UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Jump to: B | C | D | G | H | K | L | M | O | S | T | Z
Number of items: 36.

B

Banzhaf, W; Langdon, WB; (2002) Some considerations on the reason for bloat. Genetic Programming and Evolvable Machines , 3 , Article 1. 10.1023/A:1014548204452.

Bennett, K; Munro, M; Xu, J; Gold, N; Layzell, P; Mehandjiev, N; ... Brereton, P; + view all (2002) Prototype Implementations of an Architectural Model for Service-Based Flexible Software. In: 35th Annual Hawaii International Conference on System Sciences (HICSS’02).

Bowen, JP; Bogdanov, K; Clark, JA; Harman, M; Hierons, RM; Krause, P; (2002) FORTEST: Formal methods and testing. In: 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS. (pp. 91 - 101). IEEE COMPUTER SOC

C

Clark, D; Hankin, C; Hunt, S; (2002) Information flow for Algol-like languages. Computer Languages , 28 (1) 3 - 28. 10.1016/S0096-0551(02)00006-1.

D

Daoudi, M; Ouarbya, L; Harman, M; Fox, C; Ward, MP; (2002) ConSUS: A scalable approach to conditioned slicing. In: VanDeursen, A and Burd, E, (eds.) NINTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS. (pp. 109 - 118). IEEE COMPUTER SOC

G

Gold, N; Bennett, K; (2002) Hypothesis-based concept assignment in software maintenance. IEE Proceedings: Software , 149 (4) 103 - 111. 10.1049/ip-sen:20020549.

H

Harman, M; Fox, C; Hierons, R; Hu, L; Danicic, S; Wegener, J; (2002) VADA: A transformation-based system for variable dependence analysis. In: SCAM 2002: SECOND IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS MANIPULATION, PROCEEDINGS. (pp. 55 - 64). IEEE COMPUTER SOC

Harman, M; Gold, N; Hierons, R; Binkley, D; (2002) Code extraction algorithms which unify slicing and concept assignment. In: VanDeursen, A and Burd, E, (eds.) NINTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS. (pp. 11 - 20). IEEE COMPUTER SOC

Harman, M; Hierons, RM; Proctor, M; (2002) A New Representation And Crossover Operator For Search-based Optimization Of Software Modularization. In: Langdon, WB and Cantú-Paz, E and Mathias, KE and Roy, R and Davis, D and Poli, R and Balakrishnan, K and Honavar, V and Rudolph, G and Wegener, J and Bull, L and Potter, MA and Schultz, AC and Miller, JF and Burke, EK and Jonoska, N, (eds.) GECCO. (pp. 1351 - 1358). Morgan Kaufmann

Harman, M; Hu, L; Hierons, R; Fox, C; Danicic, S; Wegener, J; ... Baresel, A; + view all (2002) Evolutionary testing supported by slicing and transformation. In: INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS. (pp. 285 - 285). IEEE COMPUTER SOC

Harman, M; Hu, L; Hierons, R; Munro, M; Zhang, XY; Dolado, JJ; ... Wegener, J; + view all (2002) A post-placement side-effect removal algorithm. In: INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS. (pp. 2 - 11). IEEE COMPUTER SOC

Harman, M; Hu, L; Hierons, RM; Baresel, A; Sthamer, H; (2002) Improving Evolutionary Testing By Flag Removal. In: Langdon, WB and Cantú-Paz, E and Mathias, KE and Roy, R and Davis, D and Poli, R and Balakrishnan, K and Honavar, V and Rudolph, G and Wegener, J and Bull, L and Potter, MA and Schultz, AC and Miller, JF and Burke, EK and Jonoska, N, (eds.) GECCO. (pp. 1359 - 1366). Morgan Kaufmann

Harman, M; Hu, L; Munro, M; Zhang, XY; Danicic, S; Daoudi, M; Ouarbya, L; (2002) An interprocedural amorphous slicer for WSL. In: SCAM 2002: SECOND IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS MANIPULATION, PROCEEDINGS. (pp. 105 - 114). IEEE COMPUTER SOC

Harman, M; Munro, M; Hu, L; Zhang, XY; (2002) Source code analysis and manipulation. INFORM SOFTWARE TECH , 44 (13) 717 - 720.

Hierons, R; Harman, M; Fox, C; Ouarbya, L; Daoudi, M; (2002) Conditioned slicing supports partition testing. SOFTW TEST VERIF REL , 12 (1) 23 - 28. 10.1002/stvr.232.

K

Krinke, J; (2002) Evaluating context-sensitive slicing and chopping. In: INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS. (pp. 22 - 31). IEEE COMPUTER SOC

Krinke, J; Störzer, M; Zeller, A; (2002) Web-basierte Programmierpraktika mit Praktomat. In: Softwaretechnik-Trends.

L

Langdon, WB; (2002) Application of genetic programming in drug lead discovery. UNSPECIFIED, Seville, Spain.

Langdon, WB; (2002) Evolutionary Computation II Session at BNAIC 2002. Newsletter BNVKI , 19(6) 145 - 146.

Langdon, WB; (2002) Structure of the Genetic Programming Search Space. In: Dagstuhl.

Langdon, WB; (2002) Was Occam Wrong? Blunting Occam's Razor. BNVKI Newsletter , 19 (3) 56 - 57.

Langdon, WB; (2002) A Hybrid Genetic Programming Neural Network Classifier for Use in Drug Discovery. In: Abraham, A and Javier, R and Koppen, M, (eds.) Soft Computing Systems - Design, Management and Applications, 1-4 December 2002. (6 - ?). IOS Press

Langdon, WB; (2002) How many Good Programs are there? How Long are they? In: De Jong, KA and Poli, R and Rowe, JE, (eds.) Foundations of Genetic Algorithms VII. (183 - 202). Morgan Kaufmann: Spain.

Langdon, WB; (2002) Convergence Rates for the Distribution of Program Outputs. In: Langdon, WB and Wegener, J and Bull, L and Potter, MA and Schultz, AC and Miller, JF and Burke, E and Jonoska, N and Cantú-Paz, E and Mathias, KE and Roy, R and Davis, D and Poli, R and Balakrishnan, K and Honavar, VG and Rudolph, G, (eds.) GECCO-2002: Proceedings of the Genetic and Evolutionary Computation Conference: July 9-13, 2002. (pp. 812 - 819). Morgan Kaufmann: San Francisco, US.

Langdon, WB; (2002) Characteristics of the Genetic Programming Search Space. : University of Hertfordshire.

Langdon, WB; Buxton, BF; Barrett, SJ; (2002) Combining Machine Learning techniques to Predict Compounds’ Cytochrome P450 High Throughput Screening Inhibition. UNSPECIFIED

Langdon, WB; Poli, R; (2002) Foundations of Genetic Programming. Springer

Lano, K; Clark, D; Androutsopoulos, K; (2002) From Implicit Specifications to Explicit Designs in Reactive System Development. In: IFM. (pp. 49-68 - 49-68).

Lano, K; Clark, D; Androutsopoulos, K; (2002) Safety and Security Analysis of Object-Oriented Models. In: SAFECOMP. (pp. 82-93 - 82-93).

M

Mahdavi, K; Harman, M; (2002) Book Review: Automatic Re-Engineering of Software Using Genetic Programming. In: Genetic Programming and Evolvable Machines. (pp. 219 - 221).

O

Ouarbya, L; Danicic, S; Daoudi, M; Harman, M; Fox, C; (2002) A Denotational Interprocedural Program Slicer. In: Deursen, AV and Burd, E, (eds.) WCRE. (pp. 181 - 181). IEEE Computer Society

Ouarbya, L; Danicic, S; Daoudi, M; Harman, M; Fox, C; (2002) A denotational interprocedural program slicer. In: VanDeursen, A and Burd, E, (eds.) NINTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS. (pp. 181 - 189). IEEE COMPUTER SOC

S

Sivagurunathan, Y; Harman, M; Sivagurunathan, B; (2002) Slice-based dynamic memory modelling - A case study. In: 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS. (pp. 351 - 356). IEEE COMPUTER SOC

T

Tjortjis, C; Gold, N; Layzell, P; Bennett, K; (2002) From system comprehension to program comprehension. In: Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. (pp. 427 - 432).

Z

Zhang, X; Munro, M; Harman, M; Hu, L; (2002) Weakest Precondition for General Recursive Programs Formalized in Coq. In: Carreño, V and Muñoz, CA and Tahar, S, (eds.) TPHOLs. (pp. 332 - 348). Springer

Zhang, XY; Munro, M; Harman, M; Hu, L; (2002) Mechanized operational semantics of WSL. In: SCAM 2002: SECOND IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS MANIPULATION, PROCEEDINGS. (pp. 73 - 82). IEEE COMPUTER SOC

This list was generated on Sun Jul 27 08:31:31 2014 BST.