Browse Publications

  1. 2019
  2. Publications content icon
    Published

    Connected chord diagrams and bridgeless maps

    Noam Zeilberger, 22 Nov 2019, In : The Electronic Journal of Combinatorics. 26, 4, 69 p., P4.37.

    Research output: Contribution to journalArticle

  3. Publications content icon
    Published

    Verification and control of turn-based probabilistic real-time games

    David Parker, 4 Nov 2019, The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy: Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday. Alvim, M., Chatzikokolakis, K., Olarte, C. & Valencia, F. (eds.). Springer, Vol. 11760. p. 379-396 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Publications content icon
    Published
  5. Publications content icon
    Published

    An asymptotic bound for the strong chromatic number

    Allan Lo, Sep 2019, In : Combinatorics, Probability and Computing. 28, 5, p. 768-776 9 p.

    Research output: Contribution to journalArticle

  6. Publications content icon
    Published

    Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

    Tom Chothia, Chris Novakovic, Andreea Radu & Richard J Thomas, 27 Apr 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 141-172 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Publications content icon
    E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Christophe Petit, 6 Apr 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Sako, K. & Lin, D. (eds.). Springer, p. 646-678 33 p. (Lecture Notes in Computer Science; vol. 11443 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Publications content icon
    E-pub ahead of print

    The 2019 comparison of tools for the analysis of quantitative formal models (QComp 2019 competition report)

    David Parker, 4 Apr 2019, Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2019. Beyer, D., Huisman, M., Kordon, F. & Steffen, B. (eds.). Springer, Vol. 3. p. 69-92 24 p. (Lecture Notes in Computer Science; vol. 11429).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Publications content icon
    Published

    Tilings in randomly perturbed dense graphs

    Andrew Treglown, Mar 2019, In : Combinatorics, Probability and Computing. 28, 2, p. 159-176 18 p.

    Research output: Contribution to journalArticle

  10. Publications content icon
    Published

    A sequent calculus for a semi-associative law

    Noam Zeilberger, 5 Feb 2019, In : Logical Methods in Computer Science. 15, 1, p. 9:1-9:23 23 p., 9.

    Research output: Contribution to journalArticle

  11. 2018
  12. Publications content icon
    Published

    The sequent calculus of skew monoidal categories

    Noam Zeilberger, 1 Dec 2018, In : Electronic Notes in Theoretical Computer Science. 341, p. 345-370 26 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...17 Next