Lecture Notes in Computer Science, 0302-9743

Journal

Publications

  1. 2014
  2. Published
  3. 2008
  4. Published

    Normalization Issues in Mathematical Representations

    Manfred Kerber, 1 Jan 2008, In: Lecture Notes in Computer Science. 5144, p. 494-503 10 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    On-the-Fly Techniques for Game-Based Software Model Checking

    Adam Bakewell & Dan Ghica, 1 Jan 2008, In: Lecture Notes in Computer Science. 4963, p. 78-92 15 p.

    Research output: Contribution to journalArticle

  6. Published

    Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software

    Mark Ryan, 1 Jan 2008, In: Lecture Notes in Computer Science. 4991, p. 233-247 15 p.

    Research output: Contribution to journalArticle

  7. Published

    Unimanual and bimanual weight discrimination in a desktop setup

    Christos Giachritsis & Alan Wing, 1 Jan 2008, In: Lecture Notes in Computer Science. 5024, p. 378-382 5 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol

    Mark Ryan, 1 Jan 2008, In: Lecture Notes in Computer Science. 4991, p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Virtual Forced Splitting, Demotion and the BV-Tree

    Alan Sexton, 1 Jan 2008, In: Lecture Notes in Computer Science. 5071, p. 139-152 14 p.

    Research output: Contribution to journalArticlepeer-review

  10. 2005
  11. Published

    A New Algorithm for Strategy Synthesis in LTL Games

    Aidan Harding, Mark Ryan, 1 Jan 2005, In: Lecture Notes in Computer Science. 3440, p. 477-492 16 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A timing analysis of AODV

    Marta Kwiatkowska, 1 Jan 2005, In: Lecture Notes in Computer Science. 3535, p. 306-321 16 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    An MTBDD-based implementation of forward reachability for probabilistic timed automata

    Marta Kwiatkowska, 1 Jan 2005, In: Lecture Notes in Computer Science. 3707, p. 385-399 15 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Analysis of an Electronic Voting Protocol in the Applied Pi Calculus

    Mark Ryan, 1 Jan 2005, In: Lecture Notes in Computer Science. 3444, p. 186-200 15 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Application of fuzzy similarity to prediction of epileptic seizures using EEG signals

    Xiaoli Li & Xin Yao, 1 Jan 2005, In: Lecture Notes in Computer Science. 3613, p. 645-652 8 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Between Two Extremes: Examining Decompositions of the Ensemble Objective Function

    Jeremy Wyatt & Ping Sun, 1 Jan 2005, In: Lecture Notes in Computer Science. 3541, p. 296-305 10 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Can a higher-order and a first-order theorem prover cooperate?

    Volker Sorge, Mateja Jamnik & Manfred Kerber, 1 Jan 2005, In: Lecture Notes in Computer Science. 3452, p. 415-431 17 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Coarse-graining selection and mutation

    Jon Rowe, 1 Jan 2005, In: Lecture Notes in Computer Science. 3469, p. 176-191 16 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Data-abstraction refinement: a game semantic approach

    Dan Ghica, 1 Jan 2005, In: Lecture Notes in Computer Science. 3672, p. 102-117 16 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Evaluating Access Control Policies through Model Checking

    Mark Ryan & Dimitar Guelev, 1 Jan 2005, In: Lecture Notes in Computer Science. 3650, p. 446-460 15 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Finding uninformative features in binary data

    Xu Wang & Ata Kaban, 1 Jan 2005, In: Lecture Notes in Computer Science. 3578, p. 40-47 8 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Model-based Parameter Recovery from Uncalibrated Optical Images

    Stephen Preece, Iain Styles, Ela Claridge, 1 Jan 2005, In: Lecture Notes in Computer Science. 3750, p. 509-516 8 p.

    Research output: Contribution to journalArticle

  23. Published

    Using inductive rules in medical case-based reasoning system

    John Barnden, 1 Jan 2005, In: Lecture Notes in Computer Science. 3789, p. 900-909 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. 2004
  25. Published

    Angelic semantics of fine-grained concurrency

    Dan Ghica, 1 Mar 2004, In: Lecture Notes in Computer Science. 2987, p. 211-225 15 p.

    Research output: Contribution to journalArticlepeer-review

  26. 2003
  27. Published

    Analysis of Probabilistic Contract Signing

    Gethin Norman, 1 Jan 2003, In: Lecture Notes in Computer Science. 2629, p. 81-96 16 p.

    Research output: Contribution to journalArticlepeer-review