HallMulti-layer network monitoring and analysis 2003-07-07TR-571
Richard SharpHigher-level hardware synthesis 2003-03-14
Donnla B Nic GearailtDictionary characteristics in cross-language information retrieval 2003-07-15TR-616
Walt YaoTrust management for widely distributed systems 2003-03-11TR-608
Alan AbrahamsDeveloping and executing electronic commerce applications with occurrences 2002-11-26
Michael J BlainAnimating Liquids 2003-02-11
Markus G KuhnCompromising emanations: eavesdropping risks of computer displays 2002-10-29TR-577, local PDF
Alexis HombrecherReconciling event taxonomies across administrative domains 2002-10-29
Ulrich LangAccess policies for middleware 2003-05-27TR-564
Keith WansbroughSimple polymorphic usage analysis 2002-12-17TR-623
Charalampos ManifavasMicropayment transaction costs 2002-10-29
Jana SukkariehNatural language for knowledge representation 2002-05-28
Austin N DonnellyResource control in network elements 2002-04-25TR-534
Susan PanchoContributions of formal security proofs 2003-11-14
Paul CunninghamVerification of asynchronous circuits 2002-05-28TR-587
Joseph Ell HurdFormal verification of probabilistic alogorithms 2002-05-30TR-566
David B StewartQuality of service for storage systems 2003-07-15
Umar SaifArchitectures for ubiquitous systems 2002-01-15TR-527
Lucian J WischikExplicit fusions: theory and implementation 2002-06-18
Richard M MortierInternet traffic engineering 2002-04-24TR-532
Agathoniki TrigoniSemantic optimization of OQL queries 2002-01-15TR-547
Kerry RoddenEvaluating similarity-based visualisations as interfaces for image browsing 2002-01-15TR-543
Richard R WattsThe development of an uncertain reasoning system 2002-04-30
Aline VillavicencioThe acquisition of a unification-based generalised categorial grammar 2002-03-12TR-533
Anna-Leena KorhonenSubcategorization acquisition 2002-02-06TR-530
Daryl J StewartA uniform sematics for Verilog and VHDL suitable for both simulation and verification 2002-05-20
David C AbensourFinite state and statistical methods for natural language processing 2002-01-15
Mantsika MatooaneParallel systems in symbolic and algebraic computation 2001-11-27TR-537
Timothy M EdmondsAdaptation for mobile systems 2001-10-30
Mark F P GilliesPractical behavioural animation based on vision and attention 2001-10-30
Martin ChoquetteLocal evidence in document retrieval 2002-01-11TR-519
Andrew W MooreMeasurement-based management of network resources 2002-02-12TR-528
Timothy L HarrisExtensible virtual machines 2001-01-15TR-525
Asis UnyapothNomadic pi-calculi: expressing and verifying communication infrastructure for mobile computation 2001-05-29TR-514
James J LeiferOperational congruences for reactive systems 2001-07-11TR-521
Stephen O ChildsDisk quality of service in a general purpose operating system 2001-10-30
Dickon ReedThe effects of code layout on performance 2001-07-11
Ioannis PapaefstathiouIncreasing packet network bandwidth through low level compression 2001-05-29
Sylvia F KnightNatural language processing for Aerospace documentation 2001-11-27
Jonathan D PfautzDepth perception in computer graphics 2001-02-13TR-546
Paul D HankinA study of objects 2001-05-08
Francesco StajanoSecurity for ubiquitous computing 2001-02-13
Rebecca IsaacsDynamic provisioning of resource-assured and programmable virtual private networks 2001-05-29TR-516
Paul B MenageResource control of untrusted code in an open programmable network 2000-10-24TR-561
Reuben R ThomasMite: a basis for ubiquitous virtual machines 2001-02-13
Tony PolichroniadisHigh level control of vitual actors 2001-05-08
Sheng F LiStateless client computing 2000-10-24
Wojciech BasalajProximity visualisation of abstract data 2001-01-23TR-509
Zhixue WuA New Approach To Implementing Atomic Data Types 1994-05-01TR-338
Neil LawrenceVariational inference in probabilistic models 2001-05-08
Andrew J PenroseExtending lossless image compression 2001-01-23TR-526
Radina StefanovaPower in radio networks 2002-08-16
Christian UrbanClassical logic and computation 2000-11-14
David M LeaskLow power radio networking 2000-10-24
James E GainEnhancing spatial deformation for virtual sculpting 2000-10-24TR-499
Breton M SaundersFast animation dynamics 2000-10-24
Yolanta BeresnevichieneA role and context based security model 2000-10-24TR-558
Giampaola BellaThe inductive verification of cryptographic protocols 2000-07-18TR-493
Kan ZhangOn Secure Information Flow in Computer Systems 2000-07-18
Pavel T WojciechowskiNomadic pict: language and infrastructure design for mobile computation 2000-07-18TR-492
Mark D SpiteriAn architecture for the notification, storage and retrieval of events 2000-06-20TR-494
Donald O OparahAdaptive resource management in a multimedia operating system 2000-05-01
David M IngramIntegrated Quality of Service management 2000-06-20TR-501
Mohammad KhorsheedAutomatic recognition of words in Arabic manuscripts 2000-10-24TR-495
Oi Yee (Olivia) KwongWord sense selection in texts: an integrated model 2000-10-24TR-504
Shaw ChuangSecurity management in ATM networks 2000-10-24
Jong-Hyeon LeeDesigning a reliable publishing framework 2000-05-01TR-489
Calum A M GrantSoftware visualization in Prolog 2000-05-01TR-511
Oliver SeidelMetadata support for connecting application components asynchronously 2000-01-01
Che-Hao (Albert) ChangReasoning about security protocols 2000-01-01
Hendrik J BosElastic network control 1999-10-01TR-483
Geraint PriceThe interaction between fault tolerance and security 1999-10-01TR-479
Fabien A P PetitcolasInformation hiding and its application to copyright protection 1999-10-01
Clemens M BallarinComputer algebra and theorem proving 1999-10-01TR-473
Richard I TuckerAutomatic summarising and the CLASP system 1999-11-01TR-484
James R ThomasStretching a point: aspect and temporal discourse 1999-10-01TR-486
Ben Y ReisSimulating music learning with autonomous listening agents: entropy, ambiguity and context 1999-10-01TR-472
Bruno CrispoDelegation of responsibility 1999-10-01
Jacques D FleuriotA combination of geometry theorem proving and nonstandard analysis, with application to Newton's Principia 1999-06-01TR-469
Mark StaplesA mechanised theory of refinement 1999-05-01
Florian KammuellerModular reasoning in Isabelle 1999-10-01TR-470
Duncan P GrisbyA distributed adaptive window system 1999-10-01
Steven P WilcoxSynthesis of asynchronous circuits 1999-03-01TR-468
Richard J BradburyArchitectures for the control of home area networks 1999-02-01
Steven M HandProviding quality of service in memory management 1999-05-01
Jacobus E Van Der MerweOpen service support for ATM 1999-05-01TR-450
Donald R SymeDeclarative theorem proving for operational semantics 1999-03-01
Mohamed AfsharAn open parallel architecture for data-intensive applications 1999-03-01TR-459
Ralph BecketEfficient knowledge and action planning in first order logic 1999-01-01
Michael NorrishC formalised in HOL 1999-01-01TR-453
Andrew M R WardSensor-driven computing 1999-02-01
John B P NaylonA wireless ATM local area network 1999-01-01
Panayis Fourniotis PavlatosCompiler optimisation of typeless languages 1998-10-01
Malgorzata E StysA processing model of information structure in machine translation 1998-10-01
Giles J NelsonContext-aware and location systems 1998-06-01
John RooneyThe structure of open ATM control architectures 1998-06-01TR-451
Peter J C BrownSelective mesh refinement for rendering 1998-05-01TR-490
M Jennifer Li Kam WaA measurement-based approach to flow control in ATM networks 1998-07-01
Ian J LewisPrologPF: parallel logic and functions on the Delphi Machine 1998-06-01
Ian PrattThe user-safe device I/O architecture 1999-02-01
Hyun S ParkThe Korean Core Language Engine 1998-05-01
Stefan G HildManaging mobile connections 1998-02-01
Christopher T FaigleDMS-Splines and radiosity 1998-02-01
Feng ShiAn architecture for scalable and deterministic video servers 1997-11-01TR-438
Stanley J MroseMultiresolution curve and surface design: theory and application of spline wavelets 1998-01-01
Daniel L GordonScheduling in optically based ATM switching fabrics 1998-01-01
Xiaobao ChenAn end-to-end communication support architecture for multi-service applications 1997-12-01
Timothy J MillsContent modelling in multimedia information retrieval systems: the Cobra retrieval system 1998-02-01
Joshua X RossAn evaluation based approach to process calculi 1998-12-01TR-456
Ian JacksonWho goes here? Confidentiality of location through anonymity 1998-06-01
David A HallsApplying mobile code to distributed systems 1997-11-01TR-439
Michael RoeCryptography and evidence 1997-06-01TR-780
Eirik HektoenStatistical parse selection using semantic cooccurrences 1997-06-17
Karl MacDormanSymbol grounding: learning categorical and sensorimotor predictions for coordination in autonomous robots 1997-06-01TR-423
Tanya BowdenNatural language techniques for error correction 1997-07-11
Victor CarrenoTransition assertions: a higher-order logic based method for the specification and verification of real-time systems 1997-05-01
Gavin John StarkStream handling in multimedia communication systems 1997-01-01
Steven L PopeApplication support for mobile computing 1997-01-01TR-415
Kam Hong ShumAdaptive parallelism for computing on heterogeneous clusters 1996-11-01TR-404
Mark HumphrysAction selection methods using reinforcement learn 1997-01-01TR-426
George KirazComputational approach to non-linear morphology 1996-11-01
Paul BarhamDevices in a multi-service operating system 1996-10-01TR-403
Chai-keong TohProtocol aspects of mobile radio networks 1996-11-01
John HarrisonTheorem proving with the real numbers 1996-11-01TR-408
Monica Nesi TheryFormalising process calculi in higher order logic 1996-10-01TR-411
Scarlet SchwiderskiMonitoring the behaviour of distributed systems 1996-06-01TR-400
Richard JB HaytonAn open architecture for secure interworking services 1996-06-01TR-399
Jonathan SewellManaging complex models for computer graphics 1996-07-01TR-420
Quentin Stafford-FraserVideo-augmented environments 1996-05-01TR-419
Michael HincheyStructural design and formal methods 1999-06-01
William S HarbisonTrusting in computer systems 1997-07-01TR-437
Andrew J KennedyProgramming languages and dimensions 1996-03-01TR-391
Sanjay SaraswatPerformance analysis of Delphi machine 1996-01-01TR-385
Noha AdlyManagement of replicated data in large scale systems 1995-11-01TR-383
Uwe NimscheckRendering for free form deformations 1995-10-01TR-381
Simon Andr CrosbyPerformance management in ATM networks 1995-10-01TR-393
Oliver Michael CastleSynthetic image generation for a multiple-view autostereo display 1995-10-01TR-382
Arturo TrujilloLexicalist machine translation of spatial prepositions 1995-11-01
Timothy RoscoeThe structure of a multi-service operating system 1995-07-01TR-376
Richard J BlackExplicit network scheduling 1995-03-01TR-361
Ian D B StarkNames and higher-order functions 1995-05-01TR-363
Ross J AndersonRobust computer security 1995-05-01
Simon W MooreMultithreaded processor design 1995-01-01TR-358
Feng HuangRestructuring virtual memory to support distributed computing environments 1995-07-01TR-375
Nicholas Benedict Van SomerenHigh Quality De-Interlacing Of Television Images 1995-01-01
Subir Kumar BiswasHandling Realtime Traffic In Mobile Networks 1994-10-01TR-351
Jane Louis HunterIntegrated sound synchronisation for computer animation 1994-10-01TR-348
Michael John TurnerThe Contour Tree Image encoding technique and file format 1994-05-01TR-344
Narm Hee LeeRouting in high speed integrated services networks 1995-10-01
Akira NakamuraAn investigation of real-time synchronisation 1994-05-01
Eoin Andrew HydenOperating System Support For Quality Of Service 1994-05-01TR-340
Simon R KelleyCongestion control for unreserved traffic in ATM networks 1994-06-01
Richard BoultonEfficiency In A Fully-Expansive Theorem Prover 1994-05-01TR-337
Gavin M BiermanOn intuitionistic linear logic 1994-05-01TR-346
Sai Lai LoA modular and extensible network storage architecture 1994-02-01TR-326
Pierre David WellnerInteracting with paper on the Digitaldesk 1994-01-01TR-330
Mark David HayterA workstation architecture to support multimedia 1994-12-01TR-319
Steven M G FreemanAn architecture for distributed user interfaces 1994-05-01TR-342
Adrian M T WrigleyReal-time ray tracing on a novel HDTV framestore 1994-01-01
David M EversDistributed Computing With Objects 1994-01-01TR-332
James Doug GrundyA method of program refinement 1993-12-01TR-318
Barney D PellStrategy generation and evaluation for meta-game playing 1993-10-01TR-315
Guanxing LiSupporting distributed realtime computing 1993-11-01TR-322
John Peter Van TasselFemto-Vhdl: The Semantics Of A Subset Of Vhdl And Its Embedding In The Hol Proof Assistant 1993-10-01TR-317
Michael R WarnerCharging and resource control for open dist systems 1993-07-01
Richard S CrouchThe Temporal Properties Of English Conditionals And Modals 1993-07-01TR-325
John CarrollPractical Unification-Based Parsing Of Natural Language 1993-10-01TR-314
J Matthew S DoarMulticast In The Asynchronous Transfer Mode Environment 1993-05-01TR-298
Kish ShenStudies of and/or parallelism in Prolog 1993-01-26
P Nicholas BentonStrictness Analysis Of Lazy Functional Programs 1993-05-01TR-309
Cormac John SreenanSynchronisation services for digital continuous media 1993-02-01TR-292
Andrew D GordonFunctional programming and Input/Output 1992-11-10TR-285
Eike RitterCategorical Abstract Machines For Higher-Order Typed Lambda Calculi 1993-03-01TR-297
David ElworthyThe semantics of noun phrase anaphora 1993-03-01TR-289
Innes FergusonTouring machines: an architecture for dynamic, rational, mobile agents 1993-01-01TR-273
Lee FedderGenerating natural language text from the output of an application program 1993-01-01
Kamiar SehatEvaluation of caches and cache coherency 1992-10-01
Paul W JardetzkyNetwork file server design for continuous media 1992-10-01TR-268
John Michael LevineA flexible bidirectional dialogue system 1993-01-01
T Mark A LomasAspects of Computer Network Security 1992-10-01
Neil A DodgsonImage resampling 1992-07-01TR-261
Ian BensonReasoning About Contingent Events In Distributed Systems 1992-04-01
Martin D CoenInteractive program derivation 1992-10-01TR-272
Xiao quian ChenCongestion control and routing in integrated broadband networks 1992-07-01
Rajeev GoréCut-Free Sequent And Tableau Systems For Propositional Normal Modal Logics 1992-04-01
Chu Suan AngContinuous media in fast networks 1992-05-01
Rachel Cardell-OliverThe formal verification of hard real-time systems 1992-04-01TR-255
Xiaofeng JiangMultipoint digital video communications 1992-03-01TR-251
Siu Chi HsuComputer support for large character set languages 1992-05-01
Mads RosendahlAbstract interpretation and attribute grammars 1992-04-01
Chaoying MaDesigning a universal name service 1992-11-01TR-270
Thomas U VogelLearning In Large State Spaces With An Application To Biped Robot Walking 1992-04-01TR-241
Wing Hung LauRealistic 3D image composition 1992-01-01
Glenford E MappAn object-oriented approach to virtual memory management 1991-12-01TR-242
Stephen M V HailesThe Design And Implementation Of Troy, A Distributed Object-Based Language 1992-02-01
Olivia R NagioffAlgorithms for Image Encoding 1991-02-01
Peter W DickmanDistributed Object Management In A Non-Small Graph Of Autonomous Networks With Few Failures 1992-02-01
Michael Joseph DixonSystem support for multi-service traffic 1992-01-01TR-245
Jeremy BallSEMORICA: a system examining motion and object representation issues in computer animation 1992-01-01
Roy CroleProgramming metalogics with a fixpoint type 1991-12-01TR-247
Heng WangModelling and image generation 1991-10-01TR-235
Benjamin MaciasAn incremental parser for govenment-binding theory 1991-10-01
John BradshawUsing Knowledge Of Purpose And Knowledge Of Structure As A Basis For Evaluating The Behaviour Of Mechanical Systems 1991-10-01TR-236
David R MilwardAxiomatic grammar, non-constituent coordination and incremental interpretation 1991-10-22
Phillip YellandModels of modularity: a study of object-oriented programming 1991-07-01
Juanito CamilleriPriority in process calculi 1991-05-01TR-227
Cosmos NicolaouA Distributed Architecture for Multimedia Communication Systems 1991-05-01TR-220
KwokYam LamA new approach for improving system availability 1991-03-01TR-226
Mian WeiA distributed compilation system 1991-03-01
Bhaskar R HaritaDynamic bandwidth management 1991-03-01TR-217
Susan E ThompsonA storage service for structured data 1991-02-01
Raphael YahalomManaging the order of transactions in widely-distruted data systems 1991-01-01TR-231
Kamal ChaudharyVLSI Routing 1991-01-01
Karen L WrenchA distributed and-or parallel Prolog network 1990-12-01
Michael Luke TunmerCombinator reduction on networks of small processors 1990-11-01
Gianpaulo TommasiProcedural Methods In Computer Graphics 1990-11-01
Richard C HutchingsThe computer comprehension of systematic metaphor 1990-11-01
Li GongCryptographic protocols for distributed systems 1990-11-01
Paul CurzonA structured approach to the verification of low level microcode 1990-10-01TR-215
David A WolframThe clausal theory of types 1990-11-01
Victor PoznanskiA Relevance-Based Utterance Processing System 1991-06-01TR-246
Charles W RestivoDeductive synthesis and planning 1990-07-01
Stuart Philip HawkinsVideo replay in computer animation 1990-07-01TR-207
Jeffery J JoyceMulti-level verification of microproccesor- based 1990-05-01TR-195
Timothy GleesonAspects of abstraction in computing 1990-05-01
Derek McAuleyConfiguration and binding in distributed systems 1990-01-01TR-186
Thomas Frederick MelhamFormalising abstraction mechanisim for hardware ve 1990-05-01TR-201
Guo- Qiang ZhangThe logic of domains 1990-01-01TR-185
Stephen James Roger HarrisonRaytracing image synthesis techniques 1989-11-01
Roger Stuart CalnanThe integration of Voice within a digital network 1989-05-01
Peter NewmanDesign of a multicast fast packet switch 1989-05-01TR-165
Richard David WilliamsOrganisation and analysis of spatial data 1989-03-01
Michael BurrowsCaching, migration and replication of files in a distributed file system 1989-02-01TR-153
Paul KargerImproving security and performance for capability 1988-11-01TR-149
Piete T M BrooksDistribution of functions in computer networks 1988-07-01
Alberto CamilleriExecuting behavioural definitions in higher order 1988-06-01TR-140
Thomas James W ClarkeSupport for heap-based programming 1989-05-01
Miriam Ellen LeeserReasoning about the function & timing of integrate 1988-05-01TR-132
Murray P ShanahanSet-based processing of horn clauses 1988-02-01
Andrew Franklin SeaborneFiling in a heterogeneous network 1988-05-01TR-169
Carole S KleinExploiting Or-parallelism in Prolog using multiple 1990-05-08TR-216
David J GreavesThe design of a metropolitan area backbone ring 1990-05-08