Lecture Notes in Computer Science, 0302-9743
Journal
Publications
- 2014
- Published
Dynamic selection of evolutionary algorithm operators based on online learning and fitness landscape metrics
Leandro Minku & Xin Yao, 2014, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8886, p. 359-370 12 p.Research output: Contribution to journal › Article › peer-review
- 2008
- Published
Normalization Issues in Mathematical Representations
Manfred Kerber, 1 Jan 2008, In: Lecture Notes in Computer Science. 5144, p. 494-503 10 p.Research output: Contribution to journal › Article › peer-review
- Published
On-the-Fly Techniques for Game-Based Software Model Checking
Adam Bakewell & Dan Ghica, 1 Jan 2008, In: Lecture Notes in Computer Science. 4963, p. 78-92 15 p.Research output: Contribution to journal › Article
- Published
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software
Mark Ryan, 1 Jan 2008, In: Lecture Notes in Computer Science. 4991, p. 233-247 15 p.Research output: Contribution to journal › Article
- Published
Unimanual and bimanual weight discrimination in a desktop setup
Christos Giachritsis & Alan Wing, 1 Jan 2008, In: Lecture Notes in Computer Science. 5024, p. 378-382 5 p.Research output: Contribution to journal › Article › peer-review
- Published
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol
Mark Ryan, 1 Jan 2008, In: Lecture Notes in Computer Science. 4991, p. 1-13 13 p.Research output: Contribution to journal › Article › peer-review
- Published
Virtual Forced Splitting, Demotion and the BV-Tree
Alan Sexton, 1 Jan 2008, In: Lecture Notes in Computer Science. 5071, p. 139-152 14 p.Research output: Contribution to journal › Article › peer-review
- 2005
- Published
A New Algorithm for Strategy Synthesis in LTL Games
Aidan Harding, Mark Ryan, 1 Jan 2005, In: Lecture Notes in Computer Science. 3440, p. 477-492 16 p.Research output: Contribution to journal › Article › peer-review
- Published
A timing analysis of AODV
Marta Kwiatkowska, 1 Jan 2005, In: Lecture Notes in Computer Science. 3535, p. 306-321 16 p.Research output: Contribution to journal › Article › peer-review
- Published
An MTBDD-based implementation of forward reachability for probabilistic timed automata
Marta Kwiatkowska, 1 Jan 2005, In: Lecture Notes in Computer Science. 3707, p. 385-399 15 p.Research output: Contribution to journal › Article › peer-review
- Published
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Mark Ryan, 1 Jan 2005, In: Lecture Notes in Computer Science. 3444, p. 186-200 15 p.Research output: Contribution to journal › Article › peer-review
- Published
Application of fuzzy similarity to prediction of epileptic seizures using EEG signals
Xiaoli Li & Xin Yao, 1 Jan 2005, In: Lecture Notes in Computer Science. 3613, p. 645-652 8 p.Research output: Contribution to journal › Article › peer-review
- Published
Between Two Extremes: Examining Decompositions of the Ensemble Objective Function
Jeremy Wyatt & Ping Sun, 1 Jan 2005, In: Lecture Notes in Computer Science. 3541, p. 296-305 10 p.Research output: Contribution to journal › Article › peer-review
- Published
Can a higher-order and a first-order theorem prover cooperate?
Volker Sorge, Mateja Jamnik & Manfred Kerber, 1 Jan 2005, In: Lecture Notes in Computer Science. 3452, p. 415-431 17 p.Research output: Contribution to journal › Article › peer-review
- Published
Coarse-graining selection and mutation
Jon Rowe, 1 Jan 2005, In: Lecture Notes in Computer Science. 3469, p. 176-191 16 p.Research output: Contribution to journal › Article › peer-review
- Published
Data-abstraction refinement: a game semantic approach
Dan Ghica, 1 Jan 2005, In: Lecture Notes in Computer Science. 3672, p. 102-117 16 p.Research output: Contribution to journal › Article › peer-review
- Published
Evaluating Access Control Policies through Model Checking
Mark Ryan & Dimitar Guelev, 1 Jan 2005, In: Lecture Notes in Computer Science. 3650, p. 446-460 15 p.Research output: Contribution to journal › Article › peer-review
- Published
Finding uninformative features in binary data
Xu Wang & Ata Kaban, 1 Jan 2005, In: Lecture Notes in Computer Science. 3578, p. 40-47 8 p.Research output: Contribution to journal › Article › peer-review
- Published
Model-based Parameter Recovery from Uncalibrated Optical Images
Stephen Preece, Iain Styles, Ela Claridge, 1 Jan 2005, In: Lecture Notes in Computer Science. 3750, p. 509-516 8 p.Research output: Contribution to journal › Article
- Published
Using inductive rules in medical case-based reasoning system
John Barnden, 1 Jan 2005, In: Lecture Notes in Computer Science. 3789, p. 900-909 10 p.Research output: Contribution to journal › Article › peer-review