1. 2016
  2. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 2015
  4. Published

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B., 9 Nov 2015, 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, p. 43-54 12 p. (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Tractable classes of binary CSPs defined by excluded topological minors

    Cohen, D., Cooper, M., Jeavons, P. & Zivny, S., 25 Jul 2015, p. 1945-1951. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Forthcoming

    Provably Pointless Propagator Calls

    Cohen, D., Jefferson, C. & Petrie, K., 5 Jul 2015, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  8. Published

    Controllability and matchings in random bipartite graphs

    Balister, P. & Gerke, S., Jul 2015, Surveys in Combinatorics 2015. Czumaj, A., Georgakopoulos, A., Král, D., Lozin, V. & Pikhurko, O. (eds.). Cambridge University Press, Vol. 424. p. 119-146 28 p. (London Mathematical Society Lecture Note Series; vol. 424).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published
  10. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  13. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Short Proofs for the Determinant Identities

    Hrubes, P. & Tzameret, I., 7 Apr 2015, In: SIAM Journal on Computing. 44, 2, p. 340–383 44 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Maximizing the minimum load for random processing times

    Gerke, S., Panagiotou, K., Schwartz, J. & Steger, A., Jan 2015, In: ACM Transactions on Algorithms (TALG). 11, 3, p. 1-19 19 p., 17.

    Research output: Contribution to journalArticlepeer-review

  16. Unpublished

    Håstad‘s Separation of Constant-Depth Circuits Using Sipser Functions

    Tzameret, I., 2015, (Unpublished) Expository Note. 15 p.

    Research output: Book/ReportOther report

  17. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2015, (Accepted/In press) 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M., 2015, (Accepted/In press) 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Forthcoming

    Pattern Backtracking Algorithm for the Workflow Satisfiability Problem with User-Independent Constraints

    Karapetyan, D., Gagarin, A. & Gutin, G., 2015, (Accepted/In press) FAW 2015, Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2015, In: Algorithmica. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Structural Parameterizations of the Mixed Chinese Postman Problem

    Gutin, G., Jones, M. & Wahlstrom, M., 2015, 23rd Europ. Symp. Algorithms (ESA 2015). Springer-Verlag, Vol. 9294. p. 668-679 (Lect. Notes Comput. Sci.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. 2014
  24. Published

    Non-commutative Formulas and Frege Lower Bounds: a New Characterization of Propositional Proofs

    Li, F., Tzameret, I. & Wang, Z., 30 Dec 2014, ArXiV. p. 1 32 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  25. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 21 Nov 2014, In: Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 1 Sep 2014, In: ACM Journal of Experimental Algorithmics. 19, 2.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Calculation of Discrepancy Measures and Applications

    Doerr, C., Gnewuch, M. & Wahlström, M., 2014, A Panorama of Discrepancy Theory. Chen, W., Srivastav, A. & Travaglini, G. (eds.). Springer, p. 621-678 58 p. (Lecture Notes in Mathematics; vol. 2107).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Forthcoming

    Clique cover and graph separation: New incompressibility results

    Cygan, M., Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2014, (Accepted/In press) In: ACM Transactions on Computation Theory (TOCT). 6, 2

    Research output: Contribution to journalArticlepeer-review

  32. Forthcoming

    Compression via Matroids: A Randomized Polynomial Kernel for Odd Cycle Transversal

    Kratsch, S. & Wahlström, M., 2014, (Accepted/In press) In: ACM Transactions on Algorithms (TALG). 10, 4, 20 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M., 2014, SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Kernelization, Matroid Methods

    Wahlström, M., 2014, Encyclopedia of Algorithms. Kao, M-Y. (ed.). Springer, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M., 2014, Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Satisfying More Than Half of a System of Linear Equations Over GF(2): A Multivariate Approach

    Crowston, R., Fellows, M., Gutin, G., Jones, M., Kim, E. J., Rosamond, F., Ruzsa, I. Z., Thomasse, S. & Yeo, A., 2014, In: Journal of Computer and System Sciences. 80, p. 687-696

    Research output: Contribution to journalArticlepeer-review

  42. 2013
  43. Published

    COMMODITY12: A smart e-health environment for diabetes management

    Kafali, O., Bromuri, S., Sindlar, M., van der Weide, T., Aguilar Pelaez, E., Schaechtle, U., Alves, B., Zufferey, D., Rodriguez-Villegas, E., Schumacher, M. & Stathis, K., Oct 2013, In: Journal of Ambient Intelligence and Smart Environments. 5, 5, p. 479-502

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Refuting Random 3CNF Formulas in Propositional Logic

    Muller, S. & Tzameret, I., Oct 2013, p. 201. 208 p.

    Research output: Contribution to conferencePaper

  45. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A., Jun 2013, In: ACM Transactions on Information and System Security. 16, 1, 4.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Coercive subtyping: theory and implementation

    Luo, Z., Soloviev, S. & Xue, T., Feb 2013, In: Information and Computation. 223, p. 18-42

    Research output: Contribution to journalArticlepeer-review

  48. Published

    (Non-)existence of Polynomial Kernels for the Test Cover Problem

    Gutin, G., Muciaccia, G. & Yeo, A., 2013, In: Information Processing Letters. 113, p. 123-126

    Research output: Contribution to journalArticlepeer-review

  49. Published

    A Completeness Theory for Polynomial (Turing) Kernelization

    Hermelin, D., Kratsch, S., Soltys, K., Wahlström, M. & Wu, X., 2013, IPEC. Springer, Vol. LNCS 8246. p. 202 215 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Forthcoming

    A new bound for 3-satisfiable MaxSat and its algorithmic application

    Gutin, G., Jones, M., Scheder, D. & Yeo, A., 2013, (Accepted/In press) In: Information and Computation. 8 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    A Self-Healing Distributed Pervasive Health System

    Bromuri, S., Schumacher, M. & Stathis, K., 2013, In: Int. J. of Web Engineering and Technology. 8, 2, p. 177 196 p.

    Research output: Contribution to journalArticlepeer-review

  52. Unpublished

    Above And Below Guarantee Parameterizations For Combinatorial Optimisation Problems

    Jones, M., 2013, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  53. Published

    Abusing the Tutte Matrix: An Algebraic Instance Compression for the K-set-cycle Problem

    Wahlström, M., 2013, STACS. p. 341-352 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    An Algebraic Theory of Complexity for Discrete Optimisation

    Cohen, D. A., Cooper, M. C., Creed, P., Jeavons, P. G. & Živný, S., 2013, In: SIAM Journal on Computing. 42, 5, p. 1915-1939 24 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Argumentative Agents for Service-Oriented Computing

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P., Stathis, K. & Toni, F., 2013, Multiagent Systems and Applications. Ganzha, M. & Jain, L. C. (eds.). Springer-Verlag Berlin Heidelberg, p. 217-255 39 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  56. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Maximum Balanced Subgraph Problem Parameterized Above Lower Bound

    Crowston, R., Gutin, G., Jones, M. & Muciaccia, G., 2013, In: Theoretical Computer Science. 513, p. 434-445

    Research output: Contribution to journalArticlepeer-review

  59. Forthcoming

    Parameterized Complexity of k-Chinese Postman Problem

    Gutin, G., Muciaccia, G. & Yeo, A., 2013, (Accepted/In press) In: Theoretical Computer Science.

    Research output: Contribution to journalArticlepeer-review

  60. Forthcoming

    Parameterized Complexity of MaxSat Above Average

    Crowston, R., Gutin, G., Jones, M., Raman, V. & Saurabh, S., 2013, (Accepted/In press) In: Theoretical Computer Science.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Parameterized Complexity of Satisfying Almost All Linear Equations over F_2

    Crowston, R., Gutin, G., Jones, M. & Yeo, A., 2013, In: Theory of Computing Systems. 52, p. 719-728

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2013, In: Algorithmica. 65, 4, p. 802-816 15 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Proving Random Formulas in Propositional Logic

    Tzameret, I. & Muller, S., 2013, Logic Across the University: Foundations and Application: Proceedings of the Tsinghua Logic Conference. van Benthem, J. & Liu, F. (eds.). London: College Publications London, Vol. 47. p. 201-208 8 p. (Studies in Logic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Two Edge Modification Problems Without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 2013, In: Discrete Optimization. 10, p. 193-199

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Variable Elimination in Binary CSP via Forbidden Patterns

    Cohen, D., Cooper, M. C., Escamocher, G. & Zivný, S., 2013.

    Research output: Contribution to conferencePaperpeer-review

  66. 2012
  67. Published

    The tractability of CSP classes defined by forbidden patterns

    Cohen, D. A., Cooper, M. C., Creed, P., Marx, D. & Salamon, A. Z., Sep 2012, In: Journal of Artificial Intelligence Research. 45, p. 47-78 3651.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Ubiquitous Agents for Ambient Ecologies

    Dipsis, N. & Stathis, K., Aug 2012, In: Pervasive and Mobile Computing. 8, 4, p. 562-574

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Short Propositional Refutations for Dense Random 3CNF Formulas

    Muller, S. & Tzameret, I., Jun 2012, Proceedings of the 27th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS): 25-28 June 2012. p. 501-510 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    An algorithm for finding input-output constrained convex sets in an acyclic digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E. & Yeo, A., May 2012, In: Journal of Discrete Algorithms. 13, p. 47-58 12 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday

    Artikis, A. (ed.), Craven, R. (ed.), Cicekli, N. K. (ed.), Sadighi, B. (ed.) & Stathis, K. (ed.), 2012, SPRINGER-VERLAG BERLIN.

    Research output: Book/ReportScholarly edition

  72. Published

    Open Objects for Ambient Intelligence

    Goncalves, P. & Stathis, K., 2012.

    Research output: Contribution to conferencePaperpeer-review

  73. 2011
  74. Published

    A formal model of agent-oriented virtual organisations and their formation

    McGinnis, J., Stathis, K. & Toni, F., 29 Dec 2011, In: Multiagent and Grid Systems. 7, 6, p. 291-310

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Producing Enactable Protocols in Artificial Agent Societies

    Lekeas, G., Kloukinas, C. & Stathis, K., 18 Nov 2011, Agents in Principle, Agents in Practice (PRIMA'11). p. 311-322 (Lecture Notes in Computer Science; vol. 7047/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Solving MAX-r-SAT Above a Tight Lower Bound

    Alon, N., Gutin, G., Kim, E. J., Szeider, S. & Yeo, A., 1 Nov 2011, In: Algorithmica. 61, 3, p. 638-655

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Monitoring Gestational Diabetes Mellitus with Cognitive Agents and Agent Environments

    Bromuri, S., Schumacher, M., Stathis, K. & Ruiz, J., 23 Aug 2011, p. 409-414. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  79. Published

    A Pluralist Approach to the Formalisation of Mathematics

    Adams, R. & Luo, Z., 2 Jul 2011, In: Mathematical Structures in Computer Science. 21, 4, p. 913-942 29 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    LDT: a language definition technique

    Johnstone, A., Scott, E. & van den Brand, M., 26 Mar 2011, LDTA '11 Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    A probabilistic approach to problems parameterized above or below tight bounds

    Gutin, G., Kim, E. J., Szeider, S. & Yeo, A., Mar 2011, In: Journal of Computer and System Sciences. 77, 2, p. 422-429

    Research output: Contribution to journalArticlepeer-review

  82. Published

    A characterization of horizontal visibility graphs and combinatorics on words

    Gutin, G., Mansour, T. & Severini, S., 2011, In: Physica A: Statistical Mechanics and its Applications . 390, p. 2421-2428

    Research output: Contribution to journalArticlepeer-review

  83. Forthcoming

    A New Approach to Population Sizing for Memetic Algorithms: A Case Study for the Multidimensional Assignment Problem

    Karapetyan, D. & Gutin, G., 2011, (Accepted/In press) In: Evolutionary Computation. in press

    Research output: Contribution to journalArticlepeer-review

  84. Published

    A new bound on the domination number of graphs with minimum degree two

    Henning, M., Schiermeyer, I. & Yeo, A., 2011, In: The Electronic Journal of Combinatorics. 18, 1

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Algebraic Proofs over Noncommutative Formulas

    Tzameret, I., 2011, In: Information and Computation. 209, 10, p. 1269-1292 24 p.

    Research output: Contribution to journalArticlepeer-review

  86. Forthcoming

    All Ternary Permutation Constraint Satisfaction Problems Parameterized Above Average Have Kernels with Quadratic Number of Vertices

    Gutin, G., van Iersel, L., Mnich, M. & Yeo, A., 2011, (Accepted/In press) In: Journal of Computer and System Sciences. in press

    Research output: Contribution to journalArticlepeer-review

  87. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Contextual analysis of word meanings in type-theoretical semantics

    Luo, Z., 2011, Logical Aspects of Computational Linguistics:6th International Conference, LACL 2011, Montpellier, France, June 29 – July 1, 2011: Proceedings. Pogodalla, S. & Prost, J-P. (eds.). Springer, p. 159-174 16 p. (Lecture Notes in Computer Science; vol. 6736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    Lambda-Free Logical Frameworks

    Adams, R., 2011, (Accepted/In press) In: Annals of Pure and Applied Logic.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Lin-Kernighan Heuristic Adaptations for the Generalized Traveling Salesman Problem

    Gutin, G. & Karapetyan, D., 2011, In: European Journal of Operational Research. 208, p. 221-232

    Research output: Contribution to journalArticlepeer-review

  91. Forthcoming

    Local Search Heuristics for the Multidimensional Assignment Problem

    Gutin, G. & Karapetyan, D., 2011, (Accepted/In press) In: Journal of Heuristics. 17, 3

    Research output: Contribution to journalArticlepeer-review

  92. Published

    On guaranteeing polynomially-bounded search tree size

    Cohen, D., Cooper, M., Green, M. J. & Marx, D., 2011.

    Research output: Contribution to conferencePaperpeer-review

  93. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Vertex Cover Problem Parameterized Above and Below Tight Bounds

    Gutin, G., Kim, E. J., Lampis, M. & Mitsou, V., 2011, In: Theory of Computing Systems. 48, p. 402-410

    Research output: Contribution to journalArticlepeer-review

  96. 2010
  97. Published

    Betweenness parameterized above tight lower bound

    Gutin, G., Kim, E. J., Mnich, M. & Yeo, A., Dec 2010, In: Journal of Computer and System Sciences. 76, 8, p. 872-878

    Research output: Contribution to journalArticlepeer-review

  98. Published

    GLL Parsing

    Scott, E. & Johnstone, A., 17 Sep 2010, In: Electronic Notes in Theoretical Computer Science. 253, 7, p. 177-189 13 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    Classical Predicative Logic-Enriched Type Theories

    Adams, R. & Luo, Z., Aug 2010, In: Annals of Pure and Applied Logic. 161, 11, p. 1315-1345 31 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Tear-Insert-Fold grammars

    Johnstone, A. & Scott, E., 28 Mar 2010, LDTA '10 Proceedings of the Tenth Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    An agile approach to language modelling and development

    Johnstone, A., Mosses, P. D. & Scott, E., Mar 2010, In: Innovations in Systems and Software Engineering. 6, 1-2, p. 145-153 9 p.

    Research output: Contribution to journalArticlepeer-review

  102. Published

    FPT Algorithms and Kernels for the Directed k-Leaf Problem

    Daligault, J., Gutin, G., Kim, E. J. & Yeo, A., Mar 2010, In: Journal of Computer and System Sciences. 76, 2, p. 144-152 9 p.

    Research output: Contribution to journalArticlepeer-review

  103. Published

    A Formal Framework of Virtual Organisations as Agent Societies

    McGinnis, J., Stathis, K. & Toni, F., 25 Jan 2010, p. 1-14. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  104. Published

    Recognition is not parsing — SPPF-style parsing from cubic recognisers

    Scott, E. & Johnstone, A., 1 Jan 2010, In: Science of Computer Programming. 75, 1-2, p. 55-70 16 p.

    Research output: Contribution to journalArticlepeer-review

  105. Published

    Special Issue on ETAPS 2006 and 2007 Workshops on Language Descriptions, Tools, and Applications (LDTA'06 and '07) Preface

    Johnstone, A., Sloane, A. & Boyland, J. T., 1 Jan 2010, In: Science of Computer Programming. 75, 1-2, p. 1-2 2 p.

    Research output: Contribution to journalEditorialpeer-review

  106. Published

    Weyl's predicative classical mathematics as a logic-enriched type theory

    Adams, R. & Luo, Z., Jan 2010, In: ACM Transactions on Computational Logic. 11, 2, 31 p., 11.

    Research output: Contribution to journalArticlepeer-review

  107. Published

    A Service Oriented Approach for Ubiquitous Agents in AMI Systems Using EVATAR

    Dipsis, N. & Stathis, K., 2010, p. 213. 220 p.

    Research output: Contribution to conferencePaperpeer-review