University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Browse by Publication

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 19.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. 221 - 237.

Panov, M, Tatarchuk, A, Mottl, V and Windridge, D (2011) A modified neutral point method for kernel-based fusion of pattern-recognition modalities with incomplete data sets Lecture Notes in Computer Science, 6713. 126 - 136. ISSN 0302-9743

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Barnaghi, P, Moessner, K, Presser, M and Meissner, S (2009) Preface In: 4th European Conference, EuroSSC 2009, 2009-09-16 - 2009-09-18, Guildford, UK.

Heather, J and Wei, K (2009) Where next for formal methods? Lecture Notes in Computer Science, 5087. 52 - 58. ISSN 0302-9743

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. 58 - 78.

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. 416 - 435.

Starck, J and Hilton, A (2002) Reconstruction of animated models from images using constrained deformable surfaces In: 10th Conf. on Discrete Geometry for Computer Imagery, 2002-04-03 - ?.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

This list was generated on Fri Oct 31 04:52:46 2014 GMT.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800