University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Treharne, H"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 79.

Article

Whitefield, Jorden, Chen, Liqun, Kargl, F, Paverd, A, Schneider, Steven, Treharne, Helen and Wesemeyer, Stephan (2017) Formal Analysis of V2X Revocation Protocols. Proceedings of STM’17. Lecture Notes in Computer Science..

Hoang, TS, Schneider, SA, Treharne, H and Williams, DM (2016) Foundations for using Linear Temporal Logic in Event-B refinement Formal Aspects of Computing, 28 (6). pp. 909-935.

Bendisposto, J, Koerner, P, Leuschel, M, Meijer, J, Pol, JVD, Treharne, H and Whitefield, J (2016) Symbolic Reachability Analysis of B through ProB and LTSmin Integrated Formal Methods (LNCS), 9681. pp. 275-291.

Schneider, S and Treharne, H (2015) Special issue on Automated Verification of Critical Systems (AVoCS 2013) SCIENCE OF COMPUTER PROGRAMMING, 111. p. 213.

James, P, Moller, F, Nga Nguyen, H, Roggenbach, M, Schneider, S and Treharne, H (2014) On modelling and verifying railway interlockings: Tracking train lengths Science of Computer Programming, 96 (P3). pp. 315-336.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2014) Techniques for modelling and verifying railway interlockings International Journal on Software Tools for Technology Transfer, 16 (6). pp. 685-711.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. pp. 221-237.

Schneider, SA, Treharne, HE and Wehrheim, H (2014) The Behavioural Semantics of Event-B Re finement Formal Aspects of Computing: applicable formal methods, 26. pp. 251-280.

Schneider, S, Treharne, H, Wehrheim, H and Williams, DM (2014) Managing LTL properties in Event-B refinement. CoRR, abs/14.

Abdelhalim, I, Schneider, SA and Treharne, H (2013) An integrated framework for checking the behaviour of fUML models using CSP International Journal on Software Tools for Technology Transfer, 15 (4). pp. 375-396.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. pp. 193-208.

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. pp. 435-440.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S, Treharne, H, Trumble, M and Williams, DM (2013) Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops, 8368. pp. 189-204.

Schneider, SA, Treharne, HE and Wehrheim, H (2012) The Behavioural Semantics of Event-B Refinement Formal Aspects of Computing: applicable formal methods.

Latella, D and Treharne, H (2012) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7321 L.

Roggenbach, M, Moller, F, Schneider, S, Treharne, H and Nguyen, HN (2012) Railway modelling in CSP||B: the double junction case study. ECEASST, 53.

Potet, M-L and Treharne, Helen (2011) Preface. Electr. Notes Theor. Comput. Sci., 280. pp. 1-2.

Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. pp. 69-80.

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). pp. 837-860.

Schneider, SA, Treharne, HE and Wehrheim, H (2010) A CSP approach to Control in Event-B Integrated Formal Methods/Lecture Notes in Computer Science, 6396. pp. 260-274.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2009) A step towards merging xUML and CSP ∥ B Lecture Notes in Computer Science: Rigorous Methods for Software Construction and Analysis, 5115. pp. 130-146.

Evans, N, Treharne, H, Laleau, R and Frappier, M (2008) Applying CSP parallel to B to information systems SOFTW SYST MODEL, 7 (1). pp. 85-102.

Lundin, D, Treharne, H, Ryan, P, Schneider, S, Heather, J and Xia, Z (2007) Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption Fundamenta Informaticae (2001). pp. 1001-1019.

Evans, N and Treharne, H (2006) Linking Semantic Models to Support CSP || B Consistency Checking. Electr. Notes Theor. Comput. Sci., 145. pp. 201-217.

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). pp. 308-328.

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). pp. 390-422.

Schneider, Steve, Hoang, Thai Son, Robinson, Ken and Treharne, Helen (2005) Tank monitoring: a pAMN case study Electronic Notes in Theoretical Computer Science, 137 (2). pp. 183-204.

Schneider, SA, Hoang, TS, Robinson, K and Treharne, H (2005) Tank Monitoring: A pAMN Case Study. Electronic Notes in Theoretical Computer Science, 2 (137). pp. 183-204.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. pp. 58-78.

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. pp. 416-435.

Book Section

Culnane, C, Treharne, H, Ho, ATS, Shi, YQ and Jeon, B (2006) A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes In: UNSPECIFIED SPRINGER-VERLAG BERLIN, pp. 96-110.

Monograph

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2013) On Modelling and Verifying Railway Interlockings: Tracking Train Lengths Technical Report.

Moler, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2012) Combining event-based and state-based modelling for railway verification Technical Report. (Unpublished)

Jiang, W, Ho, ATS, Treharne, H and Yun-Qing, S (2011) Local Binary Patterns for Printer Identification based on Texture Analysis Technical Report.

Sharp, James and Treharne, Helen (2011) CASE Technical Report: Automated Transformations from VHDL to CSP Technical Report. Department of Computing, University of Surrey. (Unpublished)

Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)

Conference or Workshop Item

Whitefield, Jorden, Chen, Liqun, Giannetsos, Athanasios, Schneider, Steven and Treharne, Helen (2017) Privacy-Enhanced Capabilities for VANETs using Direct Anonymous Attestation In: 2017 IEEE Vehicular Networking Conference (VNC), November 27-29 2017, Turino, Italy.

James, P, Moller, F, Nguyen, HN, Roggenbach, M and Treharne, H (2014) Decomposing scheme plans to manage verification complexity

Aktoudianakis, E, Crampton, J, Schneider, S, Treharne, H and Waller, A (2013) Policy templates for relationship-based access control.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2012) Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B.

Abdelhalim, I, Schneider, S and Treharne, H (2012) An Optimization Approach for Effective Formalized fUML Model Checking.

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Briffa, JA, Culnane, Christopher and Treharne, Helen (2010) Imperceptible printer dot watermarking for binary documents In: Optics, photonics, and digital technologies for multimedia applications, 2010-04-12 - 2010-04-15, Brussels, Belgium.

Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010) A novel multi-size block Benford's law scheme for printer identification In: PCM 2010: 11th Pacific Rim Conference on Multimedia, 2010-09-21 - 2010-09-24, Shanghai, China.

Treharne, H, Turner, E, Paige, RF and Kolovos, DS (2009) Automatic Generation of Integrated Formal Models Corresponding to UML System Models In: 47th TOOLS EUROPE International Conference 2009, 2009-06-29 - 2009-07-03, Zurich, SWITZERLAND.

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Williams, DM, Treharne, H, Ho, ATS and Waller, A (2009) Formal Analysis of Two Buyer-Seller Watermarking Protocols In: 7th International Workshop on Digital Watermarking, 2008-11-10 - 2008-11-12, Busan, South Korea.

Vajar, B, Schneider, S and Treharne, H (2009) Mobile CSP||B. In: Automated Verification of Critical Systems, ? - ?.

Jiang, W, Ho, ATS and Treharne, H (2009) A novel least distortion linear gain model for halftone image watermarking incorporating perceptual quality metrics

Treharne, H, Turner, E, Schneider, S and Evans, N (2008) Object Modelling in the SystemB Industrial Project In: 1st International Conference of Abstract State Machines, B and Z, 2008-09-16 - 2008-09-18, London, ENGLAND.

Williams, DM, Treharne, H, Ho, ATS and Culnane, C (2008) Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol In: ACM Multimedia and Security Workshop, 2008-09-22 - 2008-09-23, Oxford Univ Comp Lab, Oxford, ENGLAND.

Culnane, C, Treharne, H and Ho, ATS (2008) Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning In: IWDW 2007, 2007-12-03 - 2007-12-05, Guangzhou, China.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP || B skeletons from xUML models In: ICTAC 2008: 5th International Colloquium, 2008-09-01 - 2008-09-03, Istanbul, Turkey.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Culnane, C, Treharne, H and Ho, ATS (2008) Improving mutli-set formatted binary text watermarking using continuous line embedding

Culnane, C, Treharne, H and Ho, ATS (2008) Improving mutli-set formatted binary text watermarking using continuous line embedding

Jiang, WN, Ho, ATS and Treharne, H (2008) Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model In: IWDW 2007, 2007-12-03 - 2007-12-05, Guangzhou, China.

Evans, N and Treharne, H (2007) Interactive tool support for CSP parallel to B consistency checking In: 5th International Workshop on Automated Verification of Critical Systems (AVoCS 05), 2005-09-12 - 2005-09-13, Univ Warwick, Coventry, ENGLAND.

Karkinsky, D, Schneider, S and Treharne, H (2007) Combining mobility with state In: 6th International Conference on Integrated Formal Methods, 2007-07-02 - 2007-07-05, Oxford, ENGLAND.

Zhao, X, Ho, ATS, Treharne, H, Pankajakshan, V, Culnane, C, Jiang, W, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2006) A Step towards Merging xUML and CSP||B In: Seminar on Rigorous Methods for Software Construction and Analysis, 2006-05-07 - 2006-05-12, Schloss Dagstuhl, GERMANY.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Treharne, H and Schneider, S (1999) Using a Process Algebra to Control B Operations. In: 1st International Conference on Integrated Formal Methods, ? - ?.

Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Schneider, SA, Treharne, H and Vajar, B Introducing mobility into CSP||B In: 7th International Workshop on Automated Verification of Critical Systems, 2007-09-10 - 2007-09-12, Oxford, UK.

Vajar, B, Schneider, S and Treharne, H Mobile CSP||B In: 9th International Workshop on Automated Verification of Critical Systems, 2009-09-23 - 2009-09-25.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Lundin, D, Treharne, H, Ryan, PYA, Schneider, S and Heather, J Distributed creation of the ballot form in Pret a Voter using an element of Visual Encryption In: WOTE: Workshop on Trustworthy Elections, 2006 - ?, Cambridge, UK.

Other

Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

This list was generated on Thu Nov 23 18:46:30 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800