No |
Title | Authors | Date | Notes | Download |
995 |
Fragment-template power-analysis attacks against microcontroller implementations of the 32-bit stream cipher ChaCha |
Henry Batchelor |
2024-07 |
MEng 59 p |
PDF (4.9 MB) |
994 |
Deception and defense from machine learning to supply chains |
Nicholas Boucher |
2024-05 |
PhD 161 p |
PDF (9.1 MB) |
993 |
Distributional and relational inductive biases for graph representation learning in biomedicine |
Paul M. Scherer |
2024-04 |
PhD 164 p |
PDF (13.0 MB) |
992 |
Transient execution vulnerabilities in the security context of server hardware |
Allison Randal |
2023-12 |
PhD 145 p |
PDF (1.5 MB) |
991 |
Porting a mix network client to mobile |
Jacky W. E. Kung |
2023-12 |
BA 57 p |
PDF (5.0 MB) |
990 |
Probing the foundations of neural algorithmic reasoning |
Euan Ong |
2023-12 |
BA 75 p |
PDF (5.0 MB) |
989 |
Balanced allocations under incomplete information: New settings and techniques |
Dimitrios Los |
2023-11 |
PhD 230 p |
PDF (3.4 MB) |
988 |
CHERI C semantics as an extension of the ISO C17 standard |
Vadim Zaliva, Kayvan Memarian, et al. |
2023-10 |
11 p |
PDF (0.3 MB) |
987 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 9) |
Robert N. M. Watson, Peter G. Neumann, et al. |
2023-09 |
523 p |
PDF (2.8 MB) |
986 |
Early performance results from the prototype Morello microarchitecture |
Robert N. M. Watson, Jessica Clarke, et al. |
2023-09 |
19 p |
PDF (0.9 MB) |
985 |
Scalable agent-based models for optimized policy design: applications to the economics of biodiversity and carbon |
Sharan S. Agrawal |
2023-08 |
MPhil 84 p |
PDF (4.8 MB) |
984 |
Efficient spatial and temporal safety for microcontrollers and application-class processors |
Peter David Rugg |
2023-07 |
PhD 189 p |
PDF (2.7 MB) |
983 |
An evaluation of police interventions for cybercrime prevention |
Maria Bada, Alice Hutchings, et al. |
2023-07 |
80 p |
PDF (2.0 MB) |
982 |
Arm Morello Programme: Architectural security goals and known limitations |
Robert N. M. Watson, Graeme Barnes, et al. |
2023-07 |
8 p |
PDF (0.2 MB) |
981 |
The Cerberus C semantics |
Kayvan Memarian |
2023-05 |
PhD 290 p |
PDF (3.6 MB) |
980 |
Protecting enclaves from side-channel attacks through physical isolation |
Marno van der Maas |
2023-03 |
PhD 120 p |
PDF (1.5 MB) |
979 |
Efficient virtual cache coherency for multicore systems and accelerators |
Xuan Guo |
2023-02 |
PhD 202 p |
PDF (3.3 MB) |
978 |
A Next Generation Internet Architecture |
Alexander G. Fraser |
2023-02 |
118 p |
PDF (1.4 MB) |
977 |
Motion quality models for real-time adaptive rendering |
Akshay Jindal |
2023-01 |
PhD 132 p colour |
PDF (14.4 MB) |
976 |
CHERI compartmentalisation for embedded systems |
Hesham Almatary |
2022-11 |
PhD 142 p |
PDF (1.6 MB) |
975 |
Memory safety with CHERI capabilities: security analysis, language interpreters, and heap temporal safety |
Brett Gutstein |
2022-11 |
PhD 119 p |
PDF (1.2 MB) |
974 |
Dynamic analysis for concurrency optimisation |
Indigo J. D. Orton |
2022-08 |
PhD 166 p |
PDF (1.7 MB) |
973 |
Data-driven representations in brain science: modelling approaches in gene expression and neuroimaging domains |
Tiago M. L. Azevedo |
2022-07 |
PhD 136 p colour |
PDF (5.9 MB) |
972 |
Muntjac multicore RV64 processor: introduction and microarchitectural guide |
Xuan Guo, Daniel Bates, et al. |
2022-06 |
27 p |
PDF (1.8 MB) |
971 |
Automating representation change across domains for reasoning |
Aaron Stockdill |
2022-06 |
PhD 268 p |
PDF (3.9 MB) |
970 |
Transparent analysis of multi-modal embeddings |
Anita L. Verő |
2022-05 |
PhD 202 p colour |
PDF (61.6 MB) |
969 |
Assessing the understandability of a distributed algorithm by tweeting buggy pseudocode |
Martin Kleppmann |
2022-05 |
15 p |
PDF (0.5 MB) |
968 |
Evidence-based verification and correction of textual claims |
James Thorne |
2022-02 |
PhD 231 p |
PDF (3.7 MB) |
967 |
Gaussian Pixie Autoencoder: Introducing Functional Distributional Semantics to continuous latent spaces |
Primož Fabiani |
2022-01 |
MPhil 50 p |
PDF (0.7 MB) |
966 |
Obstacles to wearable computing |
Helen Oliver |
2021-12 |
PhD 318 p |
PDF (14.3 MB) |
965 |
Improving commercial LiFi network feasibility through rotation invariance, motion prediction, and bandwidth aggregation at the physical layer |
Daniel M. Fisher, Jon A. Crowcroft |
2021-11 |
MPhil 79 p |
PDF (2.8 MB) |
964 |
Information dissemination via random walks |
Hayk Saribekyan |
2021-11 |
PhD 134 p |
PDF (2.6 MB) |
963 |
Capability-based access control for cyber physical systems |
Michael G. Dodson |
2021-10 |
PhD 127 p |
PDF (3.2 MB) |
962 |
Trusted reference monitors for Linux using Intel SGX enclaves |
Harri Bell-Thomas |
2021-10 |
MEng 62 p |
PDF (2.9 MB) |
961 |
CheriOS: designing an untrusted single-address-space capability operating system utilising capability hardware and a minimal hypervisor |
Lawrence G. Esswood |
2021-09 |
PhD 195 p |
PDF (1.5 MB) |
960 |
Data summarizations for scalable, robust and privacy-aware learning in high dimensions |
Dionysis Manousakas |
2021-09 |
PhD 130 p |
PDF (16.0 MB) |
959 |
Verified security for the Morello capability-enhanced prototype Arm architecture |
Thomas Bauereiss, Brian Campbell, et al. |
2021-09 |
24 p |
PDF (0.9 MB) |
958 |
Machine-learning approaches for the empirical Schrödinger bridge problem |
Francisco Vargas |
2021-06 |
MPhil 114 p |
PDF (5.2 MB) |
957 |
Rollercoaster: an efficient group-multicast scheme for mix networks |
Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford |
(2021) |
27 p |
PDF (2.0 MB) |
956 |
Optimisation of a modern numerical library: a bottom-up approach |
Jianxin Zhao |
2021-04 |
PhD 96 p |
PDF (4.0 MB) |
955 |
Capability memory protection for embedded systems |
Hongyan Xia |
2021-02 |
PhD 145 p |
PDF (1.5 MB) |
954 |
Inline and sideline approaches for low-cost memory safety in C |
Myoung Jin Nam |
2021-02 |
PhD 124 p |
PDF (1.5 MB) |
953 |
DSbD CHERI and Morello Capability Essential IP (Version 1) |
Robert N. M. Watson, Jonathan Woodruff, et al. |
2020-12 |
25 p |
PDF (0.4 MB) |
952 |
Exploring the effect of spatial faithfulness on group decision-making |
David Adeboye |
2020-10 |
MPhil 64 p |
PDF (2.5 MB) |
951 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 8) |
Robert N. M. Watson, Peter G. Neumann, et al. |
2020-10 |
590 p |
PDF (3.3 MB) |
950 |
Probabilistic concurrent game semantics |
Hugo Paquet |
2020-08 |
PhD 156 p |
PDF (1.4 MB) |
949 |
Complete spatial safety for C and C++ using CHERI capabilities |
Alexander Richardson |
2020-06 |
PhD 189 p |
PDF (3.1 MB) |
948 |
Reasoning about effectful programs and evaluation order |
Dylan McDermott |
2020-06 |
PhD 150 p |
PDF (1.4 MB) |
947 |
CHERI C/C++ Programming Guide |
Robert N. M. Watson, Alexander Richardson, et al. |
2020-06 |
33 p |
PDF (0.5 MB) |
946 |
End-to-end deep reinforcement learning in computer systems |
Michael Schaarschmidt |
2020-04 |
PhD 166 p |
PDF (3.2 MB) |
945 |
Machine learning methods for detecting structure in metabolic flow networks |
Maxwell Jay Conway |
2020-03 |
PhD 132 p |
PDF (2.7 MB) |
944 |
Honeypots in the age of universal attacks and the Internet of Things |
Alexander Vetterl |
2020-02 |
PhD 115 p |
PDF (2.6 MB) |
943 |
Latency-First datacenter network scheduling |
Mathew P. Grosvenor |
2020-01 |
PhD 310 p |
PDF (10.3 MB) |
942 |
Evaluating visually grounded language capabilities using microworlds |
Alexander Kuhnle |
2020-01 |
PhD 142 p |
PDF (4.1 MB) |
941 |
An Introduction to CHERI |
Robert N. M. Watson, Simon W. Moore, et al. |
2019-09 |
43 p |
PDF (0.6 MB) |
940 |
Rigorous engineering for hardware security: formal modelling and proof in the CHERI design and implementation process |
Kyndylan Nienhuis, Alexandre Joannou, et al. |
2019-09 |
38 p |
PDF (0.7 MB) |
939 |
Effects of timing on users’ perceived control when interacting with intelligent systems |
Christine Guo Yu |
2019-08 |
PhD 284 p |
PDF (6.3 MB) |
938 |
Automatic annotation of error types for grammatical error correction |
Christopher Bryant |
2019-06 |
PhD 138 p |
PDF (3.8 MB) |
937 |
Latency-driven performance in data centres |
Diana Andreea Popescu |
2019-06 |
PhD 190 p |
PDF (21.5 MB) |
936 |
High-performance memory safety: optimizing the CHERI capability machine |
Alexandre J. P. Joannou |
2019-05 |
PhD 132 p |
PDF (3.4 MB) |
935 |
Distributed consensus revised |
Heidi Howard |
2019-04 |
PhD 151 p |
PDF (1.2 MB) |
934 |
Exploitation from malicious PCI Express peripherals |
Colin L. Rothwell |
2019-02 |
108 p |
PDF (4.9 MB) |
933 |
An Evaluation of NDP performance |
Noa Zilberman |
2019-01 |
19 p |
PDF (2.8 MB) |
932 |
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment |
Brooks Davis, Robert N. M. Watson, et al. |
2019-04 |
40 p |
PDF (0.5 MB) |
931 |
A Performance-efficient and practical processor error recovery framework |
Jyothish Soman |
2019-01 |
PhD 91 p |
PDF (1.7 MB) |
930 |
Provenance-based computing |
Lucian Carata |
2018-12 |
PhD 132 p |
PDF (5.5 MB) |
929 |
Resilient payment systems |
Khaled Baqer |
2018-11 |
PhD 115 p |
PDF (4.6 MB) |
928 |
Cut-through network switches: architecture, design and implementation |
Noa Zilberman, Łukasz Dudziak, et al. |
2018-11 |
18 p |
PDF (0.6 MB) |
927 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7) |
Robert N. M. Watson, Peter G. Neumann, et al. |
2019-06 |
496 p |
PDF (10.5 MB) |
926 |
Are cyber-blackouts in service networks likely?: implications for cyber risk management |
Ranjan Pal, Konstantinos Psounis, et al. |
2018-10 |
32 p |
PDF (1.9 MB) |
925 |
Privacy markets in the Apps and IoT age |
Ranjan Pal, Jon Crowcroft, et al. |
2018-09 |
45 p |
PDF (1.7 MB) |
924 |
OpenDTrace Specification version 1.0 |
George Neville-Neil, Jonathan Anderson, et al. |
2018-08 |
235 p |
PDF (0.9 MB) |
923 |
Prefetching for complex memory access patterns |
Sam Ainsworth |
2018-07 |
PhD 146 p |
PDF (3.5 MB) |
922 |
Raising a new generation of cyber defenders |
Frank Stajano, Graham Rymer, Michelle Houghton |
2018-06 |
307 p |
PDF (68.6 MB) |
921 |
Optimising data centre operation by removing the transport bottleneck |
Toby Moncaster |
2018-06 |
PhD 130 p |
PDF (8.0 MB) |
920 |
Interactive analytical modelling |
Advait Sarkar |
2018-05 |
PhD 142 p colour |
PDF (9.7 MB) |
919 |
Proceedings of the 2017 Scheme and Functional Programming Workshop |
Nada Amin, François-René Rideau |
2018-03 |
50 p |
PDF (2.8 MB) |
918 |
Evaluation of decentralized email architecture and social network analysis based on email attachment sharing |
Gregory Y. Tsipenyuk |
2018-03 |
PhD 153 p |
PDF (2.7 MB) |
917 |
Formal verification-driven parallelisation synthesis |
Matko Botinčan |
2018-03 |
PhD 163 p |
PDF (2.0 MB) |
916 |
Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks |
Robert N. M. Watson, Jonathan Woodruff, et al. |
2018-02 |
16 p |
PDF (0.2 MB) |
915 |
Annotating errors and disfluencies in transcriptions of speech |
Andrew Caines, Diane Nicholls, Paula Buttery |
2017-12 |
10 p |
PDF (0.4 MB) |
914 |
Characterizing the impact of network latency on cloud-based applications’ performance |
Diana Andreea Popescu, Noa Zilberman, Andrew W. Moore |
2017-11 |
20 p |
PDF (0.8 MB) |
913 |
Hierarchical statistical semantic translation and realization |
Matic Horvat |
2017-10 |
PhD 215 p |
PDF (5.8 MB) |
912 |
Network traffic classification via neural networks |
Ang Kun Joo Michael, Emma Valla, et al. |
2017-09 |
25 p |
PDF (0.8 MB) |
911 |
Proofs for ‘Verifying Spatial Properties of Array Computations’ |
Dominic Orchard, Mistral Contrastin, et al. |
2017-09 |
8 p |
PDF (0.5 MB) |
910 |
Automated verification of continuous and hybrid dynamical systems |
William Denman |
2017-07 |
PhD 178 p |
PDF (3.5 MB) |
909 |
Exploring new attack vectors for the exploitation of smartphones |
Laurent Simon |
2017-07 |
PhD 167 p |
PDF (3.3 MB) |
908 |
ASAP: As Static As Possible memory management |
Raphaël L. Proust |
2017-07 |
PhD 147 p |
PDF (1.0 MB) |
907 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) |
Robert N. M. Watson, Peter G. Neumann, et al. |
2017-04 |
307 p |
PDF (9.4 MB) |
906 |
Context-aware programming languages |
Tomas Petricek |
2017-03 |
PhD 218 p |
PDF (1.7 MB) |
905 |
Fixed point promotion: taking the induction out of automated induction |
William Sonnex |
2017-03 |
PhD 170 p |
PDF (0.9 MB) |
904 |
Grammatical error correction in non-native English |
Zheng Yuan |
2017-03 |
PhD 145 p |
PDF (1.4 MB) |
903 |
Parameterized complexity of distances to sparse graph classes |
Jannis Bulian |
2017-02 |
PhD 133 p |
PDF (1.2 MB) |
902 |
Programming language evolution |
Raoul-Gabriel Urma |
2017-02 |
PhD 129 p |
PDF (2.0 MB) |
901 |
Signal maps for smartphone localisation |
Chao Gao |
2017-02 |
PhD 127 p |
PDF (23.7 MB) |
900 |
A framework to build bespoke auto-tuners with structured Bayesian optimisation |
Valentin Dalibard |
2017-02 |
PhD 182 p |
PDF (2.6 MB) |
899 |
Deep embodiment: grounding semantics in perceptual modalities |
Douwe Kiela |
2017-02 |
PhD 128 p |
PDF (5.8 MB) |
898 |
Access control for network management |
Dongting Yu |
2017-01 |
PhD 108 p |
PDF (0.8 MB) |
897 |
Characterization of Internet censorship from multiple perspectives |
Sheharbano Khattak |
2017-01 |
PhD 170 p |
PDF (3.6 MB) |
896 |
Learning to de-anonymize social networks |
Kumar Sharad |
2016-12 |
PhD 158 p |
PDF (6.9 MB) |
895 |
Artificial error generation for translation-based grammatical error correction |
Mariano Felice |
2016-10 |
PhD 155 p |
PDF (1.2 MB) |
894 |
Issues in preprocessing current datasets for grammatical error correction |
Christopher Bryant, Mariano Felice |
2016-09 |
15 p |
PDF (0.4 MB) |
893 |
Towards practical information flow control and audit |
Thomas F. J.-M. Pasquier |
2016-07 |
PhD 153 p |
PDF (1.5 MB) |
892 |
Pipelined image processing for pattern recognition |
A. Daniel Hall |
2016-07 |
PhD 121 p |
PDF (8.7 MB) |
891 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) |
Robert N. M. Watson, Peter G. Neumann, et al. |
2016-06 |
242 p |
PDF (1.1 MB) |
890 |
Using multiple representations to develop notational expertise in programming |
Alistair G. Stead |
2016-06 |
PhD 301 p |
PDF (24.8 MB) |
889 |
Evaluating the viability of remote renewable energy in datacentre computing |
Sherif Akoush, Ripduman Sohan, et al. |
2016-05 |
26 p |
PDF (0.6 MB) |
888 |
Recomputation-based data reliability for MapReduce using lineage |
Sherif Akoush, Ripduman Sohan, Andy Hopper |
2016-05 |
19 p |
PDF (0.5 MB) |
887 |
Hardware support for compartmentalisation |
Robert M. Norton |
2016-05 |
PhD 86 p |
PDF (1.2 MB) |
886 |
Error detection in content word combinations |
Ekaterina Kochmar |
2016-05 |
PhD 170 p |
PDF (3.8 MB) |
885 |
HasGP: A Haskell library for Gaussian process inference |
Sean B. Holden |
2016-04 |
6 p |
PDF (0.1 MB) |
884 |
Machine learning and computer algebra |
Zongyan Huang |
2016-04 |
PhD 113 p |
PDF (1.5 MB) |
883 |
Survey propagation applied to weighted partial maximum satisfiability |
Richard Russell, Sean B. Holden |
2016-03 |
15 p |
PDF (0.3 MB) |
882 |
Discovering and exploiting parallelism in DOACROSS loops |
Niall Murphy |
2016-03 |
PhD 129 p |
PDF (2.4 MB) |
881 |
Web data knowledge extraction |
Juan M. Tirado, Ovidiu Serban, et al. |
2016-03 |
60 p |
PDF (0.7 MB) |
880 |
Access contracts: a dynamic approach to object-oriented access protection |
Janina Voigt |
2016-02 |
PhD 171 p |
PDF (1.8 MB) |
879 |
Self-compilation and self-verification |
Ramana Kumar |
2016-02 |
PhD 148 p |
PDF (0.9 MB) |
878 |
Efficient multivariate statistical techniques for extracting secrets from electronic devices |
Marios O. Choudary |
2015-09 |
PhD 164 p |
PDF (14.5 MB) |
877 |
Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide |
Robert N. M. Watson, David Chisnall, et al. |
2015-09 |
58 p |
PDF (0.4 MB) |
876 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture |
Robert N. M. Watson, Peter G. Neumann, et al. |
2015-09 |
198 p |
PDF (0.9 MB) |
875 |
The language of collaborative tagging |
Theodosia Togia |
2015-09 |
PhD 203 p colour |
PDF (28.2 MB) |
874 |
Augmented Reality interfaces for symbolic play in early childhood |
Zhen Bai |
2015-09 |
PhD 292 p |
PDF (9.5 MB) |
873 |
Clean application compartmentalization with SOAAP (extended version) |
Khilan Gudka, Robert N.M. Watson, et al. |
2015-08 |
35 p |
PDF (2.1 MB) |
872 |
The integration of higher order interactive proof with first order automatic theorem proving |
Jia Meng |
2015-07 |
PhD 144 p |
PDF (1.0 MB) |
871 |
Architecture-neutral parallelism via the Join Calculus |
Peter R. Calvert |
2015-07 |
PhD 150 p |
PDF (1.2 MB) |
870 |
Accelerating control-flow intensive code in spatial hardware |
Ali Mustafa Zaidi |
2015-05 |
PhD 170 p |
PDF (6.3 MB) |
869 |
Bluespec Extensible RISC Implementation: BERI Software reference |
Robert N. M. Watson, David Chisnall, et al. |
2015-04 |
27 p |
PDF (0.9 MB) |
868 |
Bluespec Extensible RISC Implementation: BERI Hardware reference |
Robert N. M. Watson, Jonathan Woodruff, et al. |
2015-04 |
82 p |
PDF (0.5 MB) |
867 |
Higher-order proof translation |
Nikolai Sultana |
2015-04 |
PhD 158 p |
PDF (2.7 MB) |
866 |
PDTL: Parallel and distributed triangle listing for massive graphs |
Ilias Giechaskiel, George Panagopoulos, Eiko Yoneki |
2015-04 |
14 p |
PDF (0.5 MB) |
865 |
I/O Optimisation and elimination via partial evaluation |
Christopher S.F. Smowton |
2014-12 |
PhD 129 p |
PDF (1.1 MB) |
864 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture |
Robert N. M. Watson, Peter G. Neumann, et al. |
2014-12 |
142 p |
PDF (0.7 MB) |
863 |
Regional clouds: technical considerations |
Jatinder Singh, Jean Bacon, et al. |
2014-11 |
18 p |
PDF (0.6 MB) |
862 |
Surface modelling for 2D imagery |
Henrik Lieng |
2014-10 |
PhD 177 p colour |
PDF (22.3 MB) |
861 |
Automatic facial expression analysis |
Tadas Baltrusaitis |
2014-10 |
PhD 218 p colour |
PDF (15.2 MB) |
860 |
Program equivalence in functional metaprogramming via nominal Scott domains |
Steffen Loesch |
2014-10 |
PhD 164 p |
PDF (1.5 MB) |
859 |
Resourceful: fine-grained resource accounting for explaining service variability |
Lucian Carata, Oliver Chick, et al. |
2014-09 |
12 p |
PDF (0.4 MB) |
858 |
CHERI: A RISC capability machine for practical memory safety |
Jonathan D. Woodruff |
2014-07 |
PhD 112 p |
PDF (1.1 MB) |
857 |
ARC: Analysis of Raft Consensus |
Heidi Howard |
2014-07 |
BA 69 p |
PDF (1.2 MB) |
856 |
Sentiment analysis of scientific citations |
Awais Athar |
2014-06 |
PhD 114 p colour |
PDF (4.4 MB) |
855 |
Mephistophone |
Patrick K.A. Wollner, Isak Herman, et al. |
2014-06 |
8 p |
PDF (1.1 MB) |
854 |
Programming contextual computations |
Dominic Orchard |
2014-05 |
PhD 223 p |
PDF (1.7 MB) |
853 |
Bluespec Extensible RISC Implementation: BERI Software reference |
Robert N.M. Watson, David Chisnall, et al. |
2014-04 |
34 p |
PDF (0.9 MB) |
852 |
Bluespec Extensible RISC Implementation: BERI Hardware reference |
Robert N.M. Watson, Jonathan Woodruff, et al. |
2014-04 |
76 p |
PDF (0.5 MB) |
851 |
Capability Hardware Enhanced RISC Instructions: CHERI User’s guide |
Robert N.M. Watson, David Chisnall, et al. |
2014-04 |
26 p |
PDF (0.4 MB) |
850 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture |
Robert N.M. Watson, Peter G. Neumann, et al. |
2014-04 |
131 p |
PDF (0.7 MB) |
849 |
SNA: Sourceless Network Architecture |
Marcelo Bagnulo Braun, Jon Crowcroft |
2014-03 |
12 p |
PDF (0.2 MB) |
848 |
Automatically generating reading lists |
James G. Jardine |
2014-02 |
PhD 164 p |
PDF (6.4 MB) |
847 |
SBUS: a generic policy-enforcing middleware for open pervasive systems |
Jatinder Singh, Jean Bacon |
2014-02 |
20 p |
PDF (1.9 MB) |
846 |
Exploiting tightly-coupled cores |
Daniel Bates |
2014-01 |
PhD 162 p |
PDF (1.5 MB) |
845 |
Black-box composition of mismatched software components |
Stephen Kell |
2013-12 |
PhD 251 p |
PDF (2.8 MB) |
844 |
Decompilation as search |
Wei Ming Khoo |
2013-11 |
PhD 119 p |
PDF (1.2 MB) |
843 |
Programming for humans: a new paradigm for domain-specific languages |
Robin Message |
2013-11 |
PhD 140 p |
PDF (1.6 MB) |
842 |
Automated assessment of English-learner writing |
Helen Yannakoudakis |
2013-10 |
PhD 151 p |
PDF (1.3 MB) |
841 |
Information centric delay tolerant networking: an internet architecture for the challenged |
Arjuna Sathiaseelan, Dirk Trossen, et al. |
2013-09 |
11 p |
PDF (0.2 MB) |
840 |
Minimally supervised dependency-based methods for natural language processing |
Marek Rei |
2013-09 |
PhD 169 p |
PDF (1.1 MB) |
839 |
Automatic extraction of property norm-like data from large text corpora |
Colin Kelly |
2013-09 |
PhD 154 p |
PDF (1.0 MB) |
838 |
Mining and tracking in evolving software |
Silvia Breu |
2013-06 |
PhD 104 p |
PDF (2.0 MB) |
837 |
Human-data interaction |
Hamed Haddadi, Richard Mortier, et al. |
2013-06 |
9 p |
PDF (0.4 MB) |
836 |
Aliasing contracts: a dynamic approach to alias protection |
Janina Voigt, Alan Mycroft |
2013-06 |
27 p |
PDF (0.3 MB) |
835 |
Call-by-need supercompilation |
Maximilian C. Bolingbroke |
2013-05 |
PhD 230 p |
PDF (1.6 MB) |
834 |
Concurrent verification for sequential programs |
John Wickerson |
2013-05 |
PhD 149 p |
PDF (1.6 MB) |
833 |
Practice-led design and evaluation of a live visual constraint language |
Alan F. Blackwell, Ignatios Charalampidis |
2013-05 |
16 p |
PDF (0.3 MB) |
832 |
Communication centric, multi-core, fine-grained processor architecture |
Gregory A. Chadwick |
2013-04 |
PhD 165 p |
PDF (1.2 MB) |
831 |
Communication for programmability and performance on multi-core processors |
Meredydd Luff |
2013-04 |
PhD 89 p |
PDF (1.3 MB) |
830 |
Massively parallel neural computation |
Paul J. Fox |
2013-03 |
PhD 105 p |
PDF (2.3 MB) |
829 |
Microelectronic security measures |
Philip Christopher Paul |
2013-02 |
PhD 177 p colour |
PDF (12.6 MB) |
828 |
Exploring networks-on-chip for FPGAs |
Rosemary M. Francis |
2013-01 |
PhD 121 p |
PDF (1.7 MB) |
827 |
The smart card detective: a hand-held EMV interceptor |
Omar S. Choudary |
2012-12 |
55 p |
PDF (2.8 MB) |
826 |
GREEN IPTV: a resource and energy efficient network for IPTV |
Fernando M. V. Ramos |
2012-12 |
PhD 152 p |
PDF (3.8 MB) |
825 |
Privacy engineering for social networks |
Jonathan Anderson |
2012-12 |
PhD 255 p |
PDF (3.5 MB) |
824 |
Hardware synthesis from a stream-processing functional language |
Simon Frankau |
2012-11 |
PhD 202 p |
PDF (1.3 MB) |
823 |
Mitigating I/O latency in SSD-based graph traversal |
Amitabha Roy, Karthik Nilakant, et al. |
2012-11 |
27 p |
PDF (0.3 MB) |
822 |
Planning with preferences using maximum satisfiability |
Richard A. Russell |
2012-10 |
PhD 160 p |
PDF (2.0 MB) |
821 |
Modelling energy efficiency for computation |
Charles Reams |
2012-10 |
PhD 135 p |
PDF (1.8 MB) |
820 |
A unified graph query layer for multiple databases |
Eiko Yoneki, Amitabha Roy |
2012-08 |
22 p |
PDF (0.3 MB) |
819 |
Guessing human-chosen secrets |
Joseph Bonneau |
2012-05 |
PhD 161 p |
PDF (1.7 MB) |
818 |
New approaches to operating system security extensibility |
Robert N. M. Watson |
2012-04 |
PhD 184 p |
PDF (1.2 MB) |
817 |
The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes |
Joseph Bonneau, Cormac Herley, et al. |
2012-03 |
32 p |
PDF (0.5 MB) |
816 |
Verification of security protocols based on multicast communication |
Jean E. Martina |
2012-03 |
PhD 150 p |
PDF (1.1 MB) |
815 |
Colour videos with depth: acquisition, processing and evaluation |
Christian Richardt |
2012-03 |
PhD 132 p colour |
PDF (68.7 MB) |
814 |
The free Internet: a distant mirage or near reality? |
Arjuna Sathiaseelan, Jon Crowcroft |
2012-02 |
10 p |
PDF (0.1 MB) |
813 |
Reconstructing compressed photo and video data |
Andrew B. Lewis |
2012-02 |
PhD 148 p colour |
PDF (3.5 MB) |
812 |
Abstracting information on body area networks |
Pedro Brandão |
2012-01 |
PhD 144 p |
PDF (4.8 MB) |
811 |
Active electromagnetic attacks on secure hardware |
A. Theodore Markettos |
2011-12 |
PhD 217 p colour |
PDF (10.6 MB) |
810 |
Proximity Coherence for chip-multiprocessors |
Nick Barrow-Williams |
2011-11 |
PhD 164 p |
PDF (3.8 MB) |
809 |
Distributed virtual environment scalability and security |
John L. Miller |
2011-10 |
PhD 98 p |
PDF (1.9 MB) |
808 |
Resource-sensitive synchronisation inference by abduction |
Matko Botinčan, Mike Dodds, Suresh Jagannathan |
2012-01 |
57 p |
PDF (0.6 MB) |
807 |
Second-order algebraic theories |
Ola Mahmoud |
2011-10 |
PhD 133 p |
PDF (0.9 MB) |
806 |
On joint diagonalisation for dynamic network analysis |
Damien Fay, Jérôme Kunegis, Eiko Yoneki |
2011-10 |
12 p |
PDF (0.8 MB) |
805 |
A model personal energy meter |
Simon Hay |
2011-09 |
PhD 207 p |
PDF (24.6 MB) |
804 |
The HasGP user manual |
Sean B. Holden |
2011-09 |
18 p |
PDF (0.3 MB) |
803 |
Computational approaches to figurative language |
Ekaterina V. Shutova |
2011-08 |
PhD 219 p |
PDF (1.8 MB) |
802 |
Latent semantic sentence clustering for multi-document summarization |
Johanna Geiß |
2011-07 |
PhD 156 p |
PDF (1.0 MB) |
801 |
Software lock elision for x86 machine code |
Amitabha Roy |
2011-07 |
PhD 154 p |
PDF (1.4 MB) |
800 |
Improving cache utilisation |
James R. Srinivasan |
2011-06 |
PhD 184 p |
PDF (3.4 MB) |
799 |
A separation logic framework for HOL |
Thomas Tuerk |
2011-06 |
PhD 271 p |
PDF (2.4 MB) |
798 |
Practical memory safety for C |
Periklis Akritidis |
2011-06 |
PhD 136 p |
PDF (2.1 MB) |
797 |
Interpretational overhead in system software |
Boris Feigin |
2011-04 |
PhD 116 p |
PDF (1.2 MB) |
796 |
Facilitating program parallelisation: a profiling-based approach |
Jonathan Mak |
2011-03 |
PhD 120 p |
PDF (1.2 MB) |
795 |
Underspecified quantification |
Aurelie Herbelot |
2011-02 |
PhD 163 p |
PDF (1.1 MB) |
794 |
Grammatical error prediction |
Øistein E. Andersen |
2011-01 |
PhD 163 p |
PDF (1.6 MB) |
793 |
Affect inference in learning environments: a functional view of facial affect analysis using naturalistic data |
Shazia Afzal |
2010-12 |
PhD 146 p |
PDF (3.0 MB) |
792 |
Machine learning and automated theorem proving |
James P. Bridge |
2010-11 |
PhD 180 p |
PDF (3.5 MB) |
791 |
Semi-supervised learning for biomedical information extraction |
Andreas Vlachos |
2010-11 |
PhD 113 p |
PDF (1.0 MB) |
790 |
Automated assessment of ESOL free text examinations |
Ted Briscoe, Ben Medlock, Øistein Andersen |
2010-11 |
31 p |
PDF (0.5 MB) |
789 |
Making prophecies with decision predicates |
Byron Cook, Eric Koskinen |
2010-11 |
29 p |
PDF (0.6 MB) |
788 |
Branching-time reasoning for programs (extended version) |
Byron Cook, Eric Koskinen, Moshe Vardi |
2011-07 |
38 p |
PDF (0.9 MB) |
787 |
Emotion inference from human body motion |
Daniel Bernhardt |
2010-10 |
PhD 227 p |
PDF (8.7 MB) |
786 |
Communication flows in power-efficient Networks-on-Chips |
Arnab Banerjee |
2010-08 |
PhD 107 p |
PDF (1.2 MB) |
785 |
Anonymity, information, and machine-assisted proof |
Aaron R. Coble |
2010-07 |
PhD 171 p |
PDF (1.1 MB) |
784 |
Characterizing 10 Gbps network interface energy consumption |
Ripduman Sohan, Andrew Rice, et al. |
2010-07 |
10 p |
PDF (0.2 MB) |
783 |
Distributed complex event detection for pervasive computing |
Dan O’Keeffe |
2010-07 |
PhD 170 p |
PDF (1.3 MB) |
782 |
Petri net semantics |
Jonathan M. Hayman |
2010-06 |
PhD 252 p |
PDF (2.1 MB) |
781 |
Stage scheduling for CPU-intensive servers |
Minor E. Gordon |
2010-06 |
PhD 119 p |
PDF (0.9 MB) |
780 |
Cryptography and evidence |
Michael Roe |
2010-05 |
PhD 75 p |
PDF (0.5 MB) |
779 |
A text representation language for contextual and distributional processing |
Eric K. Henderson |
2010-04 |
PhD 207 p |
PDF (2.6 MB) |
778 |
Automatically proving linearizability |
Viktor Vafeiadis |
2016-09 |
19 p |
PDF (0.4 MB) |
777 |
Concurrent Abstract Predicates |
Thomas Dinsdale-Young, Mike Dodds, et al. |
2010-04 |
43 p |
PDF (0.5 MB) |
776 |
System tests from unit tests |
Kathryn E. Gray, Alan Mycroft |
2010-03 |
27 p |
PDF (0.3 MB) |
775 |
Creating high-performance, statically type-safe network applications |
Anil Madhavapeddy |
2010-03 |
PhD 169 p |
PDF (2.0 MB) |
774 |
Explicit stabilisation for modular rely-guarantee reasoning |
John Wickerson, Mike Dodds, Matthew Parkinson |
2010-03 |
29 p |
PDF (0.9 MB) |
773 |
NURBS-compatible subdivision surfaces |
Thomas J. Cashman |
2010-03 |
PhD 99 p colour |
PDF (6.1 MB) |
772 |
An executable meta-language for inductive definitions with binders |
Matthew R. Lakin |
2010-03 |
PhD 171 p |
PDF (1.1 MB) |
771 |
Bodies-in-Space: investigating technology usage in co-present group interaction |
Cecily Morrison |
2010-03 |
PhD 147 p |
PDF (4.6 MB) |
770 |
Controlling the dissemination and disclosure of healthcare events |
Jatinder Singh |
2010-02 |
PhD 193 p |
PDF (4.2 MB) |
769 |
Kilim: A server framework with lightweight actors, isolation types and zero-copy messaging |
Sriram Srinivasan |
2010-02 |
PhD 127 p |
PDF (1.4 MB) |
768 |
Report on existing open-source electronic medical records |
Cecily Morrison, Adona Iosif, Miklos Danka |
2010-02 |
12 p colour |
PDF (1.1 MB) |
767 |
Ising model of rumour spreading in interacting communities |
Massimo Ostilli, Eiko Yoneki, et al. |
2010-01 |
24 p |
PDF (3.2 MB) |
766 |
Towards robust inexact geometric computation |
Julian M. Smith |
2009-12 |
PhD 186 p colour |
PDF (1.9 MB) |
765 |
Formal verification of machine-code programs |
Magnus O. Myreen |
2009-12 |
PhD 109 p |
PDF (0.8 MB) |
764 |
Statistical anaphora resolution in biomedical texts |
Caroline V. Gasperin |
2009-12 |
PhD 124 p |
PDF (1.8 MB) |
763 |
Security for volatile FPGAs |
Saar Drimer |
2009-11 |
PhD 169 p |
PDF (3.2 MB) |
762 |
Resource provisioning for virtualized server applications |
Evangelia Kalyvianaki |
2009-11 |
PhD 161 p |
PDF (2.0 MB) |
761 |
Programming networks of vehicles |
Jonathan J. Davies |
2009-11 |
PhD 292 p |
PDF (4.7 MB) |
760 |
Radical innovation: crossing knowledge boundaries with interdisciplinary teams |
Alan F. Blackwell, Lee Wilson, et al. |
2009-11 |
124 p |
PDF (0.7 MB) |
759 |
Coarse-grained transactions (extended version) |
Eric Koskinen, Matthew Parkinson, Maurice Herlihy |
2011-08 |
34 p |
PDF (0.6 MB) |
758 |
Logics and analyses for concurrent heap-manipulating programs |
Alexey Gotsman |
2009-10 |
PhD 160 p |
PDF (1.3 MB) |
757 |
Improving cache performance by runtime data movement |
Mark Adcock |
2009-07 |
PhD 174 p colour |
PDF (1.3 MB) |
756 |
Analysis of the Internet’s structural evolution |
Hamed Haddadi, Damien Fay, et al. |
2009-09 |
13 p |
PDF (0.3 MB) |
755 |
Skin-detached surface for interactive large mesh editing |
Yujian Gao, Aimin Hao, et al. |
2009-09 |
18 p |
PDF (1.1 MB) |
754 |
Understanding scam victims: seven principles for systems security |
Frank Stajano, Paul Wilson |
2009-08 |
22 p |
PDF (0.3 MB) |
753 |
Carbon: trusted auditing for P2P distributed virtual environments |
John L. Miller, Jon Crowcroft |
2009-08 |
20 p |
PDF (0.8 MB) |
752 |
Security of proximity identification systems |
Gerhard P. Hancke |
2009-07 |
PhD 161 p |
PDF (5.8 MB) |
751 |
Nominal domain theory for concurrency |
David C. Turner |
2009-07 |
PhD 185 p |
PDF (1.3 MB) |
750 |
AtoZ: an automatic traffic organizer using NetFPGA |
Marco Canini, Wei Li, et al. |
2009-05 |
27 p |
PDF (0.8 MB) |
749 |
Identifying social communities in complex communications for network efficiency |
Pan Hui, Eiko Yoneki, et al. |
2009-05 |
14 p |
PDF (0.7 MB) |
748 |
GTVS: boosting the collection of application traffic ground truth |
Marco Canini, Wei Li, Andrew W. Moore |
2009-04 |
20 p |
PDF (0.3 MB) |
747 |
An estimator of forward and backward delay for multipath transport |
Fei Song, Hongke Zhang, et al. |
2009-03 |
16 p |
PDF (0.8 MB) |
746 |
The snooping dragon: social-malware surveillance of the Tibetan movement |
Shishir Nagaraja, Ross Anderson |
2009-03 |
12 p |
PDF (0.3 MB) |
745 |
A better x86 memory model: x86-TSO (extended version) |
Scott Owens, Susmit Sarkar, Peter Sewell |
2009-03 |
52 p |
PDF (0.6 MB) |
744 |
Citation context analysis for information retrieval |
Anna Ritchie |
2009-03 |
PhD 119 p |
PDF (0.8 MB) |
743 |
Optimising the speed and accuracy of a Statistical GLR Parser |
Rebecca F. Watson |
2009-03 |
PhD 145 p |
PDF (1.4 MB) |
742 |
TCP, UDP, and Sockets: Volume 3: The Service-level Specification |
Thomas Ridge, Michael Norrish, Peter Sewell |
2009-02 |
305 p |
PDF (2.6 MB) |
741 |
Vehicular wireless communication |
David N. Cottingham |
2009-01 |
PhD 264 p |
PDF (3.6 MB) |
740 |
Analysis of affective expression in speech |
Tal Sobol-Shikler |
2009-01 |
PhD 163 p |
PDF (2.7 MB) |
739 |
State-based Publish/Subscribe for sensor systems |
Salman Taherian |
2009-01 |
PhD 240 p |
PDF (4.1 MB) |
738 |
High precision timing using self-timed circuits |
Scott Fairbanks |
2009-01 |
PhD 99 p |
PDF (13.2 MB) |
737 |
Static contract checking for Haskell |
Na Xu |
2008-12 |
PhD 175 p |
PDF (1.0 MB) |
736 |
Deny-guarantee reasoning |
Mike Dodds, Xinyu Feng, et al. |
2009-01 |
82 p |
PDF (0.6 MB) |
735 |
Learning compound noun semantics |
Diarmuid Ó Séaghdha |
2008-12 |
PhD 167 p |
PDF (1.5 MB) |
734 |
Tabletop interfaces for remote collaboration |
Philip Tuddenham |
2008-12 |
PhD 243 p |
PDF (23.5 MB) |
733 |
Tangible user interfaces for peripheral interaction |
Darren Edge |
2008-12 |
PhD 237 p |
PDF (8.6 MB) |
732 |
Computing surfaces – a platform for scalable interactive displays |
Alban Rrustemi |
2008-11 |
PhD 156 p |
PDF (5.0 MB) |
731 |
A new approach to Internet banking |
Matthew Johnson |
2008-09 |
PhD 113 p |
PDF (1.3 MB) |
730 |
Adaptive evaluation of non-strict programs |
Robert J. Ennals |
2008-08 |
PhD 243 p |
PDF (2.7 MB) |
729 |
Weighted spectral distribution |
Damien Fay, Hamed Haddadi, et al. |
2008-09 |
13 p |
PDF (0.2 MB) |
728 |
A robust efficient algorithm for point location in triangulations |
Peter J.C. Brown, Christopher T. Faigle |
1997-02 |
16 p |
PDF (0.3 MB) |
727 |
A novel auto-calibration system for wireless sensor motes |
Ruoshui Liu, Ian J. Wassell |
2008-09 |
65 p |
PDF (5.5 MB) |
726 |
Modular fine-grained concurrency verification |
Viktor Vafeiadis |
2008-07 |
PhD 148 p |
PDF (1.2 MB) |
725 |
Beyond node degree: evaluating AS topology models |
Hamed Haddadi, Damien Fay, et al. |
2008-07 |
16 p |
PDF (1.0 MB) |
724 |
Bayesian inference for latent variable models |
Ulrich Paquet |
2008-07 |
PhD 137 p |
PDF (2.0 MB) |
723 |
Animation manifolds for representing topological alteration |
Richard Southern |
2008-07 |
PhD 131 p |
PDF (6.7 MB) |
722 |
Energy-efficient sentient computing |
Mbou Eyole-Monono |
2008-07 |
PhD 138 p |
PDF (4.2 MB) |
721 |
Investigating classification for natural language processing tasks |
Ben W. Medlock |
2008-06 |
PhD 138 p |
PDF (1.4 MB) |
720 |
A capability-based access control architecture for multi-domain publish/subscribe systems |
Lauri I.W. Pesonen |
2008-06 |
PhD 175 p |
PDF (2.5 MB) |
719 |
The Intelligent Book: technologies for intelligent and adaptive textbooks, focussing on Discrete Mathematics |
William H. Billingsley |
2008-06 |
PhD 156 p |
PDF (3.2 MB) |
718 |
Cooperative attack and defense in distributed networks |
Tyler Moore |
2008-06 |
PhD 172 p |
PDF (1.7 MB) |
717 |
Psychologically-based simulation of human behaviour |
Stephen Julian Rymill |
2008-06 |
PhD 250 p |
PDF (25.5 MB) |
716 |
UpgradeJ: Incremental typechecking for class upgrades |
Gavin M. Bierman, Matthew J. Parkinson, James Noble |
2008-04 |
35 p |
PDF (0.5 MB) |
715 |
On using fuzzy data in security mechanisms |
Feng Hao |
2008-04 |
PhD 69 p |
PDF (1.6 MB) |
714 |
A wide-area file system for migrating virtual machines |
Tim Moreton |
2008-03 |
PhD 163 p |
PDF (1.7 MB) |
713 |
People are the network: experimental design and evaluation of social-based forwarding algorithms |
Pan Hui |
2008-03 |
PhD 160 p |
PDF (4.6 MB) |
712 |
Flash-exposure high dynamic range imaging: virtual photography and depth-compensating flash |
Christian Richardt |
2008-03 |
9 p |
PDF (2.6 MB) |
711 |
Thinking inside the box: system-level failures of tamper proofing |
Saar Drimer, Steven J. Murdoch, Ross Anderson |
2008-02 |
37 p |
PDF (5.4 MB) |
710 |
Event structures with persistence |
Lucy G. Brace-Evans |
2008-02 |
PhD 113 p |
PDF (0.9 MB) |
709 |
Protocols and technologies for security in pervasive computing and communications |
Ford Long Wong |
2008-01 |
PhD 167 p |
PDF (1.8 MB) |
708 |
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks |
Chi-Kin Chau, Jon Crowcroft, et al. |
2008-01 |
24 p |
PDF (0.3 MB) |
707 |
Complexity-effective superscalar embedded processors using instruction-level distributed processing |
Ian Caulfield |
2007-12 |
PhD 130 p |
PDF (0.7 MB) |
706 |
Covert channel vulnerabilities in anonymity systems |
Steven J. Murdoch |
2007-12 |
PhD 140 p |
PDF (1.8 MB) |
705 |
Optimizing compilation with the Value State Dependence Graph |
Alan C. Lawrence |
2007-12 |
PhD 183 p colour |
PDF (3.8 MB) |
704 |
Complexity and infinite games on finite graphs |
Paul William Hunter |
2007-11 |
PhD 170 p |
PDF (1.5 MB) |
703 |
Lazy Susan: dumb waiting as proof of work |
Jon Crowcroft, Tim Deegan, et al. |
2007-11 |
23 p |
PDF (0.3 MB) |
702 |
Relationships for object-oriented programming languages |
Alisdair Wren |
2007-11 |
PhD 153 p |
PDF (1.2 MB) |
701 |
Vector microprocessors for cryptography |
Jacques Jean-Alain Fournier |
2007-10 |
PhD 174 p |
PDF (1.7 MB) |
700 |
Context aware service composition |
Maja Vuković |
2007-10 |
PhD 225 p |
PDF (1.7 MB) |
699 |
A smooth manifold based construction of approximating lofted surfaces |
Richard Southern, Neil A. Dodgson |
2007-10 |
17 p |
PDF (1.8 MB) |
698 |
Pulse-based, on-chip interconnect |
Simon J. Hollis |
2007-09 |
PhD 186 p |
PDF (3.9 MB) |
697 |
Scaling Mount Concurrency: scalability and progress in concurrent algorithms |
Chris J. Purcell |
2007-08 |
PhD 155 p |
PDF (1.0 MB) |
696 |
An introduction to inertial navigation |
Oliver J. Woodman |
2007-08 |
37 p |
PDF (0.9 MB) |
695 |
Efficient maximum-likelihood decoding of spherical lattice codes |
Karen Su, Inaki Berenguer, et al. |
2007-07 |
29 p |
PDF (0.4 MB) |
694 |
Anti-Ω: the weakest failure detector for set agreement |
Piotr Zieliński |
2007-07 |
24 p |
PDF (0.3 MB) |
693 |
Automatic classification of eventual failure detectors |
Piotr Zieliński |
2007-07 |
21 p |
PDF (0.3 MB) |
692 |
Toward an undergraduate programme in Interdisciplinary Design |
Alan F. Blackwell |
2007-07 |
13 p |
PDF (0.2 MB) |
691 |
Preconditions on geometrically sensitive subdivision schemes |
Neil A. Dodgson, Malcolm A. Sabin, Richard Southern |
2007-08 |
13 p |
PDF (0.5 MB) |
690 |
Cluster storage for commodity computation |
Russell Glen Ross |
2007-06 |
PhD 178 p |
PDF (1.3 MB) |
689 |
Removing polar rendering artifacts in subdivision surfaces |
Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin |
2007-06 |
7 p |
PDF (0.5 MB) |
688 |
Name-passing process calculi: operational models and structural operational semantics |
Sam Staton |
2007-06 |
PhD 245 p |
PDF (2.1 MB) |
687 |
A marriage of rely/guarantee and separation logic |
Viktor Vafeiadis, Matthew Parkinson |
2007-06 |
31 p |
PDF (0.4 MB) |
686 |
Dependable systems for Sentient Computing |
Andrew C. Rice |
2007-05 |
150 p |
PDF (1.9 MB) |
685 |
Effect of severe image compression on iris recognition performance |
John Daugman, Cathryn Downing |
2007-05 |
20 p |
PDF (0.4 MB) |
684 |
Bubble Rap: Forwarding in small world DTNs in ever decreasing circles |
Pan Hui, Jon Crowcroft |
2007-05 |
44 p |
PDF (1.0 MB) |
683 |
Simulation of colliding constrained rigid bodies |
Martin Kleppmann |
2007-04 |
65 p |
PDF (6.9 MB) |
682 |
Translating HOL functions to hardware |
Juliano Iyoda |
2007-04 |
PhD 89 p |
PDF (0.7 MB) |
681 |
Indirect channels: a bandwidth-saving technique for fault-tolerant protocols |
Piotr Zieliński |
2007-04 |
24 p |
PDF (0.3 MB) |
680 |
Haggle: Clean-slate networking for mobile devices |
Jing Su, James Scott, et al. |
2007-01 |
30 p |
PDF (0.5 MB) |
679 |
Automatic summarising: a review and discussion of the state of the art |
Karen Spärck Jones |
2007-01 |
67 p |
PDF (0.6 MB) |
678 |
Compact forbidden-set routing |
Andrew D. Twigg |
2006-12 |
PhD 115 p |
PDF (1.1 MB) |
677 |
ECCO: Data centric asynchronous communication |
Eiko Yoneki |
2006-12 |
PhD 210 p |
PDF (6.6 MB) |
676 |
Road traffic analysis using MIDAS data: journey time prediction |
R.J. Gibbens, Y. Saacti |
2006-12 |
35 p |
PDF (4.6 MB) |
675 |
Computational models for first language acquisition |
Paula J. Buttery |
2006-11 |
PhD 176 p |
PDF (1.3 MB) |
674 |
Landmark Guided Forwarding |
Meng How Lim |
2006-10 |
PhD 109 p |
PDF (0.9 MB) |
673 |
Probabilistic word sense disambiguation : Analysis and techniques for combining knowledge sources |
Judita Preiss |
2006-08 |
PhD 108 p |
PDF (0.8 MB) |
672 |
Decomposing file data into discernible items |
Calicrates Policroniades-Borraz |
2006-08 |
PhD 230 p |
PDF (1.6 MB) |
671 |
Low-latency Atomic Broadcast in the presence of contention |
Piotr Zieliński |
2006-07 |
23 p |
PDF (0.3 MB) |
670 |
On the application of program analysis and transformation to high reliability hardware |
Sarah Thompson |
2006-07 |
PhD 215 p |
PDF (5.8 MB) |
669 |
Active privilege management for distributed access control systems |
David M. Eyers |
2006-06 |
PhD 222 p |
PDF (1.9 MB) |
668 |
Optimistically Terminating Consensus |
Piotr Zieliński |
2006-06 |
35 p |
PDF (0.4 MB) |
667 |
Minimizing latency of agreement protocols |
Piotr Zieliński |
2006-06 |
PhD 239 p |
PDF (2.0 MB) |
666 |
A pact with the Devil |
Mike Bond, George Danezis |
2006-06 |
14 p |
PDF (0.2 MB) |
665 |
Security evaluation at design time for cryptographic hardware |
Huiyun Li |
2006-04 |
PhD 81 p |
PDF (1.9 MB) |
664 |
Designing knowledge: An interdisciplinary experiment in research infrastructure for shared description |
Alan F. Blackwell |
2006-04 |
18 p |
PDF (0.7 MB) |
663 |
Syntax-driven analysis of context-free languages with respect to fuzzy relational semantics |
Richard Bergmair |
2006-03 |
49 p |
PDF (0.4 MB) |
662 |
An introduction to tag sequence grammars and the RASP system parser |
Ted Briscoe |
2006-03 |
30 p |
PDF (0.3 MB) |
661 |
Compatible RMRS representations from RASP and the ERG |
Anna Ritchie |
2006-03 |
41 p |
PDF (1.1 MB) |
660 |
Static program analysis based on virtual register renaming |
Jeremy Singer |
2006-02 |
PhD 183 p |
PDF (1.6 MB) |
659 |
A safety proof of a lazy concurrent list-based set implementation |
Viktor Vafeiadis, Maurice Herlihy, et al. |
2006-01 |
19 p |
PDF (0.2 MB) |
658 |
Intrinsic point-based surface processing |
Carsten Moenning |
2006-01 |
PhD 166 p |
PDF (8.1 MB) |
657 |
Security protocol design by composition |
Hyun-Jin Choi |
2006-01 |
PhD 155 p |
PDF (0.9 MB) |
656 |
Seamless mobility in 4G systems |
Pablo Vidales |
2005-11 |
PhD 141 p |
PDF (1.8 MB) |
655 |
Wearing proper combinations |
Karen Spärck Jones |
2005-11 |
27 p |
PDF (0.3 MB) |
654 |
Local reasoning for Java |
Matthew J. Parkinson |
2005-11 |
PhD 120 p |
PDF (1.1 MB) |
653 |
Anonymity and traceability in cyberspace |
Richard Clayton |
2005-11 |
PhD 189 p |
PDF (1.7 MB) |
652 |
Discriminative training methods and their applications to handwriting recognition |
Roongroj Nopsuwanchai |
2005-11 |
PhD 186 p |
PDF (2.1 MB) |
651 |
End-user programming in multiple languages |
Rob Hague |
2005-10 |
PhD 122 p |
PDF (3.1 MB) |
650 |
Parallel iterative solution method for large sparse linear equation systems |
Rashid Mehmood, Jon Crowcroft |
2005-10 |
22 p |
PDF (1.9 MB) |
649 |
The decolorize algorithm for contrast enhancing, color to grayscale conversion |
Mark Grundland, Neil A. Dodgson |
2005-10 |
15 p colour |
PDF (12.2 MB) |
648 |
Cassandra: flexible trust management and its application to electronic health records |
Moritz Y. Becker |
2005-10 |
PhD 214 p |
PDF (1.4 MB) |
647 |
An agent architecture for simulation of end-users in programming-like tasks |
Sam Staton |
2005-10 |
12 p |
PDF (0.2 MB) |
645 |
RFID is X-ray vision |
Frank Stajano |
2005-08 |
10 p |
PDF (0.1 MB) |
644 |
Robbing the bank with a theorem prover |
Paul Youn, Ben Adida, et al. |
2005-08 |
26 p |
PDF (0.2 MB) |
643 |
Using trust and risk for access control in Global Computing |
Nathan E. Dimmock |
2005-08 |
PhD 145 p |
PDF (1.8 MB) |
642 |
First-class relationships in an object-oriented language |
Gavin Bierman, Alisdair Wren |
2005-08 |
53 p |
PDF (0.5 MB) |
641 |
Cryptographic processors – a survey |
Ross Anderson, Mike Bond, et al. |
2005-08 |
19 p |
PDF (0.6 MB) |
640 |
Combining cryptography with biometrics effectively |
Feng Hao, Ross Anderson, John Daugman |
2005-07 |
17 p |
PDF (0.2 MB) |
639 |
Non-blocking hashtables with open addressing |
Chris Purcell, Tim Harris |
2005-09 |
23 p |
PDF (0.3 MB) |
638 |
Optimistic Generic Broadcast |
Piotr Zieliński |
2005-07 |
22 p |
PDF (0.3 MB) |
637 |
The topology of covert conflict |
Shishir Nagaraja, Ross Anderson |
2005-07 |
15 p |
PDF (0.2 MB) |
636 |
Mind-reading machines: automated inference of complex mental states |
Rana Ayman el Kaliouby |
2005-07 |
PhD 185 p |
PDF (24.3 MB) |
635 |
Results from 200 billion iris cross-comparisons |
John Daugman |
2005-06 |
8 p |
PDF (0.2 MB) |
634 |
Visualisation, interpretation and use of location-aware interfaces |
Kasim Rehman |
2005-05 |
PhD 159 p |
PDF (2.8 MB) |
633 |
On deadlock, livelock, and forward progress |
Alex Ho, Steven Smith, Steven Hand |
2005-05 |
8 p |
PDF (0.2 MB) |
632 |
Between shallow and deep: an experiment in automatic summarising |
R.I. Tucker, K. Spärck Jones |
2005-04 |
34 p |
PDF (0.3 MB) |
631 |
MIRRORS: An integrated framework for capturing real world behaviour for models of ad hoc networks |
Wenjun Hu, Jon Crowcroft |
2005-04 |
16 p |
PDF (0.5 MB) |
630 |
Semi-invasive attacks – A new approach to hardware security analysis |
Sergei P. Skorobogatov |
2005-04 |
PhD 144 p |
PDF (11.8 MB) |
629 |
Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing |
Meng How Lim, Adam Greenhalgh, et al. |
2005-04 |
26 p |
PDF (0.4 MB) |
628 |
A formal security policy for an NHS electronic health record service |
Moritz Y. Becker |
2005-03 |
81 p |
PDF (0.6 MB) |
627 |
Efficient computer interfaces using continuous gestures, language models, and speech |
Keith Vertanen |
2005-03 |
MPhil 46 p |
PDF (0.6 MB) |
626 |
Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing |
Meng How Lim, Adam Greenhalgh, et al. |
2005-03 |
28 p |
PDF (0.4 MB) |
625 |
TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification |
Steve Bishop, Matthew Fairbairn, et al. |
2005-03 |
386 p |
PDF (2.5 MB) |
624 |
TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview |
Steve Bishop, Matthew Fairbairn, et al. |
2005-03 |
88 p |
PDF (1.3 MB) |
623 |
Simple polymorphic usage analysis |
Keith Wansbrough |
2005-03 |
PhD 364 p |
PDF (3.1 MB) |
622 |
Cooperation and deviation in market-based resource allocation |
Jörg H. Lepler |
2005-03 |
PhD 173 p |
PDF (2.3 MB) |
621 |
Fresh Objective Caml user manual |
Mark R. Shinwell, Andrew M. Pitts |
2005-02 |
21 p |
PDF (0.2 MB) |
620 |
Middleware support for context-awareness in distributed sensor-driven systems |
Eleftheria Katsiri |
2005-02 |
PhD 176 p |
PDF (1.9 MB) |
619 |
Operating system support for simultaneous multithreaded processors |
James R. Bulpin |
2005-02 |
PhD 130 p |
PDF (1.3 MB) |
618 |
The Fresh Approach: functional programming with names and binders |
Mark R. Shinwell |
2005-02 |
PhD 111 p |
PDF (0.9 MB) |
617 |
Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding |
Augustin Chaintreau, Pan Hui, et al. |
2005-02 |
26 p |
PDF (0.8 MB) |
616 |
Dictionary characteristics in cross-language information retrieval |
Donnla Nic Gearailt |
2005-02 |
PhD 158 p |
PDF (1.2 MB) |
615 |
Global public computing |
Evangelos Kotsovinos |
2005-01 |
PhD 229 p |
PDF (1.8 MB) |
614 |
Pure bigraphs |
Robin Milner |
2005-01 |
66 p |
PDF (0.6 MB) |
613 |
Abstracting application-level security policy for ubiquitous computing |
David J. Scott |
2005-01 |
PhD 186 p |
PDF (2.2 MB) |
612 |
Location privacy in ubiquitous computing |
Alastair R. Beresford |
2005-01 |
PhD 139 p |
PDF (1.9 MB) |
611 |
An heuristic analysis of the classification of bivariate subdivision schemes |
Neil A. Dodgson |
2004-12 |
18 p |
PDF (0.3 MB) |
610 |
Influence of syntax on prosodic boundary prediction |
Tommy Ingulfsen |
2004-12 |
MPhil 49 p |
PDF (0.4 MB) |
609 |
Using camera-phones to interact with context-aware mobile services |
Eleanor Toye, Anil Madhavapeddy, et al. |
2004-12 |
23 p |
PDF (0.4 MB) |
608 |
Trust management for widely distributed systems |
Walt Yao |
2004-11 |
PhD 191 p |
PDF (1.5 MB) |
607 |
Code size optimization for embedded processors |
Neil E. Johnson |
2004-11 |
PhD 159 p |
PDF (1.0 MB) |
606 |
Dynamic binary analysis and instrumentation |
Nicholas Nethercote |
2004-11 |
PhD 177 p |
PDF (1.1 MB) |
605 |
Acute: High-level programming language design for distributed computation : Design rationale and language definition |
Peter Sewell, James J. Leifer, et al. |
2004-10 |
193 p |
PDF (1.2 MB) |
604 |
On the anonymity of anonymity systems |
Andrei Serjantov |
2004-10 |
PhD 162 p |
PDF (0.9 MB) |
603 |
Bigraphs whose names have multiple locality |
Robin Milner |
2004-09 |
15 p |
PDF (0.2 MB) |
602 |
Model checking the AMBA protocol in HOL |
Hasan Amjad |
2004-09 |
27 p |
PDF (0.3 MB) |
601 |
Combining model checking and theorem proving |
Hasan Amjad |
2004-09 |
PhD 131 p |
PDF (0.9 MB) |
600 |
Trust for resource control: Self-enforcing automatic rational contracts between computers |
Brian Ninham Shand |
2004-08 |
PhD 154 p |
PDF (1.1 MB) |
599 |
Further analysis of ternary and 3-point univariate subdivision schemes |
Mohamed F. Hassan |
2004-08 |
9 p |
PDF (0.3 MB) |
598 |
Transition systems, link graphs and Petri nets |
James J. Leifer, Robin Milner |
2004-08 |
64 p |
PDF (0.6 MB) |
597 |
Syntactic simplification and text cohesion |
Advaith Siddharthan |
2004-08 |
PhD 195 p |
PDF (1.3 MB) |
596 |
Reconstructing I/O |
Keir Fraser, Steven Hand, et al. |
2004-08 |
16 p |
PDF (0.3 MB) |
595 |
Representations of quantum operations, with applications to quantum cryptography |
Pablo J. Arrighi |
2004-07 |
PhD 157 p |
PDF (1.0 MB) |
594 |
Designing and attacking anonymous communication systems |
George Danezis |
2004-07 |
PhD 150 p |
PDF (1.5 MB) |
593 |
Paxos at war |
Piotr Zieliński |
2004-06 |
30 p |
PDF (0.3 MB) |
592 |
Unwrapping the Chrysalis |
Mike Bond, Daniel Cvrček, Steven J. Murdoch |
2004-06 |
15 p |
PDF (0.4 MB) |
591 |
Conversion of notations |
Silas S. Brown |
2004-06 |
PhD 159 p |
PDF (2.4 MB) |
590 |
Hermes: A scalable event-based middleware |
Peter R. Pietzuch |
2004-06 |
PhD 180 p |
PDF (1.6 MB) |
589 |
new-HOPLA — a higher-order process language with name generation |
Glynn Winskel, Francesco Zappa Nardelli |
2004-05 |
16 p |
PDF (0.3 MB) |
588 |
MulTEP: A MultiThreaded Embedded Processor |
Panit Watcharawitch |
2004-05 |
PhD 190 p |
PDF (3.6 MB) |
587 |
Verification of asynchronous circuits |
Paul Alexander Cunningham |
2004-04 |
PhD 174 p |
PDF (1.5 MB) |
586 |
Role-based access control policy administration |
András Belokosztolszki |
2004-03 |
PhD 170 p |
PDF (2.6 MB) |
585 |
Personal projected displays |
Mark S. D. Ashdown |
2004-03 |
PhD 150 p |
PDF (3.4 MB) |
584 |
Concise texture editing |
Stephen Brooks |
2004-03 |
PhD 164 p |
PDF (20.0 MB) |
583 |
Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes |
Cédric Gérot, Loïc Barthe, et al. |
2004-03 |
68 p |
PDF (0.5 MB) |
582 |
Latency-optimal Uniform Atomic Broadcast algorithm |
Piotr Zieliński |
2004-02 |
28 p |
PDF (0.3 MB) |
581 |
Axioms for bigraphical structure |
Robin Milner |
2004-02 |
26 p |
PDF (0.3 MB) |
580 |
Bigraphs and mobile processes (revised) |
Ole Høgh Jensen, Robin Milner |
2004-02 |
131 p |
PDF (1.0 MB) |
579 |
Practical lock-freedom |
Keir Fraser |
2004-02 |
PhD 116 p |
PDF (0.7 MB) |
578 |
Linear types for packet processing (extended version) |
Robert Ennals, Richard Sharp, Alan Mycroft |
2004-01 |
31 p |
PDF (0.3 MB) |
577 |
Compromising emanations: eavesdropping risks of computer displays |
Markus G. Kuhn |
2003-12 |
PhD 167 p |
PDF (8.4 MB) |
576 |
An implementation of a coordinate based location system |
David R. Spence |
2003-11 |
12 p |
PDF (0.9 MB) |
575 |
Reconfigurable wavelength-switched optical networks for the Internet core |
Tim Granger |
2003-11 |
PhD 184 p colour |
PDF (2.5 MB) |
574 |
Sketchpad: A man-machine graphical communication system |
Ivan Edward Sutherland |
2003-09 |
PhD 149 p |
PDF (4.1 MB) |
573 |
Mechanizing compositional reasoning for concurrent systems: some lessons |
Lawrence C. Paulson |
2003-08 |
20 p |
PDF (0.3 MB) |
572 |
Design choices for language-based transactions |
Tim Harris |
2003-08 |
7 p |
PDF (0.2 MB) |
571 |
Multi-layer network monitoring and analysis |
James Hall |
2003-07 |
PhD 230 p colour |
PDF (2.8 MB) |
570 |
Bigraphs and mobile processes |
Ole Høgh Jensen, Robin Milner |
2003-07 |
121 p |
PDF (0.9 MB) |
569 |
Global abstraction-safe marshalling with hash types |
James J. Leifer, Gilles Peskine, et al. |
2003-06 |
86 p |
PDF (0.8 MB) |
568 |
Dynamic rebinding for marshalling and update, with destruct-time λ |
Gavin Bierman, Michael Hicks, et al. |
2004-02 |
85 p |
PDF (0.7 MB) |
567 |
Using inequalities as term ordering constraints |
Joe Hurd |
2003-06 |
17 p |
PDF (0.3 MB) |
566 |
Formal verification of probabilistic algorithms |
Joe Hurd |
2003-05 |
PhD 154 p |
PDF (0.9 MB) |
565 |
Fast Marching farthest point sampling for point clouds and implicit surfaces |
Carsten Moenning, Neil A. Dodgson |
2003-05 |
15 p |
PDF (0.5 MB) |
564 |
Access policies for middleware |
Ulrich Lang |
2003-05 |
PhD 138 p |
PDF (0.8 MB) |
563 |
MJ: An imperative core calculus for Java and Java with effects |
G.M. Bierman, M.J. Parkinson, A.M. Pitts |
2003-04 |
53 p |
PDF (0.5 MB) |
562 |
Fast Marching farthest point sampling |
Carsten Moenning, Neil A. Dodgson |
2003-04 |
16 p |
PDF (0.5 MB) |
561 |
Resource control of untrusted code in an open network environment |
Paul B. Menage |
2003-03 |
PhD 185 p colour |
PDF (1.1 MB) |
560 |
Decimalisation table attacks for PIN cracking |
Mike Bond, Piotr Zieliński |
2003-02 |
14 p |
PDF (0.2 MB) |
559 |
Pronto: MobileGateway with publish-subscribe paradigm over wireless network |
Eiko Yoneki, Jean Bacon |
2003-02 |
22 p |
PDF (0.5 MB) |
558 |
A role and context based security model |
Yolanta Beresnevichiene |
2003-01 |
PhD 89 p |
PDF (0.5 MB) |
557 |
Iota: A concurrent XML scripting language with applications to Home Area Networking |
G.M. Bierman, P. Sewell |
2003-01 |
32 p |
PDF (0.3 MB) |
556 |
Turing Switches – Turing machines for all-optical Internet routing |
Jon Crowcroft |
2003-01 |
7 p |
PDF (0.2 MB) |
555 |
BOURSE – Broadband Organisation of Unregulated Radio Systems through Economics |
Jon Crowcroft, Richard Gibbens, Stephen Hailes |
2003-01 |
10 p |
PDF (0.2 MB) |
554 |
Towards a field theory for networks |
Jon Crowcroft |
2003-01 |
9 p |
PDF (0.4 MB) |
553 |
Xen 2002 |
Paul R. Barham, Boris Dragovic, et al. |
2003-01 |
15 p |
PDF (0.2 MB) |
552 |
The Xenoserver computing infrastructure |
Keir A. Fraser, Steven M. Hand, et al. |
2003-01 |
11 p |
PDF (0.2 MB) |
551 |
The relative consistency of the axiom of choice — mechanized using Isabelle/ZF |
Lawrence C. Paulson |
2002-12 |
63 p |
PDF (0.4 MB) |
550 |
Computer security – a layperson’s guide, from the bottom up |
Karen Spärck Jones |
2002-06 |
23 p |
PDF (0.2 MB) |
549 |
Two remarks on public key cryptology |
Ross Anderson |
2002-12 |
7 p |
PDF (0.2 MB) |
548 |
Formal verification of the ARM6 micro-architecture |
Anthony Fox |
2002-11 |
59 p |
PDF (0.5 MB) |
547 |
Semantic optimization of OQL queries |
Agathoniki Trigoni |
2002-10 |
PhD 171 p |
PDF (1.2 MB) |
546 |
Depth perception in computer graphics |
Jonathan David Pfautz |
2002-09 |
PhD 182 p |
PDF (2.0 MB) |
545 |
A HOL specification of the ARM instruction set architecture |
Anthony C.J. Fox |
2001-06 |
45 p |
PDF (0.4 MB) |
544 |
On the support of recursive subdivision |
I.P. Ivrissimtzis, M.A. Sabin, N.A. Dodgson |
2002-09 |
20 p |
PDF (4.0 MB) |
543 |
Evaluating similarity-based visualisations as interfaces for image browsing |
Kerry Rodden |
2002-09 |
PhD 248 p colour |
PDF (8.3 MB) |
542 |
A generative classification of mesh refinement rules with lattice transformations |
I.P. Ivrissimtzis, N.A. Dodgson, M.A. Sabin |
2002-09 |
13 p |
PDF (0.2 MB) |
541 |
Different applications of two-dimensional potential fields for volume modeling |
L. Barthe, N.A. Dodgson, et al. |
2002-08 |
26 p |
PDF (1.9 MB) |
540 |
The use of computer graphics rendering software in the analysis of a novel autostereoscopic display design |
N.A. Dodgson, J.R. Moore |
2002-08 |
6 p |
PDF (0.2 MB) |
539 |
Towards a ternary interpolating subdivision scheme for the triangular mesh |
N.A. Dodgson, M.A. Sabin, et al. |
2002-07 |
12 p |
PDF (0.2 MB) |
538 |
The Escritoire: A personal projected display for interacting with documents |
Mark Ashdown, Peter Robinson |
2002-06 |
12 p |
PDF (0.5 MB) |
537 |
Parallel systems in symbolic and algebraic computation |
Mantsika Matooane |
2002-06 |
PhD 139 p |
PDF (0.8 MB) |
536 |
Low temperature data remanence in static RAM |
Sergei Skorobogatov |
2002-06 |
9 p |
PDF (0.6 MB) |
535 |
Designs, disputes and strategies |
Claudia Faggian, Martin Hyland |
2002-05 |
21 p |
PDF (0.3 MB) |
534 |
Resource control in network elements |
Austin Donnelly |
2002-04 |
PhD 183 p |
PDF (1.0 MB) |
533 |
The acquisition of a unification-based generalised categorial grammar |
Aline Villavicencio |
2002-04 |
PhD 223 p |
PDF (2.2 MB) |
532 |
Internet traffic engineering |
Richard Mortier |
2002-04 |
PhD 129 p |
PDF (0.8 MB) |
531 |
Verifying the SET registration protocols |
Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson |
2002-03 |
24 p |
PDF (0.4 MB) |
530 |
Subcategorization acquisition |
Anna Korhonen |
2002-02 |
PhD 189 p |
PDF (1.1 MB) |
529 |
The triVM intermediate language reference manual |
Neil Johnson |
2002-02 |
83 p |
PDF (0.4 MB) |
528 |
Measurement-based management of network resources |
Andrew William Moore |
2002-04 |
PhD 273 p |
PDF (1.7 MB) |
527 |
Architectures for ubiquitous systems |
Umar Saif |
2002-01 |
PhD 271 p |
PDF (2.4 MB) |
526 |
Extending lossless image compression |
Andrew J. Penrose |
2001-12 |
PhD 137 p |
PDF (5.3 MB) |
525 |
Extensible virtual machines |
Timothy L. Harris |
2001-12 |
PhD 209 p |
PDF (0.8 MB) |
524 |
Verifying the SET purchase protocols |
Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson |
2001-11 |
14 p |
PDF (0.2 MB) |
523 |
Bigraphical reactive systems: basic theory |
Robin Milner |
2001-09 |
87 p |
PDF (1.7 MB) |
522 |
Practical behavioural animation based on vision and attention |
Mark F.P. Gillies |
2001-09 |
187 p |
PDF (11.7 MB) PS (10.1 MB) |
521 |
Operational congruences for reactive systems |
James Leifer |
2001-09 |
PhD 144 p |
PS (0.9 MB) |
520 |
Ternary and three-point univariate subdivision schemes |
Mohamed Hassan, Neil A. Dodgson |
2001-09 |
8 p |
PDF (0.1 MB) |
519 |
Local evidence in document retrieval |
Martin Choquette |
2001-08 |
PhD 177 p |
|
518 |
An attack on a traitor tracing scheme |
Jeff Jianxin Yan, Yongdong Wu |
2001-07 |
14 p |
PDF (0.2 MB) |
517 |
The Cambridge Multimedia Document Retrieval Project: summary of experiments |
Karen Spärck Jones, P. Jourlin, et al. |
2001-07 |
30 p |
PS (0.1 MB) DVI (0.0 MB) |
516 |
Dynamic provisioning of resource-assured and programmable virtual private networks |
Rebecca Isaacs |
2001-09 |
PhD 145 p |
PS (0.5 MB) |
515 |
The UDP calculus: rigorous semantics for real networking |
Andrei Serjantov, Peter Sewell, Keith Wansbrough |
2001-07 |
70 p |
PS (0.3 MB) |
514 |
Nomadic π-calculi: expressing and verifying communication infrastructure for mobile computation |
Asis Unyapoth |
2001-06 |
PhD 316 p |
PDF (1.3 MB) PS (0.7 MB) |
513 |
Generic summaries for indexing in information retrieval – Detailed test results |
Tetsuya Sakai, Karen Spärck Jones |
2001-05 |
29 p |
PS (0.1 MB) |
512 |
An algebraic framework for modelling and verifying microprocessors using HOL |
Anthony Fox |
2001-03 |
24 p |
PDF (0.3 MB) |
511 |
Software visualization in Prolog |
Calum Grant |
1999-12 |
PhD 193 p |
PDF (2.0 MB) |
510 |
Switchlets and resource-assured MPLS networks |
Richard Mortier, Rebecca Isaacs, Keir Fraser |
2000-05 |
16 p |
PDF (0.1 MB) PS (0.1 MB) |
509 |
Proximity visualisation of abstract data |
Wojciech Basalaj |
2001-01 |
PhD 117 p |
PDF (7.7 MB) |
508 |
Shallow linear action graphs and their embeddings |
James Leifer, Robin Milner |
2000-10 |
16 p |
PS (0.1 MB) |
507 |
Mechanizing a theory of program composition for UNITY |
Lawrence Paulson |
2000-11 |
28 p |
PDF (0.2 MB) |
506 |
Modules, abstract types, and distributed versioning |
Peter Sewell |
2000-09 |
46 p |
PDF (0.4 MB) PS (0.2 MB) DVI (0.1 MB) |
505 |
Models for name-passing processes: interleaving and causal |
Gian Luca Cattani, Peter Sewell |
2000-09 |
42 p |
PDF (0.5 MB) PS (0.2 MB) DVI (0.1 MB) |
504 |
Word sense selection in texts: an integrated model |
Oi Yee Kwong |
2000-09 |
PhD 177 p |
PS (0.6 MB) |
503 |
Hardware/software co-design using functional languages |
Alan Mycroft, Richard Sharp |
2000-09 |
8 p |
PDF (0.1 MB) |
502 |
Formalizing basic number theory |
Thomas Marthedal Rasmussen |
2000-09 |
20 p |
PDF (1.1 MB) |
501 |
Integrated quality of service management |
David Ingram |
2000-09 |
PhD 90 p |
|
500 |
The memorability and security of passwords – some empirical results |
Jianxin Yan, Alan Blackwell, et al. |
2000-09 |
13 p |
PDF (0.2 MB) |
499 |
Enhancing spatial deformation for virtual sculpting |
James Edward Gain |
2000-08 |
PhD 161 p |
PDF (13.4 MB) |
498 |
Applied π – a brief tutorial |
Peter Sewell |
2000-07 |
65 p |
PDF (0.4 MB) PS (0.2 MB) |
497 |
Towards a formal type system for ODMG OQL |
G.M. Bierman, A. Trigoni |
2000-09 |
20 p |
PDF (1.3 MB) |
496 |
Contexts and embeddings for closed shallow action graphs |
Gian Luca Cattani, James J. Leifer, Robin Milner |
2000-07 |
56 p |
PS (0.2 MB) |
495 |
Automatic recognition of words in Arabic manuscripts |
Mohammad S.M. Khorsheed |
2000-07 |
PhD 242 p |
PDF (2.4 MB) |
494 |
An architecture for the notification, storage and retrieval of events |
Mark David Spiteri |
2000-07 |
PhD 165 p |
PDF (12.3 MB) |
493 |
Inductive verification of cryptographic protocols |
Giampaolo Bella |
2000-07 |
PhD 189 p |
PDF (0.8 MB) |
492 |
Nomadic Pict: language and infrastructure design for mobile computation |
Paweł Tomasz Wojciechowski |
2000-06 |
PhD 184 p |
PDF (1.0 MB) PS (0.4 MB) |
491 |
Is hypothesis testing useful for subcategorization acquisition? |
Anna Korhonen, Genevive Gorrell, Diana McCarthy |
2000-05 |
9 p |
PDF (0.8 MB) |
490 |
Selective mesh refinement for rendering |
Peter John Cameron Brown |
2000-04 |
PhD 179 p |
|
489 |
Designing a reliable publishing framework |
Jong-Hyeon Lee |
2000-04 |
PhD 129 p |
PDF (0.9 MB) |
488 |
Formal verification of card-holder registration in SET |
Giampaolo Bella, Fabio Massacci, et al. |
2000-03 |
15 p |
PDF (1.2 MB) |
487 |
Sequential program composition in UNITY |
Tanja Vos, Doaitse Swierstra |
2000-03 |
20 p |
PDF (1.1 MB) |
486 |
Stretching a point: aspect and temporal discourse |
James Richard Thomas |
2000-02 |
PhD 251 p |
|
485 |
Three notes on the interpretation of Verilog |
Daryl Stewart, Myra VanInwegen |
2000-01 |
47 p |
PDF (3.4 MB) |
484 |
Automatic summarising and the CLASP system |
Richard Tucker |
2000-01 |
PhD 190 p |
PDF (0.9 MB) |
483 |
Elastic network control |
Hendrik Jaap Bos |
2000-01 |
PhD 184 p |
|
482 |
Biometric decision landscapes |
John Daugman |
2000-01 |
15 p |
PDF (0.3 MB) |
481 |
Combining the Hol98 proof assistant with the BuDDy BDD package |
Mike Gordon, Ken Friis Larsen |
1999-12 |
71 p |
PDF (3.9 MB) |
480 |
Programming combinations of deduction and BDD-based symbolic calculation |
Mike Gordon |
1999-12 |
24 p |
PDF (1.7 MB) |
479 |
The interaction between fault tolerance and security |
Geraint Price |
1999-12 |
PhD 144 p |
PDF (0.9 MB) |
478 |
Secure composition of untrusted code: wrappers and causality types |
Peter Sewell, Jan Vitek |
1999-11 |
36 p |
PS (0.2 MB) |
477 |
Presheaf models for CCS-like languages |
Gian Luca Cattani, Glynn Winskel |
1999-11 |
46 p |
PDF (2.8 MB) |
476 |
Linking ACL2 and HOL |
Mark Staples |
1999-11 |
23 p |
PDF (1.5 MB) |
475 |
A comparison of state-of-the-art classification techniques with application to cytogenetics |
Boaz Lerner, Neil D. Lawrence |
1999-10 |
34 p |
PDF (1.4 MB) |
474 |
A Bayesian methodology and probability density estimation for fluorescence in-situ hybridization signal classification |
Boaz Lerner |
1999-10 |
31 p |
PDF (1.3 MB) |
473 |
Computer algebra and theorem proving |
Clemens Ballarin |
1999-10 |
PhD 122 p |
PDF (8.6 MB) |
472 |
Simulating music learning with autonomous listening agents: entropy, ambiguity and context |
Ben Y. Reis |
1999-09 |
PhD 200 p |
PDF (16.8 MB) |
471 |
Murphy’s law, the fitness of evolving species, and the limits of software reliability |
Robert M. Brady, Ross J. Anderson, Robin C. Ball |
1999-09 |
14 p |
PDF (0.2 MB) |
470 |
Modular reasoning in Isabelle |
Florian Kammüller |
1999-08 |
PhD 128 p |
PDF (11.3 MB) |
469 |
A combination of geometry theorem proving and nonstandard analysis, with application to Newton’s Principia |
Jacques Désiré Fleuriot |
1999-08 |
PhD 135 p |
PDF (11.7 MB) |
468 |
Synthesis of asynchronous circuits |
Stephen Paul Wilcox |
1999-07 |
PhD 250 p |
PDF (1.7 MB) |
467 |
Mechanizing UNITY in Isabelle |
Lawrence C. Paulson |
1999-06 |
22 p |
PDF (0.3 MB) |
466 |
Automatic signal classification in fluorescence in-situ hybridization images |
Boaz Lerner, William Clocksin, et al. |
1999-05 |
24 p |
PDF (1.2 MB) |
465 |
Gelfish – graphical environment for labelling FISH images |
Boaz Lerner, Seema Dhanjal, Maj Hultén |
1999-05 |
20 p |
PDF (1.3 MB) |
464 |
Feature representation for the automatic analysis of fluorescence in-situ hybridization images |
Boaz Lerner, William Clocksin, et al. |
1999-05 |
36 p |
PDF (1.6 MB) |
463 |
Secure composition of insecure components |
Peter Sewell, Jan Vitek |
1999-04 |
44 p |
PS (0.2 MB) |
462 |
Location-independent communication for mobile agents: a two-level architecture |
Peter Sewell, Paweł T. Wojciechowski, Benjamin C. Pierce |
1999-04 |
31 p |
PS (0.1 MB) |
461 |
Integrating Gandalf and HOL |
Joe Hurd |
1999-03 |
11 p |
PDF (0.2 MB) |
460 |
Message reception in the inductive approach |
Giampaolo Bella |
1999-03 |
16 p |
PDF (0.9 MB) |
459 |
An open parallel architecture for data-intensive applications |
Mohamad Afshar |
1999-07 |
PhD 225 p |
PS (0.8 MB) DVI (0.3 MB) |
458 |
Final coalgebras as greatest fixed points in ZF set theory |
Lawrence C. Paulson |
1999-03 |
25 p |
PDF (0.1 MB) |
457 |
A concurrent object calculus: reduction and typing |
Andrew D. Gordon, Paul D. Hankin |
1999-02 |
63 p |
PDF (3.3 MB) |
456 |
An evaluation based approach to process calculi |
Joshua Robert Xavier Ross |
1999-01 |
PhD 206 p |
PDF (13.5 MB) |
455 |
Multiple modalities |
G.M. Bierman |
1998-12 |
26 p |
PDF (1.3 MB) |
454 |
Parametric polymorphism and operational equivalence |
Andrew M. Pitts |
1998-12 |
39 p |
PDF (2.3 MB) |
453 |
C formalised in HOL |
Michael Norrish |
1998-12 |
PhD 156 p |
PDF (0.8 MB) |
452 |
A formal proof of Sylow’s theorem : An experiment in abstract algebra with Isabelle Hol |
Florian Kammüller, Lawrence C. Paulson |
1998-11 |
30 p |
PDF (0.2 MB) |
451 |
The structure of open ATM control architectures |
Sean Rooney |
1998-11 |
PhD 183 p |
PDF (17.2 MB) |
450 |
Open service support for ATM |
Jacobus Erasmus van der Merwe |
1998-11 |
PhD 164 p |
PDF (15.0 MB) |
449 |
Locales : A sectioning concept for Isabelle |
Florian Kammüller, Markus Wenzel |
1998-10 |
16 p |
PDF (1.2 MB) |
448 |
A computational interpretation of the λμ calculus |
G.M. Bierman |
1998-09 |
10 p |
PDF (1.6 MB) |
447 |
Are timestamps worth the effort? A formal treatment |
Giampaolo Bella, Lawrence C. Paulson |
1998-09 |
12 p |
PDF (0.7 MB) |
446 |
A probabilistic model of information and retrieval: development and status |
K. Spärck Jones, S. Walker, S.E. Robertson |
1998-08 |
74 p |
PS (0.2 MB) DVI (0.1 MB) |
445 |
Secure sessions from weak secrets |
Michael Roe, Bruce Christianson, David Wheeler |
1998-07 |
12 p |
PDF (1.0 MB) |
444 |
From rewrite rules to bisimulation congruences |
Peter Sewell |
1998-05 |
72 p |
PS (0.3 MB) |
443 |
The inductive approach to verifying cryptographic protocols |
Lawrence C. Paulson |
1998-02 |
46 p |
PDF (0.3 MB) PS (0.2 MB) |
442 |
A combination of nonstandard analysis and geometry theorem proving, with application to Newton’s Principia |
Jacques Fleuriot, Lawrence C. Paulson |
1998-01 |
13 p |
PS (0.1 MB) DVI (0.0 MB) |
441 |
A generic tableau prover and its integration with Isabelle |
Lawrence C. Paulson |
1998-01 |
16 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
440 |
Inductive analysis of the internet protocol TLS |
Lawrence C. Paulson |
1997-12 |
19 p |
PDF (0.2 MB) PS (0.1 MB) |
439 |
Applying mobile code to distributed systems |
David A. Halls |
1997-12 |
PhD 158 p |
PDF (14.3 MB) |
438 |
An architecture for scalable and deterministic video servers |
Feng Shi |
1997-11 |
PhD 148 p |
PDF (11.3 MB) |
437 |
Trusting in computer systems |
William S. Harbison |
1997-12 |
PhD 95 p |
PDF (1.6 MB) |
436 |
A new method for estimating optical flow |
W.F. Clocksin |
1997-11 |
20 p |
PDF (1.5 MB) |
435 |
Global/local subtyping for a distributed π-calculus |
Peter Sewell |
1997-08 |
57 p |
PS (0.2 MB) |
434 |
Demonstration programs for CTL and μ-calculus symbolic model checking |
Martin Richards |
1997-08 |
41 p |
PDF (1.8 MB) |
433 |
Backtracking algorithms in MCPL using bit patterns and recursion |
Martin Richards |
1997-07 |
80 p |
PDF (3.8 MB) |
432 |
On two formal analyses of the Yahalom protocol |
Lawrence C. Paulson |
1997-07 |
16 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
431 |
The MCPL programming manual and user guide |
Martin Richards |
1997-07 |
70 p |
PDF (4.0 MB) |
430 |
Video mail retrieval using voice: Report on topic spotting (Deliverable report on VMR task no. 6) |
G.J.F. Jones, J.T. Foote, et al. |
1997-07 |
73 p |
PDF (5.0 MB) |
429 |
Compilation and equivalence of imperative objects |
Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen |
1997-06 |
64 p |
PS (0.2 MB) DVI (0.1 MB) |
428 |
Floating point verification in HOL Light: the exponential function |
John Harrison |
1997-06 |
112 p |
PS (0.3 MB) DVI (0.1 MB) |
427 |
Proving Java type soundness |
Don Syme |
1997-06 |
35 p |
PDF (2.4 MB) |
426 |
Action selection methods using reinforcement learning |
Mark Humphrys |
1997-06 |
PhD 195 p |
PS (0.5 MB) |
425 |
Should your specification language be typed? |
Leslie Lamport, Lawrence C. Paulson |
1997-05 |
30 p |
PDF (0.3 MB) |
424 |
Simplification with renaming: a general proof technique for tableau and sequent-based provers |
Fabio Massacci |
1997-05 |
26 p |
DVI (0.0 MB) |
423 |
Symbol grounding: Learning categorical and sensorimotor predictions for coordination in autonomous robots |
Karl F. MacDorman |
1997-05 |
PhD 170 p |
PDF (16.7 MB) |
422 |
Using the BONITA primitives: a case study |
Antony Rowstron |
1997-05 |
19 p |
PDF (2.0 MB) |
421 |
An abstract dynamic semantics for C |
Michael Norrish |
1997-05 |
31 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
420 |
Managing complex models for computer graphics |
Jonathan Mark Sewell |
1997-04 |
PhD 206 p |
PDF (14.3 MB) |
419 |
Video-augmented environments |
James Quentin Stafford-Fraser |
1997-04 |
PhD 91 p |
PDF (2.4 MB) |
418 |
Mechanized proofs for a recursive authentication protocol |
Lawrence C. Paulson |
1997-03 |
30 p |
PDF (0.2 MB) PS (0.1 MB) |
417 |
Selective mesh refinement for interactive terrain rendering |
Peter J.C. Brown |
1997-02 |
18 p |
PDF (2.7 MB) |
416 |
DECLARE: a prototype declarative proof system for higher order logic |
Donald Syme |
1997-02 |
25 p |
PDF (1.7 MB) |
415 |
Application support for mobile computing |
Steven Leslie Pope |
1997-02 |
PhD 145 p |
PDF (12.0 MB) |
414 |
A calculus for cryptographic protocols : The SPI calculus |
Martín Abadi, Andrew D. Gordon |
1997-01 |
105 p |
PS (0.3 MB) |
413 |
Mechanized proofs of security protocols: Needham-Schroeder with public keys |
Lawrence C. Paulson |
1997-01 |
20 p |
PDF (0.1 MB) PS (0.0 MB) DVI (0.0 MB) |
412 |
Observations on a linear PCF (preliminary report) |
G.M. Bierman |
1997-01 |
30 p |
PDF (1.6 MB) |
411 |
Formalising process calculi in Higher Order Logic |
Monica Nesi |
1997-01 |
PhD 182 p |
PDF (16.7 MB) |
410 |
Proof style |
John Harrison |
1997-01 |
22 p |
PS (0.1 MB) DVI (0.0 MB) |
409 |
Proving properties of security protocols by induction |
Lawrence C. Paulson |
1996-12 |
24 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
408 |
Theorem proving with the real numbers |
John Robert Harrison |
1996-11 |
PhD 147 p |
PS (0.4 MB) DVI (0.3 MB) |
407 |
The L4 microkernel on Alpha : Design and implementation |
Sebastian Schoenberg |
1996-09 |
51 p |
PS (0.1 MB) |
406 |
Tool support for logics of programs |
Lawrence C. Paulson |
1996-11 |
31 p |
PDF (0.3 MB) PS (0.2 MB) |
405 |
A tool to support formal reasoning about computer languages |
Richard J. Boulton |
1996-11 |
21 p |
PS (0.1 MB) DVI (0.0 MB) |
404 |
Adaptive parallelism for computing on heterogeneous clusters |
Kam Hong Shum |
1996-11 |
PhD 147 p |
PDF (12.6 MB) |
403 |
Devices in a multi-service operating system |
Paul Ronald Barham |
1996-10 |
PhD 131 p |
PS (1.6 MB) DVI (0.1 MB) |
402 |
Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments |
G.J.F. Jones, J.T. Foote, et al. |
1996-09 |
21 p |
PDF (1.2 MB) |
401 |
A classical linear λ-calculus |
Gavin Bierman |
1996-07 |
41 p |
PDF (1.9 MB) |
400 |
Monitoring the behaviour of distributed systems |
Scarlet Schwiderski |
1996-07 |
PhD 161 p |
PDF (1.0 MB) |
399 |
OASIS: An open architecture for secure interworking services |
Richard Hayton |
1996-06 |
PhD 102 p |
PDF (0.9 MB) |
398 |
Design and implementation of an autostereoscopic camera system |
N.A. Dodgson, J.R. Moore |
1996-06 |
20 p |
PDF (0.3 MB) |
397 |
Optimal routing in 2-jump circulant networks |
Borut Robič |
1996-06 |
7 p |
PS (0.1 MB) |
396 |
Generic automatic proof tools |
Lawrence C. Paulson |
1996-05 |
28 p |
PDF (0.2 MB) PS (0.1 MB) |
395 |
Cut-elimination for full intuitionistic linear logic |
Torben Bräuner, Valeria de Paiva |
1996-05 |
27 p |
PDF (1.4 MB) |
394 |
A simple formalization and proof for the mutilated chess board |
Lawrence C. Paulson |
1996-04 |
11 p |
PDF (0.1 MB) PS (0.0 MB) DVI (0.0 MB) |
393 |
Performance management in ATM networks |
Simon Andrew Crosby |
1996-04 |
PhD 215 p |
PS (0.9 MB) |
392 |
Decoding choice encodings |
Uwe Nestmann, Benjamin C. Pierce |
1996-04 |
54 p |
PDF (3.7 MB) |
391 |
Programming languages and dimensions |
Andrew John Kennedy |
1996-04 |
PhD 149 p |
PDF (0.9 MB) |
390 |
Syn: a single language for specifiying abstract syntax tress, lexical analysis, parsing and pretty-printing |
Richard J. Boulton |
1996-03 |
25 p |
PS (0.1 MB) DVI (0.0 MB) |
389 |
A proof checked for HOL |
Wai Wong |
1996-03 |
165 p |
PDF (11.6 MB) |
388 |
A unified approach to strictness analysis and optimising transformations |
P.N. Benton |
1996-02 |
21 p |
PDF (1.7 MB) |
387 |
Monitoring composite events in distributed systems |
Scarlet Schwiderski, Andrew Herbert, Ken Moody |
1996-02 |
20 p |
PDF (1.7 MB) |
386 |
Bisimilarity for a first-order calculus of objects with subtyping |
Andrew D. Gordon, Gareth D. Rees |
1996-01 |
78 p |
|
385 |
Performance evaluation of the Delphi machine |
Sanjay Saraswat |
1995-12 |
PhD 187 p |
|
384 |
Securing ATM networks |
Shaw-Cheng Chuang |
1995-01 |
30 p |
PS (0.2 MB) |
383 |
Management of replicated data in large scale systems |
Noha Adly |
1995-11 |
PhD 182 p |
PDF (18.2 MB) |
382 |
Synthetic image generation for a multiple-view autostereo display |
Oliver M. Castle |
1995-10 |
PhD 184 p |
|
381 |
Rendering for free form deformations |
Uwe Michael Nimscheck |
1995-10 |
PhD 151 p |
PDF (29.1 MB) |
380 |
Quality-of-Service issues in networking environments |
Burkhard Stiller |
1995-09 |
68 p |
PS (0.2 MB) |
379 |
Proceedings of the First Isabelle Users Workshop |
Lawrence Paulson |
1995-09 |
265 p |
|
378 |
Performance evaluation of HARP: a hierarchical asynchronous replication protocol for large scale system |
Noha Adly |
1995-08 |
94 p |
PS (0.3 MB) |
377 |
Mechanising set theory: cardinal arithmetic and the axiom of choice |
Larry Paulson, Krzysztof Grabczewski |
1995-07 |
33 p |
PDF (0.3 MB) PS (0.1 MB) |
376 |
The structure of a multi-service operating system |
Timothy Roscoe |
1995-08 |
PhD 113 p |
PS (0.4 MB) |
375 |
Restructuring virtual memory to support distributed computing environments |
Feng Huang |
1995-07 |
PhD 145 p |
PDF (13.0 MB) |
374 |
A framework for QoS updates in a networking environment |
Burkhard Stiller |
1995-07 |
|
PS (0.1 MB) |
373 |
Natural-language processing and requirements specifications |
Benjamín Macías, Stephen G. Pulman |
1995-07 |
73 p |
PDF (4.9 MB) |
372 |
A brief history of mobile telephony |
Stefan G. Hild |
1995-01 |
19 p |
PDF (1.6 MB) |
371 |
LIMINF convergence in Ω-categories |
Kim Ritter Wagner |
1995-06 |
28 p |
PDF (1.9 MB) |
370 |
A package for non-primitive recursive function definitions in HOL |
Sten Agerholm |
1995-07 |
36 p |
PDF (2.1 MB) |
369 |
A comparison of HOL-ST and Isabelle/ZF |
Sten Agerholm |
1995-07 |
23 p |
PDF (1.8 MB) |
368 |
CogPiT – configuration of protocols in TIP |
Burkhard Stiller |
1995-06 |
73 p |
PS (0.2 MB) |
367 |
Categorical logic |
Andrew M. Pitts |
1995-05 |
94 p |
PS (0.3 MB) DVI (0.1 MB) |
366 |
Retrieving spoken documents: VMR Project experiments |
K. Spärck Jones, G.J.F. Jones, et al. |
1995-05 |
28 p |
PDF (3.0 MB) |
365 |
Computational types from a logical perspective I |
P.N. Benton, G.M. Bierman, V.C.V. de Paiva |
1995-05 |
19 p |
PDF (1.1 MB) |
364 |
The Church-Rosser theorem in Isabelle: a proof porting experiment |
Ole Rasmussen |
1995-04 |
27 p |
PS (0.1 MB) |
363 |
Names and higher-order functions |
Ian Stark |
1995-04 |
PhD 140 p |
PS (0.3 MB) DVI (0.2 MB) |
362 |
W-learning: competition among selfish Q-learners |
Mark Humphrys |
1995-04 |
30 p |
PS (0.1 MB) |
361 |
Explicit network scheduling |
Richard John Black |
1995-04 |
PhD 121 p |
PS (0.3 MB) |
360 |
On the calculation of explicit polymetres |
W.F. Clocksin |
1995-03 |
12 p |
PDF (0.8 MB) |
359 |
A case study of co-induction in Isabelle |
Jacob Frost |
1995-02 |
48 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.1 MB) |
358 |
Multithreaded processor design |
Simon William Moore |
1995-02 |
PhD 125 p |
PDF (10.0 MB) |
357 |
Seven more myths of formal methods |
Jonathan P. Bowen, Michael G. Hinchey |
1994-12 |
12 p |
PDF (1.2 MB) |
356 |
Simple, proven approaches to text retrieval |
S.E. Robertson, K. Spärck Jones |
1994-12 |
8 p |
PDF (0.2 MB) |
355 |
Two cryptographic notes |
David Wheeler, Roger Needham |
1994-11 |
6 p |
PDF (0.4 MB) |
354 |
Formalising a model of the λ-calculus in HOL-ST |
Sten Agerholm |
1994-11 |
31 p |
PDF (1.5 MB) |
353 |
Merging HOL with set theory |
Mike Gordon |
1994-11 |
40 p |
PDF (1.5 MB) |
352 |
A mixed linear and non-linear logic: proofs, terms and models |
P.N. Benton |
1994-10 |
65 p |
PDF (4.7 MB) |
351 |
Handling realtime traffic in mobile networks |
Subir Kumar Biswas |
1994-09 |
PhD 198 p |
PS (0.5 MB) |
350 |
Ten commandments of formal methods |
Jonathan P. Bowen, Michael G. Hinchey |
1994-09 |
18 p |
PDF (1.7 MB) |
349 |
A HOL interpretation of Noden |
Brian Graham |
1994-09 |
78 p |
|
348 |
Integrated sound synchronisation for computer animation |
Jane Louise Hunter |
1994-08 |
PhD 248 p |
|
347 |
Reflections on TREC |
Karen Spärck Jones |
1994-07 |
35 p |
PS (0.1 MB) DVI (0.1 MB) |
346 |
On intuitionistic linear logic |
G.M. Bierman |
1994-08 |
PhD 191 p |
PDF (12.6 MB) |
345 |
A proof environment for arithmetic with the Omega rule |
Siani L. Baker |
1994-08 |
17 p |
PDF (1.4 MB) |
344 |
The contour tree image encoding technique and file format |
Martin John Turner |
1994-07 |
PhD 154 p |
PDF (169.4 MB) |
342 |
An architecture for distributed user interfaces |
Stephen Martin Guy Freeman |
1994-07 |
PhD 127 p |
PDF (8.1 MB) |
341 |
Presentation support for distributed multimedia applications |
John Bates |
1994-06 |
140 p |
PS (0.8 MB) |
340 |
Operating system support for quality of service |
Eoin Andrew Hyden |
1994-06 |
PhD 102 p |
PDF (1.1 MB) |
339 |
Belief revision and dialogue management in information retrieval |
Brian Logan, Steven Reece, et al. |
1994-05 |
227 p |
PDF (13.3 MB) |
338 |
A new approach to implementing atomic data types |
Zhixue Wu |
1994-05 |
PhD 170 p |
PDF (10.2 MB) |
337 |
Efficiency in a fully-expansive theorem prover |
Richard John Boulton |
1994-05 |
PhD 126 p |
DVI (0.2 MB) |
336 |
Towards a proof theory of rewriting: the simply-typed 2-λ calculus |
Barnaby P. Hilken |
1994-05 |
28 p |
PDF (1.7 MB) |
335 |
Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) |
G.J.F. Jones, J.T. Foote, et al. |
1994-04 |
38 p |
PDF (1.7 MB) |
334 |
A concrete final coalgebra theorem for ZF set theory |
Lawrence C. Paulson |
1994-05 |
21 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
333 |
What is a categorical model of intuitionistic linear logic? |
G.M. Bierman |
1994-04 |
15 p |
PDF (0.9 MB) |
332 |
Distributed computing with objects |
David Martin Evers |
1994-03 |
PhD 154 p |
PDF (9.1 MB) |
331 |
HPP: a hierarchical propagation protocol for large scale replication in wide area networks |
Noha Adly, Akhil Kumar |
1994-03 |
24 p |
PDF (1.7 MB) |
330 |
Interacting with paper on the DigitalDesk |
Pierre David Wellner |
1994-03 |
PhD 96 p |
PDF (3.8 MB) |
329 |
The formal verification of the Fairisle ATM switching element |
Paul Curzon |
1994-03 |
105 p |
PDF (6.7 MB) |
328 |
The formal verification of the Fairisle ATM switching element: an overview |
Paul Curzon |
1994-03 |
46 p |
PDF (4.7 MB) |
327 |
A new application for explanation-based generalisation within automated deduction |
Siani L. Baker |
1994-02 |
18 p |
PDF (1.5 MB) |
326 |
A modular and extensible network storage architecture |
Sai-Lai Lo |
1994-01 |
PhD 147 p |
PS (0.3 MB) |
325 |
The temporal properties of English conditionals and modals |
Richard Crouch |
1994-01 |
PhD 248 p |
PDF (16.2 MB) |
324 |
Verifying modular programs in HOL |
J. von Wright |
1994-01 |
25 p |
PDF (1.3 MB) |
323 |
Representing higher-order logic proofs in HOL |
J. von Wright |
1994-01 |
28 p |
PDF (1.5 MB) |
322 |
Supporting distributed realtime computing |
Guangxing Li |
1993-12 |
PhD 113 p |
PDF (10.7 MB) |
321 |
Relational properties of domains |
Andrew M. Pitts |
1993-12 |
38 p |
PS (0.2 MB) |
320 |
A fixedpoint approach to implementing (co)inductive definitions (updated version) |
Lawrence C. Paulson |
1995-07 |
29 p |
PDF (0.2 MB) DVI (0.0 MB) |
319 |
A workstation architecture to support multimedia |
Mark David Hayter |
1993-11 |
PhD 99 p |
PS (0.7 MB) |
318 |
A method of program refinement |
Jim Grundy |
1993-11 |
PhD 207 p |
PS (0.3 MB) |
317 |
Femto-VHDL: the semantics of a subset of VHDL and its embedding in the HOL proof assistant |
John Peter Van Tassel |
1993-11 |
PhD 122 p |
PDF (7.3 MB) |
316 |
The Compleat LKB |
Ann Copestake |
1993-08 |
126 p |
PS (0.3 MB) |
315 |
Strategy generation and evaluation for meta-game playing |
Barney Darryl Pell |
1993-11 |
PhD 289 p |
PS (0.4 MB) |
314 |
Practical unification-based parsing of natural language |
John Andrew Carroll |
(1993) |
PhD 173 p |
PS (0.3 MB) |
313 |
Proof by pointing |
Yves Bertot, Gilles Kahn, Laurent Théry |
1993-10 |
27 p |
PDF (1.7 MB) |
312 |
Set theory for verification: II : Induction and recursion |
Lawrence C. Paulson |
1993-09 |
46 p |
PDF (0.3 MB) |
311 |
A verified Vista implementation |
Paul Curzon |
1993-09 |
56 p |
PDF (5.6 MB) |
310 |
HARP: a hierarchical asynchronous replication protocol for massively replicated systems |
Noha Adly |
1993-08 |
34 p |
PS (0.1 MB) |
309 |
Strictness analysis of lazy functional programs |
Peter Nicholas Benton |
1993-08 |
PhD 154 p |
PDF (13.3 MB) |
308 |
A case study of co-induction in Isabelle HOL |
Jacob Frost |
1993-08 |
27 p |
PDF (0.2 MB) PS (0.1 MB) DVI (0.0 MB) |
307 |
Natural language processing for information retrieval |
David D. Lewis, Karen Spärck Jones |
1993-07 |
22 p |
PS (0.1 MB) |
306 |
Recording HOL proofs |
Wai Wong |
1993-07 |
57 p |
PDF (3.8 MB) |
305 |
Strong normalisation for the linear term calculus |
P.N. Benton |
1993-07 |
13 p |
PDF (0.6 MB) |
304 |
Co-induction and co-recursion in higher-order logic |
Lawrence C. Paulson |
1993-07 |
35 p |
PDF (0.3 MB) PS (0.1 MB) DVI (0.1 MB) |
303 |
Drawing trees — a case study in functional programming |
Andrew Kennedy |
1993-06 |
9 p |
PDF (0.6 MB) |
302 |
Logic programming for general game-playing |
Barney Pell |
1993-06 |
15 p |
PS (0.0 MB) |
301 |
The dual-level validation concurrency control method |
Zhixue Wu, Ken Moody, Jean Bacon |
1993-06 |
24 p |
PDF (1.6 MB) |
300 |
Formal verification of VIPER’s ALU |
Wai Wong |
1993-04 |
78 p |
PDF (5.4 MB) |
299 |
Pragmatic reasoning in bridge |
Bjorn Gamback, Manny Rayner, Barney Pell |
1993-04 |
23 p |
PS (0.1 MB) |
298 |
Multicast in the asynchronous transfer mode environment |
John Matthew Simon Doar |
1993-04 |
PhD 168 p |
PS (0.5 MB) |
297 |
Categorical abstract machines for higher-order typed lambda calculi |
Eike Ritter |
1993-04 |
PhD 149 p |
PDF (11.5 MB) |
296 |
A persistent programming language for multimedia databases in the OPERA project |
Z. Wu, K. Moody, J. Bacon |
1993-04 |
9 p |
PDF (1.0 MB) |
295 |
OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment |
Jean Bacon, John Bates, et al. |
1993-04 |
12 p |
PDF (1.0 MB) |
294 |
OPERA : Storage, programming and display of multimedia objects |
Ken Moody, Jean Bacon, et al. |
1993-04 |
9 p |
PDF (0.9 MB) |
293 |
Objects and transactions for modelling distributed applications: concurrency control and commitment |
Jean Bacon, Ken Moody |
1993-04 |
39 p |
PDF (3.5 MB) |
292 |
Synchronisation services for digital continuous media |
Cormac John Sreenan |
1993-03 |
PhD 123 p |
PS (0.3 MB) |
291 |
Evaluating natural language processing systems |
J.R. Galliers, K. Spärck Jones |
1993-02 |
187 p |
PS (0.2 MB) |
290 |
Discourse modelling for automatic summarising |
Karen Spärck Jones |
1993-02 |
30 p |
PDF (1.9 MB) |
289 |
The semantics of noun phrase anaphora |
David Alan Howard Elworthy |
1993-02 |
PhD 191 p |
PDF (13.9 MB) |
288 |
Cut-free sequent and tableau systems for propositional Diodorean modal logics |
Rajeev Gore |
1993-02 |
19 p |
PDF (1.3 MB) |
287 |
A mechanised definition of Silage in HOL |
Andrew D. Gordon |
1993-02 |
28 p |
DVI (0.0 MB) |
286 |
Isabelle’s object-logics |
Lawrence C. Paulson |
1993-02 |
161 p |
DVI (0.2 MB) |
285 |
Functional programming and input/output |
Andrew Donald Gordon |
1993-02 |
PhD 163 p |
|
284 |
The Alvey Natural Language Tools grammar (4th Release) |
Claire Grover, John Carroll, Ted Briscoe |
1993-01 |
260 p |
|
283 |
The Isabelle reference manual |
Lawrence C. Paulson |
1993-02 |
78 p |
DVI (0.2 MB) |
282 |
Pegasus – Operating system support for distributed multimedia systems |
Ian M. Leslie, Derek McAuley, Sape J. Mullender |
1992-12 |
14 p |
|
281 |
Pegasus project description |
Sape J. Mullender, Ian M. Leslie, Derek McAuley |
1992-09 |
23 p |
|
280 |
Introduction to Isabelle |
Lawrence C. Paulson |
1993-01 |
61 p |
DVI (0.1 MB) |
279 |
The transition assertions specification method |
Victor A. Carreño |
1992-12 |
18 p |
PDF (1.2 MB) |
278 |
A formalization of the process algebra CCS in high order logic |
Monica Nesi |
(1992) |
42 p |
PDF (2.1 MB) |
277 |
METAGAME in symmetric chess-like games |
Barney Pell |
(1992) |
30 p |
PS (0.1 MB) |
276 |
METAGAME: a new challenge for games and learning |
Barney Pell |
(1992) |
15 p |
PS (0.0 MB) |
275 |
Exploratory learning in the game of GO |
Barney Pell |
(1992) |
18 p |
PS (0.0 MB) |
274 |
Of what use is a verified compiler specification? |
Paul Curzon |
1992-11 |
23 p |
PDF (1.8 MB) |
273 |
TouringMachines: an architecture for dynamic, rational, mobile agents |
Innes A. Ferguson |
1992-11 |
PhD 206 p |
PDF (2.0 MB) PS (0.4 MB) |
272 |
Interactive program derivation |
Martin David Coen |
1992-11 |
PhD 100 p |
PDF (0.6 MB) DVI (0.1 MB) |
271 |
Set theory as a computational logic: I. from foundations to functions |
Lawrence C. Paulson |
1992-11 |
28 p |
PDF (0.3 MB) DVI (0.0 MB) |
270 |
Designing a universal name service |
Chaoying Ma |
(1992) |
PhD 133 p |
PDF (6.8 MB) |
269 |
Optimising compilation |
Alan Mycroft, Arthur Norman |
1992-10 |
23 p |
PDF (2.2 MB) |
268 |
Network file server design for continuous media |
Paul W. Jardetzky |
1992-10 |
PhD 101 p |
PS (0.3 MB) |
267 |
Untyped strictness analysis |
Christine Ernoult, Alan Mycroft |
1992-10 |
13 p |
PDF (0.9 MB) |
266 |
Automatic exploitation of OR-parallelism in Prolog |
Carole Klein |
1992-09 |
18 p |
PDF (0.8 MB) |
265 |
Reasoning with inductively defined relations in the HOL theorem prover |
Juanito Camilleri, Tom Melham |
1992-08 |
49 p |
|
264 |
CCS with environmental guards |
Juanito Camilleri |
1992-08 |
19 p |
PDF (1.2 MB) |
263 |
The Lazy Lambda Calculus: an investigation into the foundations of functional programming |
C.-H. Luke Ong |
1992-08 |
PhD 256 p |
|
262 |
Term assignment for intuitionistic linear logic (preliminary report) |
Nick Benton, Gavin Bierman, Valeria de Paiva |
1992-08 |
57 p |
PDF (1.9 MB) |
261 |
Image resampling |
Neil Anthony Dodgson |
1992-08 |
PhD 264 p |
PDF (5.1 MB) |
260 |
Local computation of alternating fixed-points |
Henrik Reif Anderson |
1992-06 |
21 p |
PDF (1.4 MB) |
259 |
Full abstraction in the Lazy Lambda Calculus |
Samson Abramsky, C.-H. Luke Ong |
(1992) |
104 p |
|
258 |
Two papers on ATM networks |
David J. Greaves, Derek McAuley, Leslie J. French |
1992-05 |
22 p |
PDF (1.7 MB) |
257 |
Cut-free sequent and tableau systems for propositional normal modal logics |
Rajeev Prakhakar Goré |
1992-05 |
160 p |
PDF (9.7 MB) |
256 |
MCPL programming manual |
Martin Richards |
1992-05 |
32 p |
PDF (1.5 MB) |
255 |
The formal verification of hard real-time systems |
Rachel Mary Cardell-Oliver |
1992 |
PhD 151 p |
|
254 |
A HOL semantics for a subset of ELLA |
Richard J. Boulton |
1992-04 |
104 p |
DVI (0.1 MB) |
253 |
The (other) Cambridge ACQUILEX papers |
Antonio Sanfilippo |
(1992) |
141 p |
|
252 |
A co-induction principle for recursively defined domains |
Andrew M. Pitts |
(1992) |
25 p |
PS (0.1 MB) |
251 |
Multipoint digital video communications |
Xiaofeng Jiang |
1992-04 |
PhD 124 p |
PDF (19.7 MB) |
250 |
TouringMachines: autonomous agents with attitudes |
Innes A. Ferguson |
1992-04 |
19 p |
PS (0.1 MB) |
249 |
A formalisation of the VHDL simulation cycle |
John P. Van Tassel |
1992-03 |
24 p |
PDF (1.2 MB) |
248 |
On efficiency in theorem provers which fully expand proofs into primitive inferences |
Richard J. Boulton |
1992-02 |
23 p |
DVI (0.0 MB) |
247 |
Programming metalogics with a fixpoint type |
Roy Luis Crole |
1992-02 |
PhD 164 p |
PDF (7.5 MB) |
246 |
A relevance-based utterance processing system |
Victor Poznański |
1992-02 |
PhD 295 p |
PDF (18.5 MB) |
245 |
System support for multi-service traffic |
Michael J. Dixon |
1992-01 |
PhD 108 p |
PDF (7.3 MB) |
244 |
A mechanized theory of the π-calculus in HOL |
T.F. Melham |
1992-01 |
31 p |
PDF (2.0 MB) |
243 |
Automating the librarian: a fundamental approach using belief revision |
Alison Cawsey, Julia Galliers, et al. |
1992-01 |
39 p |
PDF (3.1 MB) |
242 |
An object-oriented approach to virtual memory management |
Glenford Ezra Mapp |
1992-01 |
PhD 150 p |
PDF (6.6 MB) |
241 |
Learning in large state spaces with an application to biped robot walking |
Thomas Ulrich Vogel |
1991-12 |
PhD 204 p |
PDF (13.9 MB) |
240 |
Symbolic compilation and execution of programs by proof: a case study in HOL |
Juanito Camilleri |
1991-12 |
31 p |
PDF (1.9 MB) |
239 |
Planning multisentential English text using communicative acts |
Mark Thomas Maybury |
1991-12 |
PhD 329 p |
PDF (26.8 MB) |
238 |
Proceedings of the ACQUILEX Workshop on Default Inheritance in the lexicon |
Ted Briscoe, Ann Copestake, Valeria de Paiva |
1991-10 |
180 p |
PDF (18.9 MB) |
237 |
Computing presuppositions in an incremantal language processing system |
Derek G. Bridge |
(1991) |
PhD 212 p |
PDF (25.0 MB) |
236 |
Using knowledge of purpose and knowledge of structure as a basis for evaluating the behaviour of mechanical systems |
John Anthony Bradshaw |
(1991) |
PhD 153 p |
|
235 |
Modelling and image generation |
Heng Wang |
(1991) |
PhD 145 p |
PDF (10.6 MB) |
234 |
Two tutorial papers: Information retrieval & Thesaurus |
Karen Spärck Jones |
1991-08 |
31 p |
PDF (2.3 MB) |
233 |
A development environment for large natural language grammars |
John Carroll, Ted Briscoe, Claire Grover |
1991-07 |
65 p |
|
232 |
Mechanising set theory |
Francisco Corella |
1991-07 |
PhD 217 p |
PDF (9.6 MB) |
231 |
Managing the order of transactions in widely-distributed data systems |
Raphael Yahalom |
1991-08 |
PhD 133 p |
|
230 |
Proceedings of the Second Belief Representation and Agent Architectures Workshop (BRAA ’91) |
J. Galliers |
1991-08 |
255 p |
|
229 |
Abstraction of image and pixel : The thistle display system |
David J. Brown |
1991-08 |
PhD 197 p |
|
228 |
The desk area network |
Mark Hayter, Derek McAuley |
1991-05 |
11 p |
PS (0.0 MB) |
227 |
Priority in process calculi |
Juanito Albert Camilleri |
1991-06 |
PhD 203 p |
|
226 |
A new approach for improving system availability |
Kwok-yan Lam |
1991-06 |
PhD 108 p |
|
225 |
Categorical multirelations, linear logic and petri nets (draft) |
Valeria de Paiva |
1991-05 |
29 p |
PDF (1.2 MB) |
224 |
Generalised probabilistic LR parsing of natural language (corpora) with unification-based grammars |
Ted Briscoe, John Carroll |
(1991) |
45 p |
PDF (4.0 MB) |
223 |
Shallow processing and automatic summarising: a first study |
Philip Gladwin, Stephen Pulman, Karen Spärck Jones |
1991-05 |
65 p |
PDF (2.9 MB) |
222 |
Extensions to coloured petri nets and their application to protocols |
Jonathan Billington |
(1991) |
PhD 190 p |
PDF (16.1 MB) |
221 |
Transforming axioms for data types into sequential programs |
Robert Milne |
(1991) |
44 p |
PDF (2.2 MB) |
220 |
A distributed architecture for multimedia communication systems |
Cosmos Andrea Nicolaou |
(1991) |
PhD 192 p |
PDF (19.2 MB) |
219 |
Fairisle project working documents : Snapshot 1 |
Ian M. Leslie, Derek M. McAuley, et al. |
1991-03 |
56 p |
PDF (3.4 MB) |
218 |
Higher-order critical pairs |
Tobias Nipkow |
1991-04 |
15 p |
PDF (1.0 MB) |
217 |
Dynamic bandwidth management |
Bhaskar Ramanathan Harita |
(1991) |
PhD 160 p |
PDF (14.9 MB) |
216 |
Exploiting OR-parallelism in Prolog using multiple sequential machines |
Carole Susan Klein |
(1991) |
PhD 250 p |
PDF (20.6 MB) |
215 |
A structured approach to the verification of low level microcode |
Paul Curzon |
(1991) |
PhD 265 p |
PDF (12.0 MB) |
214 |
Integrating knowledge of purpose and knowledge of structure for design evaluation |
J.A. Bradshaw, R.M. Young |
1991-02 |
20 p |
PDF (1.3 MB) |
213 |
The Dialectica categories |
Valeria Correa Vaz de Paiva |
1991-01 |
PhD 82 p |
PDF (3.5 MB) |
212 |
A distributed and-or parallel Prolog network |
K.L. Wrench |
1990-12 |
82 p |
PDF (4.7 MB) |
211 |
The role of artificial intelligence in information retrieval |
Karen Spärck Jones |
1990-11 |
13 p |
PDF (1.2 MB) |
210 |
Higher-order unification, polymorphism, and subsorts |
Tobias Nipkow |
(1990) |
15 p |
PDF (1.1 MB) |
209 |
Efficient memory-based learning for robot control |
Andrew William Moore |
1990-11 |
PhD 248 p |
PDF (11.3 MB) |
208 |
Categorical combinators for the calculus of constructions |
Eike Ritter |
1990-10 |
43 p |
PDF (2.8 MB) |
207 |
Video replay in computer animation |
Stuart Philip Hawkins |
1990-10 |
PhD 161 p |
PDF (18.3 MB) |
206 |
Formal verification of real-time protocols using higher order logic |
Rachel Cardell-Oliver |
1990-08 |
36 p |
PDF (1.8 MB) |
205 |
Logic programming, functional programming and inductive definitions |
Lawrence C. Paulson, Andrew W. Smith |
(1990) |
29 p |
PDF (0.2 MB) DVI (0.0 MB) |
204 |
New foundations for fixpoint computations: FIX-hyperdoctrines and the FIX-logic |
Roy L. Crole, Andrew M. Pitts |
1990-08 |
37 p |
PS (0.1 MB) |
203 |
Subtyping in Ponder (preliminary report) |
Valeria C.V. de Paiva |
1990-08 |
35 p |
PDF (1.5 MB) |
202 |
Three-dimensional integrated circuit layout |
Andrew Charles Harter |
1990-08 |
PhD 179 p |
PDF (11.7 MB) |
201 |
Formalizing abstraction mechanisms for hardware verification in higher order logic |
Thomas Frederick Melham |
1990-08 |
PhD 233 p |
PDF (1.7 MB) |
200 |
Type classes and overloading resolution via order-sorted unification |
Tobias Nipkow, Gregor Snelting |
1990-08 |
16 p |
PDF (1.3 MB) |
199 |
The HOL verification of ELLA designs |
Richard Boulton, Mike Gordon, et al. |
1990-08 |
22 p |
PS (0.1 MB) |
198 |
Evaluation Logic |
Andrew M. Pitts |
1990-08 |
31 p |
PS (0.1 MB) |
197 |
The semantics and implementation of aggregates : or : how to express concurrency without destroying determinism |
Thomas Clarke |
1990-07 |
25 p |
PDF (1.8 MB) |
196 |
The semantics of VHDL with Val and Hol: towards practical verification tools |
John Peter Van Tassell |
1990-06 |
77 p |
PDF (4.3 MB) |
195 |
Multi-level verification of microprocessor-based systems |
Jeffrey J. Joyce |
1990-05 |
PhD 163 p |
PDF (11.3 MB) |
194 |
Proceedings of the First Belief Representation and Agent Architectures Workshop |
Julia Rose Galliers |
1990-03 |
199 p |
PDF (6.8 MB) |
193 |
Belief revision and a theory of communication |
Julia Rose Galliers |
1990-05 |
30 p |
PDF (2.2 MB) |
192 |
Designing a theorem prover |
Lawrence C. Paulson |
1990-05 |
57 p |
PDF (0.3 MB) DVI (0.1 MB) |
191 |
An architecture for real-time multimedia communications systems |
Cosmos Nicolaou |
1990-02 |
30 p |
PDF (1.3 MB) |
190 |
Some notes on mass terms and plurals |
Ann Copestake |
1990-01 |
65 p |
PS (0.1 MB) |
189 |
Isabelle tutorial and user’s manual |
Lawrence C. Paulson, Tobias Nipkow |
1990-01 |
142 p |
PDF (0.5 MB) DVI (0.1 MB) |
188 |
Specification of computer architectures: a survey and annotated bibliography |
Timothy E. Leonard |
1990-01 |
42 p |
PDF (2.9 MB) |
187 |
Natural language interfaces to databases |
Ann Copestake, Karen Spärck Jones |
1989-09 |
36 p |
PS (0.1 MB) |
186 |
Protocol design for high speed networks |
Derek Robert McAuley |
1990-01 |
PhD 100 p |
PS (0.3 MB) |
185 |
Logics of domains |
Guo Qiang Zhang |
1989-12 |
PhD 250 p |
PDF (17.5 MB) |
184 |
Site interconnection and the exchange architecture |
David Lawrence Tennenhouse |
1989-10 |
PhD 225 p |
PDF (15.6 MB) |
183 |
The specification and verification of sliding window protocols in higher order logic |
Rachel Cardell-Oliver |
1989-10 |
25 p |
PDF (1.6 MB) |
182 |
The theory and implementation of a bidirectional question answering system |
John M. Levine, Lee Fedder |
1989-10 |
27 p |
PDF (1.5 MB) |
181 |
Proof transformations for equational theories |
Tobias Nipkow |
1989-09 |
17 p |
PDF (1.1 MB) |
180 |
Formal verification of data type refinement: Theory and practice |
Tobias Nipkow |
1989-09 |
31 p |
PDF (2.1 MB) |
179 |
Automating Squiggol |
Ursula Martin, Tobias Nipkow |
1989-09 |
16 p |
PDF (1.0 MB) |
178 |
Totally verified systems: linking verified software to verified hardware |
Jeffrey J. Joyce |
1989-09 |
25 p |
PDF (1.5 MB) |
177 |
Experimenting with Isabelle in ZF Set Theory |
P.A.J. Noel |
1989-09 |
40 p |
PDF (2.2 MB) |
176 |
Implementing aggregates in parallel functional languages |
T.J.W. Clarke |
1989-08 |
13 p |
PDF (1.0 MB) |
175 |
A formulation of the simple theory of types (for Isabelle) |
Lawrence C. Paulson |
1989-08 |
32 p |
PDF (0.2 MB) DVI (0.0 MB) |
174 |
General theory relating to the implementation of concurrent symbolic computation |
James Thomas Woodchurch Clarke |
1989-08 |
PhD 113 p |
PDF (8.7 MB) |
173 |
Programming in temporal logic |
Roger William Stephen Hale |
1989-07 |
PhD 182 p |
PDF (10.2 MB) |
172 |
A theoretical framework for computer models of cooperative dialogue, acknowledging multi-agent conflict |
Julia Rose Galliers |
1989-07 |
226 p |
PDF (13.3 MB) |
171 |
Some types with inclusion properties in ∀, →, μ |
Jon Fairbairn |
1989-06 |
10 p |
PDF (0.2 MB) |
170 |
Ordered rewriting and confluence |
Ursula Martin, Tobias Nipkow |
1989-05 |
18 p |
PDF (1.3 MB) |
169 |
Filing in a heterogeneous network |
Andrew Franklin Seaborne |
1989-04 |
PhD 131 p |
PDF (7.7 MB) |
168 |
Distributed computing with a processor bank |
J.M. Bacon, I.M. Leslie, R.M. Needham |
1989-04 |
15 p |
PDF (0.6 MB) |
167 |
A verified compiler for a verified microprocessor |
Jeffrey J. Joyce |
1989-03 |
67 p |
|
166 |
Evolution of operating system structures |
Jean Bacon |
1989-03 |
28 p |
PDF (1.6 MB) |
165 |
Fast packet switching for integrated services |
Peter Newman |
1989-03 |
PhD 145 p |
PDF (10.4 MB) |
164 |
A matrix key distribution system |
Li Gong, David J. Wheeler |
1988-10 |
20 p |
PDF (1.0 MB) |
163 |
Inference in a natural language front end for databases |
Ann Copestake, Karen Spärck Jones |
1989-02 |
87 p |
PDF (0.5 MB) |
162 |
The Alvey natural language tools grammar (2nd Release) |
Claire Grover, Ted Briscoe, et al. |
1989-04 |
90 p |
PDF (7.5 MB) |
161 |
Papers on Poly/ML |
D.C.J. Matthews |
1989-02 |
150 p |
PDF (11.5 MB) |
160 |
PFL+: A Kernal Scheme for Functions I/O |
Andrew Gordon |
1989-02 |
26 p |
PDF (1.4 MB) |
159 |
Non-trivial power types can’t be subtypes of polymorphic types |
Andrew M. Pitts |
1989-01 |
12 p |
PS (0.1 MB) |
158 |
Tailoring output to the user: What does user modelling in generation mean? |
Karen Spärck Jones |
1988-08 |
21 p |
PDF (1.6 MB) |
157 |
Introducing a priority operator to CCS |
Juanito Camilleri |
1989-01 |
19 p |
PDF (0.8 MB) |
156 |
Events and VP modifiers |
Steve Pulman |
1989-01 |
10 p |
PDF (0.6 MB) |
155 |
Computational morphology of English |
S.G. Pulman, G.J. Russell, et al. |
1989-01 |
15 p |
PDF (1.0 MB) |
154 |
A natural language interface to an intelligent planning system |
I.B. Crabtree, R.S. Crouch, et al. |
1989-01 |
14 p |
PDF (0.6 MB) |
153 |
Efficient data sharing |
Michael Burrows |
1988-12 |
PhD 99 p |
PDF (6.0 MB) |
152 |
Motion development for computer animation |
Andrew Mark Pullen |
1988-11 |
PhD 163 p |
PDF (11.5 MB) |
151 |
Formalising an integrated circuit design style in higher order logic |
Inderpreet-Singh Dhingra |
1988-11 |
PhD 195 p |
PDF (9.0 MB) |
150 |
Simulation as an aid to verification using the HOL theorem prover |
Albert John Camilleri |
1988-10 |
23 p |
PDF (1.7 MB) |
149 |
Improving security and performance for capability systems |
Paul Ashley Karger |
1988-10 |
PhD 273 p |
PDF (1.3 MB) PS (0.5 MB) |
148 |
Extending coloured petri nets |
Jonathan Billington |
1988-09 |
82 p |
PDF (3.5 MB) |
147 |
Formal specification and verification of microprocessor systems |
Jeffrey Joyce |
1988-09 |
24 p |
PDF (1.2 MB) |
146 |
Automating recursive type definitions in higher order logic |
Thomas F. Melham |
1988-09 |
64 p |
PDF (5.6 MB) |
145 |
Mechanizing programming logics in higher order logic |
Michael J.C. Gordon |
1988-09 |
55 p |
PDF (0.5 MB) |
144 |
An operational semantics for occam |
Juanito Camilleri |
1988-08 |
27 p |
PDF (0.7 MB) |
143 |
Experience with Isabelle : A generic theorem prover |
Lawrence C. Paulson |
1988-08 |
20 p |
PDF (0.2 MB) DVI (0.0 MB) |
142 |
A fast packet switch for the integrated services backbone network |
Peter Newman |
1988-07 |
24 p |
PDF (1.3 MB) |
141 |
Reliable management of voice in a distributed system |
Roy Want |
1988-07 |
PhD 127 p |
PDF (7.6 MB) |
140 |
Executing behavioural definitions in higher order logic |
Albert John Camilleri |
1988-07 |
PhD 183 p |
PDF (8.1 MB) |
139 |
Petri net theory: a survey |
Paul R. Manson |
1988-06 |
77 p |
PDF (3.3 MB) |
138 |
Authentication: a practical study in belief and action |
Michael Burrows, Martín Abadi, Roger Needham |
1988-06 |
19 p |
PDF (1.0 MB) |
137 |
Mass terms and plurals: from linguistic theory to natural language processing |
F.V. Hasle |
1988-06 |
171 p |
PDF (5.7 MB) |
136 |
Formal specification and verification of asynchronous processes in higher-order logic |
Jeffrey J. Joyce |
1988-06 |
45 p |
PDF (2.3 MB) |
135 |
Using recursive types to reason about hardware in higher order logic |
Thomas F. Melham |
1988-05 |
30 p |
PDF (1.9 MB) |
134 |
Correctness properties of the Viper black model: the second level |
Avra Cohn |
1988-05 |
114 p |
PDF (7.0 MB) |
133 |
A preliminary users manual for Isabelle |
Lawrence C. Paulson |
1988-05 |
81 p |
PDF (0.3 MB) DVI (0.1 MB) |
132 |
Reasoning about the function and timing of integrated circuits with Prolog and temporal logic |
Miriam Ellen Leeser |
1988-04 |
PhD 151 p |
PDF (6.7 MB) |
131 |
Architecture problems in the construction of expert systems for document retrieval |
Karen Spärck Jones |
1986-12 |
28 p |
PDF (1.3 MB) |
130 |
The foundation of a generic theorem prover |
Lawrence C Paulson |
1988-03 |
44 p |
PDF (0.2 MB) DVI (0.1 MB) |
129 |
A methodology for automated design of computer instruction sets |
Jeremy Peter Bennett |
1988-03 |
PhD 147 p |
PDF (5.8 MB) |
128 |
Debugging concurrent and distributed programs |
Robert Charles Beaumont Cooper |
1988-02 |
PhD 111 p |
PDF (5.9 MB) |
127 |
A development environment for large natural language grammars |
John Carroll, Bran Boguraev, et al. |
1988-02 |
44 p |
PDF (2.1 MB) |
126 |
Reasoning about the function and timing of integrated circuits with Prolog and temporal logic |
M.E. Leeser |
1988-02 |
50 p |
PDF (2.6 MB) |
125 |
An operational semantics for Occam |
Juanito Camilleri |
1988-02 |
24 p |
PDF (0.7 MB) |
124 |
Formal verification of basic memory devices |
John Herbert |
1988-02 |
46 p |
PDF (1.6 MB) |
123 |
Case study of the Cambridge Fast Ring ECL chip using HOL |
John Herbert |
1988-02 |
38 p |
PDF (1.4 MB) |
122 |
Temporal abstraction of digital designs |
John Herbert |
1988-02 |
34 p |
PDF (1.4 MB) |
121 |
A high-level petri net specification of the Cambridge Fast Ring M-access service |
Jonathan Billington |
1987-12 |
31 p |
PDF (1.5 MB) |
120 |
Block encryption |
D. Wheeler |
1987-11 |
4 p |
PDF (0.4 MB) |
119 |
Pilgrim: a debugger for distributed systems |
Robert Cooper |
1987-07 |
19 p |
PDF (1.0 MB) |
118 |
Material concerning a study of cases |
B.K. Boguraev, K. Spärck Jones |
1987-05 |
31 p |
PDF (1.4 MB) |
117 |
Distributed computing with RPC: the Cambridge approach |
J.M. Bacon, K.G. Hamilton |
1987-10 |
15 p |
PDF (1.0 MB) |
116 |
Domain theoretic models of polymorphism |
Thierry Coquand, Carl Gunter, Glynn Winskel |
1987-09 |
52 p |
PDF (2.8 MB) |
115 |
Formal validation of an integrated circuit design style |
I.S. Dhingra |
1987-08 |
29 p |
PDF (1.2 MB) |
114 |
An architecture for integrated services on the local area network |
Stephen Ades |
1987-09 |
PhD 166 p |
PDF (11.5 MB) |
113 |
The representation of logics in higher-order logic |
Lawrence C. Paulson |
1987-08 |
29 p |
PDF (1.3 MB) |
112 |
Reducing thrashing by adaptive backtracking |
D.A. Wolfram |
1987-08 |
15 p |
PDF (0.7 MB) |
111 |
Realism about user modelling |
K. Spärck Jones |
1987-06 |
32 p |
PDF (1.9 MB) |
110 |
Relating two models of hardware |
Glynn Winskel |
1987-07 |
16 p |
PDF (0.8 MB) |
109 |
Hardware verification of VLSI regular structures |
Jeffrey Joyce |
1987-07 |
20 p |
PDF (0.9 MB) |
108 |
Workstation design for distributed computing |
Andrew John Wilkes |
1987-06 |
PhD 179 p |
PDF (7.2 MB) |
107 |
DI-domains as a model of polymorphism |
Thierry Coquand, Carl Gunter, Glynn Winskel |
1987-05 |
19 p |
PDF (0.8 MB) |
106 |
Abstraction mechanisms for hardware verification |
Thomas F. Melham |
1987-05 |
26 p |
PDF (1.3 MB) |
105 |
A compositional model of MOS circuits |
Glynn Winskel |
1987-04 |
25 p |
PDF (1.3 MB) |
104 |
A proof of correctness of the Viper microprocessor: the first level |
Avra Cohn |
1987-01 |
46 p |
PDF (2.3 MB) |
103 |
HOL : A proof generating system for higher-order logic |
Mike Gordon |
1987-01 |
56 p |
PDF (3.2 MB) |
102 |
A persistent storage system for Poly and ML |
David C.J. Matthews |
1987-01 |
16 p |
PDF (0.8 MB) |
101 |
Binary routing networks |
David Russel Milway |
1986-12 |
PhD 131 p |
PDF (7.9 MB) |
100 |
Proving a computer correct in higher order logic |
Jeff Joyce, Graham Birtwistle, Mike Gordon |
1986-12 |
57 p |
PDF (3.5 MB) |
99 |
An overview of the Poly programming language |
David C.J. Matthews |
1986-08 |
11 p |
PDF (0.5 MB) |
98 |
Power-domains, modalities and the Vietoris monad |
E. Robinson |
1986-10 |
16 p |
PDF (1.1 MB) |
97 |
A study on abstract interpretation and “validating microcode algebraically” |
Alan Mycroft |
1986-10 |
22 p |
PDF (1.2 MB) |
96 |
Models and logic of MOS circuits : Lectures for the Marktoberdorf Summerschool, August 1986 |
Glynn Winskel |
1986-10 |
47 p |
PDF (1.8 MB) |
95 |
Event structures : Lecture notes for the Advanced Course on Petri Nets |
Glynn Winskel |
1986-07 |
69 p |
PDF (4.0 MB) |
94 |
A mechanized proof of correctness of a simple counter |
Avra Cohn, Mike Gordon |
1986-06 |
80 p |
|
93 |
Automated design of an instruction set for BCPL |
J.P. Bennett |
1986-06 |
56 p |
|
92 |
Implementation and programming techniques for functional languages |
Stuart Charles Wray |
1986-06 |
PhD 117 p |
PDF (4.4 MB) |
91 |
Hardware verification using higher-order logic |
Albert Camilleri, Mike Gordon, Tom Melham |
1986-09 |
25 p |
PDF (1.3 MB) |
90 |
The Cambridge Fast Ring networking system (CFR) |
Andy Hopper, Roger M. Needham |
1986-06 |
25 p |
PDF (0.6 MB) |
89 |
Making form follow function : An exercise in functional programming style |
Jon Fairbairn |
1986-06 |
9 p |
PDF (0.4 MB) |
88 |
A shallow processing approach to anaphor resolution |
David Maclean Carter |
1986-05 |
PhD 233 p |
PDF (16.8 MB) |
87 |
Computer-aided type face design |
Kathleen Anne Carter |
1986-05 |
PhD 172 p |
PDF (16.5 MB) |
86 |
The Entity System: an object based filing system |
Stephen Christopher Crawley |
1986-04 |
PhD 120 p |
PDF (6.5 MB) |
85 |
Category theory and models for parallel computation |
Glynn Winskel |
1986-04 |
16 p |
PDF (1.0 MB) |
84 |
BSPL: a language for describing the behaviour of synchronous hardware |
Martin Richards |
1986-04 |
56 p |
|
83 |
Operating system design for large personal workstations |
Ian David Wilson |
(1985) |
PhD 203 p |
PDF (13.8 MB) |
82 |
Natural deduction proof as higher-order resolution |
Lawrence C. Paulson |
1985-12 |
25 p |
PDF (0.2 MB) DVI (0.0 MB) |
81 |
The implementation of functional languages using custom hardware |
William Robert Stoye |
1985-12 |
PhD 151 p |
PDF (7.2 MB) |
80 |
Interactive theorem proving with Cambridge LCF : A user’s manual |
Lawrence C. Paulson |
1985-11 |
140 p |
|
79 |
Petri nets, algebras and morphisms |
Glynn Winskel |
(1985) |
38 p |
PDF (2.1 MB) |
78 |
A complete proof system for SCCS with model assertions |
Glynn Winskel |
1985-09 |
23 p |
PDF (1.0 MB) |
77 |
Why higher-order logic is a good formalisation for specifying and verifying hardware |
Mike Gordon |
1985-09 |
28 p |
PDF (0.9 MB) |
76 |
Preserving abstraction in concurrent programming |
R.C.B. Cooper, K.G. Hamilton |
1985-08 |
16 p |
PDF (0.8 MB) |
75 |
Design and implementation of a simple typed language based on the lambda-calculus |
Jon Fairbairn |
1985-05 |
PhD 107 p |
PDF (0.6 MB) |
74 |
Hardware verification by formal proof |
Mike Gordon |
1985-08 |
6 p |
PDF (0.4 MB) |
73 |
Resource management in a distributed computing system |
Daniel Hammond Craft |
(1985) |
PhD 116 p |
PDF (6.6 MB) |
72 |
Logic programming and the specification of circuits |
W.F. Clocksin |
1985-05 |
13 p |
PDF (0.6 MB) |
71 |
Executing temporal logic programs |
Ben Moszkowski |
1985-08 |
96 p |
|
70 |
A remote procedure call system |
Kenneth Graham Hamilton |
1984-12 |
PhD 109 p |
PDF (6.2 MB) |
69 |
Proving termination of normalization functions for conditional expressions |
Lawrence C. Paulson |
1985-06 |
16 p |
PDF (0.1 MB) DVI (0.0 MB) |
68 |
HOL : A machine oriented formulation of higher order logic |
Mike Gordon |
1985-07 |
52 p |
PDF (1.6 MB) |
67 |
Natural deduction theorem proving via higher-order resolution |
Lawrence C. Paulson |
1985-05 |
22 p |
PDF (0.9 MB) |
66 |
A formal hardware verification methodology and its application to a network interface chip |
M.J.C. Gordon, J. Herbert |
1985-05 |
39 p |
PDF (1.2 MB) |
65 |
Introduction to the programming language “Ponder” |
Mark Tillotson |
1985-05 |
57 p |
|
64 |
A framework for inference in natural language front ends to databases |
Branimir K. Boguraev, Karen Spärck Jones |
1985-02 |
73 p |
|
63 |
Poly manual |
David C.J. Matthews |
1985-02 |
46 p |
PDF (1.4 MB) |
62 |
Constraint enforcement in a relational database management system |
Michael Robson |
(1984) |
PhD 106 p |
PDF (6.2 MB) |
61 |
User models and expert systems |
Karen Spärck Jones |
1984-12 |
44 p |
PDF (2.2 MB) |
60 |
Memory and context mechanisms for automatic text processing |
Hiyan Alshawi |
(1984) |
PhD 192 p |
PDF (11.9 MB) |
59 |
On the composition and decomposition of assertions |
Glynn Winskel |
1984-11 |
35 p |
PDF (1.1 MB) |
58 |
Categories of models for concurrency |
Glynn Winskel |
1984-10 |
35 p |
PDF (1.3 MB) |
57 |
Constructing recursion operators in intuitionistic type theory |
Lawrence C. Paulson |
1984-10 |
46 p |
PDF (0.3 MB) DVI (0.1 MB) |
56 |
A new scheme for writing functional operating systems |
William Stoye |
1984-09 |
30 p |
PDF (2.5 MB) |
55 |
Executing temporal logic programs |
Ben Moszkowski |
1984-08 |
27 p |
PDF (1.8 MB) |
54 |
Lessons learned from LCF |
Lawrence Paulson |
1984-08 |
16 p |
PDF (1.3 MB) |
53 |
A new type-checker for a functional language |
Jon Fairbairn |
1984-07 |
16 p |
PDF (1.2 MB) |
52 |
The design of a ring communication network |
Steven Temple |
(1984) |
PhD 132 p |
PDF (6.3 MB) |
51 |
Using information systems to solve recursive domain equations effectively |
Glynn Winskel, Kim Guldstrand Larsen |
1984-07 |
41 p |
PDF (2.9 MB) |
50 |
Verifying the unification algorithm in LCF |
Lawrence Paulson |
1984-03 |
28 p |
PDF (0.2 MB) DVI (0.0 MB) |
49 |
Programming language design with polymorphism |
David Charles James Matthews |
(1983) |
PhD 143 p |
PDF (6.6 MB) |
48 |
A mechanism for the accumulation and application of context in text processing |
Hiyan Alshawi |
1983-11 |
17 p |
PDF (0.8 MB) |
47 |
Automatic summarising of English texts |
John Irving Tait |
(1982) |
PhD 137 p |
PDF (8.0 MB) |
46 |
Intelligent network interfaces |
Nicholas Henry Garnett |
1985-05 |
PhD 140 p |
PDF (8.7 MB) |
45 |
Compound noun interpretation problems |
Karen Spärck Jones |
1983-07 |
16 p |
PDF (1.2 MB) |
44 |
Structural induction in LCF |
Lawrence Paulson |
1983-11 |
35 p |
PDF (1.8 MB) |
43 |
Extending the local area network |
Ian Malcom Leslie |
1983-02 |
PhD 71 p |
PDF (2.9 MB) |
42 |
Proving a computer correct with the LCF_LSM hardware verification system |
Mike Gordon |
1983-09 |
49 p |
PDF (2.1 MB) |
41 |
LCF_LSM, A system for specifying and verifying hardware |
Mike Gordon |
1983-09 |
53 p |
PDF (2.5 MB) |
40 |
The SKIM microprogrammer’s guide |
W. Stoye |
1983-10 |
33 p |
PDF (1.8 MB) |
39 |
Tactics and tacticals in Cambridge LCF |
Lawrence Paulson |
1983-07 |
26 p |
PDF (0.9 MB) |
38 |
Views and imprecise information in databases |
Mike Gray |
1982-11 |
PhD 119 p |
PDF (5.0 MB) |
37 |
Representation and authentication on computer networks |
Christopher Gray Girling |
(1983) |
PhD 154 p |
PDF (8.4 MB) |
36 |
The revised logic PPLAMBDA : A reference manual |
Lawrence Paulson |
1983-03 |
28 p |
PDF (0.7 MB) |
35 |
Rewriting in Cambridge LCF |
Larry Paulson |
1983-02 |
32 p |
DVI (0.0 MB) |
34 |
Recent developments in LCF: examples of structural induction |
Larry Paulson |
1983-01 |
15 p |
PDF (0.7 MB) |
33 |
An island parsing interpreter for Augmented Transition Networks |
John A. Carroll |
1982-10 |
50 p |
PDF (1.9 MB) |
32 |
How to drive a database front end using general semantic information |
B.K. Boguraev, K. Spärck Jones |
1982-11 |
20 p |
PDF (1.3 MB) |
31 |
Ponder and its type system |
J. Fairbairn |
1982-11 |
42 p |
PDF (1.4 MB) |
30 |
A portable BCPL library |
John Wilkes |
1982-10 |
31 p |
PDF (2.2 MB) |
29 |
Introduction to Poly |
D.C.J. Matthews |
1982-05 |
24 p |
PDF (1.0 MB) |
28 |
Poly report |
D.C.J. Matthews |
1982-08 |
17 p |
PDF (0.8 MB) |
27 |
Exception handling in domain based systems |
Martyn Alan Johnson |
1981-09 |
PhD 129 p |
PDF (6.5 MB) |
26 |
Portable system software for personal computers on a network |
Brian James Knight |
(1982) |
PhD 204 p |
PDF (9.8 MB) |
25 |
A clustering technique for semantic network processing |
Hiyan Alshawi |
1982-05 |
9 p |
PDF (0.6 MB) |
24 |
Steps towards natural language to data language translation using general semantic information |
B.K. Boguraev, K. Spärck Jones |
1982-03 |
8 p |
PDF (0.5 MB) |
23 |
Two papers about the scrabble summarising system |
J.I. Tait |
(1982) |
12 p |
PDF (0.7 MB) |
22 |
Constraints in CODD |
M. Robson |
(1982) |
18 p |
PDF (1.1 MB) |
21 |
The correctness of a precedence parsing algorithm in LCF |
A. Cohn |
1982-04 |
38 p |
PDF (1.8 MB) |
20 |
On using Edinburgh LCF to prove the correctness of a parsing algorithm |
Avra Cohn, Robin Milner |
1982-02 |
23 p |
PDF (1.2 MB) |
19 |
Analysis and inference for English |
Arthur William Sebright Cater |
1981-09 |
PhD 223 p |
PDF (17.7 MB) |
18 |
Automatic mesh generation of 2 & 3 dimensional curvilinear manifolds |
Burkard Wördenweber |
1981-11 |
PhD 128 p |
|
17 |
Three papers on parsing |
B.K. Boguraev, K. Spärck Jones, J.I. Tait |
1982 |
22 p |
PDF (1.3 MB) |
16 |
Reliable storage in a local network |
Jeremy Dion |
1981-02 |
PhD 142 p |
PDF (1.8 MB) |
15 |
The implementation of BCPL on a Z80 based microcomputer |
I.D. Wilson |
(1980) |
BA 68 p |
PDF (2.4 MB) |
14 |
Store to store swapping for TSO under OS/MVT |
J.S. Powers |
1980-06 |
28 p |
PDF (1.9 MB) |
13 |
Resource allocation and job scheduling |
Philip Hazel |
1980 |
41 p |
PDF (2.0 MB) |
12 |
HASP “IBM 1130” multileaving remote job entry protocol with extensions as used on the University of Cambridge IBM 370/165 |
M.R.A. Oakley, P. Hazel |
1979-09 |
28 p |
PDF (1.6 MB) |
11 |
Automatic resolution of linguistic ambiguities |
Branimir Konstatinov Boguraev |
(1979) |
PhD 222 p |
PDF (10.9 MB) |
10 |
Prediction oriented description of database systems |
Mark Theodore Pezarro |
(1978) |
PhD 190 p |
PDF (8.8 MB) |
9 |
Evaluation of a protection system |
Douglas John Cook |
(1978) |
PhD 181 p |
PDF (7.1 MB) |
7 |
Local area computer communication networks |
Andrew Hopper |
1978-04 |
PhD 192 p |
PDF (1.9 MB) |
6 |
System programming in a high level language |
Andrew D. Birrell |
1977-12 |
PhD 125 p |
PDF (7.0 MB) |
5 |
Parrot – A replacement for TCAM |
P. Hazel, A.J.M. Stoneley |
1976-04 |
25 p |
PDF (1.2 MB) |
4 |
The dynamic creation of I/O paths under OS/360-MVT |
A.J.M. Stoneley |
1975-04 |
16 p |
PDF (0.9 MB) |
3 |
A replacement for the OS/360 disc space management routines |
A.J.M. Stoneley |
1975-04 |
7 p |
PDF (0.6 MB) |
2 |
Scheduling for a share of the machine |
J. Larmouth |
1974-10 |
29 p |
PDF (1.4 MB) |
1 |
The JACKDAW database package |
M.F. Challis |
1974-10 |
15 p |
PDF (0.8 MB) |