Search Results - "Stepney, S"
-
1
Exploring physical and digital architectures in magnetic nanoring array reservoir computers
Published in Neuromorphic computing and engineering (01-06-2024)“…Abstract Physical reservoir computing (RC) is a machine learning technique that is ideal for processing of time dependent data series. It is also uniquely…”
Get full text
Journal Article -
2
Ternary graph as a questionnaire: a new approach to assessment of quality of life?
Published in British journal of oral & maxillofacial surgery (01-09-2017)“…Abstract This study was prompted by awareness of the importance of research into quality of life (QoL) for patients with diseases of the head and neck, the…”
Get full text
Journal Article -
3
Numerical fits to important rates in high temperature astrophysical plasmas
Published in Monthly notices of the Royal Astronomical Society (01-10-1983)“…We give simple but accurate numerical fits to various two-body rates in relativistic thermal plasmas, in the temperature range $kT_\text e \sim 50\enspace…”
Get full text
Journal Article -
4
Two-body relaxation in relativistic thermal plasmas
Published in Monthly notices of the Royal Astronomical Society (01-02-1983)“…An exact expression for the average energy exchange in a relativistic two-body collision between isotropic particle distributions is calculated. This is used…”
Get full text
Journal Article -
5
Engineering and theoretical underpinnings of retrenchment
Published in Science of computer programming (01-07-2007)“…Refinement is reviewed, highlighting in particular the distinction between its use as a specification constructor at a high level, and its use as an…”
Get full text
Journal Article -
6
Incremental development of a high integrity compiler: experience from an industrial development
Published in Proceedings Third IEEE International High-Assurance Systems Engineering Symposium (Cat. No.98EX231) (1998)“…We have developed and successfully applied a technique to build a high integrity compiler from Pasp, a Pascal-like language, to ASP, the target language for a…”
Get full text
Conference Proceeding -
7
East-West paths to unconventional computing
Published in Progress in biophysics and molecular biology (01-12-2017)“…Unconventional computing is about breaking boundaries in thinking, acting and computing. Typical topics of this non-typical field include, but are not limited…”
Get full text
Journal Article -
8
Pair production, Comptonization and dynamics in astrophysical plasmas
Published in Monthly notices of the Royal Astronomical Society (01-02-1985)“…Electron-positron pair production is an important cooling mechanism for plasmas at mildly relativistic temperatures. A thorough understanding of the process is…”
Get full text
Journal Article -
9
The design of S-boxes by simulated annealing
Published in New generation computing (01-01-2005)Get full text
Journal Article -
10
Challenging formal specifications by mutation: a CSP security example
Published in Tenth Asia-Pacific Software Engineering Conference, 2003 (2003)“…When formal modelling is done we must validate both the model and the assumptions. Formal techniques tend to concentrate on the former. We examine how fault…”
Get full text
Conference Proceeding -
11
The design of s-boxes by simulated annealing
Published in Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753) (2004)“…Substitution boxes are important components in many modern day block and stream ciphers. Their study has attracted a great deal of attention over many years…”
Get full text
Conference Proceeding -
12
Making the most of two heuristics: breaking transposition ciphers with ants
Published in The 2003 Congress on Evolutionary Computation, 2003. CEC '03 (2003)“…Multiple anagramming is a general method for the cryptanalysis of transposition ciphers, and has a graph theoretic representation. Inspired by a partially…”
Get full text
Conference Proceeding -
13
Grammatical Evolution of L-systems
Published in 2009 IEEE Congress on Evolutionary Computation (01-05-2009)“…L-systems are parallel generative grammars that can model branching structures. Taking a graphical object and attempting to derive an L-system describing it is…”
Get full text
Conference Proceeding -
14
Searching for cost functions
Published in Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753) (2004)“…Boolean function design is at the heart of cryptography, and is the subject of a great deal of theoretical research. We have use a simulated annealing approach…”
Get full text
Conference Proceeding -
15
Representation and structural biases in CGP
Published in 2009 IEEE Congress on Evolutionary Computation (01-05-2009)“…An evolutionary algorithm automatically discovers suitable solutions to a problem, which may lie anywhere in a large search space of candidate solutions. In…”
Get full text
Conference Proceeding -
16
Electron-ion coupling in rapidly varying sources
Published in Monthly notices of the Royal Astronomical Society (01-05-1982)“…The Thomson depth of sources radiating at the efficiency limit must lie near unity. This allows us to deduce a general condition on the maximum electron…”
Get full text
Journal Article -
17
Healer, dealer, heart stealer: portrayals of the doctor in popular music
Published in BMJ (Online) (11-12-2014)“…Doctors are often subjects in songs. Rob Stepney and Nick Surawy Stepney look at how they are portrayed…”
Get full text
Journal Article -
18
Gene regulation in a particle metabolome
Published in 2009 IEEE Congress on Evolutionary Computation (01-05-2009)“…The bacterial genome is well understood by biologists. Although its efficiency and adaptability should make it a good model for evolutionary algorithms, the…”
Get full text
Conference Proceeding -
19
NEW HORIZONS IN FORMAL METHODS
Published in Computer bulletin (01-01-2001)Get full text
Journal Article -
20
Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range
Published in 2006 IEEE International Conference on Evolutionary Computation (2006)“…Recent years have seen the application of evolutionary and other nature-inspired search approaches to achieve human-competitive results in cryptography and…”
Get full text
Conference Proceeding