Issues in implementing a model checker for Z J Derrick, S North, T Simons Formal Methods and Software Engineering: 8th International Conference on …, 2006 | 34 | 2006 |
Z2SAL: a translation-based model checker for Z J Derrick, S North, AJH Simons Formal Aspects of Computing 23, 43-71, 2011 | 25 | 2011 |
Z2SAL-building a model checker for Z J Derrick, S North, AJH Simons Abstract State Machines, B and Z: First International Conference, ABZ 2008 …, 2008 | 24 | 2008 |
Trust-based access control for XML databases N Farooqi, S North 2011 International Conference for Internet Technology and Secured …, 2011 | 11 | 2011 |
Simulating student mistakes to evaluate the fairness of automated grading GF B Clegg, S North, P McMinn International Conference on Software Engineering: Software Engineering …, 2019 | 10* | 2019 |
A prime number approach to matching an XML twig pattern including parent-child edges S Alsubai, SD North Proceedings of the 13th International Conference on Web Information Systems …, 2017 | 9 | 2017 |
Logging in XML databases: xlog file for trust based access control N Farooqi, S North World Congress on Internet Security (WorldCIS-2012), 174-175, 2012 | 8 | 2012 |
An Analysis of Relational Storage Strategies for Partially Structured XML. YA Kader, B Eaglestone, S North WEBIST (1), 165-170, 2008 | 8 | 2008 |
XML labels compression using prefix-encodings H Al Zadjali, S North International Conference on Web Information Systems and Technologies 2, 69-75, 2016 | 7 | 2016 |
Incorporating data into efsm inference M Foster, AD Brucker, RG Taylor, S North, J Derrick Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019 | 6 | 2019 |
Developing a dynamic trust based access control model for xml databases N Farooqi, S North Department of Computer Science Research Memoranda CS-11-09, University of …, 2011 | 6 | 2011 |
Building a refinement checker for Z J Derrick, S North, AJH Simons arXiv preprint arXiv:1106.4092, 2011 | 5 | 2011 |
PACD: A bitmap-based framework for processing XML data M Al-Badawi, B Eaglestone, S North International Conference on Web Information Systems and Technologies 1, 66-71, 2009 | 5 | 2009 |
Evaluation of practical trust based access control for XML databases N Farooqi, S North 2012 International Conference for Internet Technology and Secured …, 2012 | 4 | 2012 |
A performance evaluation of logging in XML databases using an xlog file for trust based access control N Farooqi, S North International Journal of Intelligent Computing Research 3 (3), 2012 | 4 | 2012 |
A performance evaluation of a new bitmap-based XML processing approach over RDBMS M Al-Badawi, HA Ramadhan, S North, B Eaglestorne International journal of Web engineering and technology 7 (2), 143-172, 2012 | 4 | 2012 |
WIDE: A WWW Interactive Diagram Editor XM Shou, S North Proceedings of the First International Conference on the Practical …, 1997 | 4 | 1997 |
TwigStackPrime: A novel twig join algorithm based on prime numbers S Alsubai, S North Web Information Systems and Technologies: 13th International Conference …, 2018 | 3 | 2018 |
The emergence computation of overflow in dynamic XML tree based on prefix and interval labelling schemes S Al-khazraji, S North 2017 International Conference on Engineering and Technology (ICET), 1-6, 2017 | 3 | 2017 |
A relevance comparison between interval and prefix labelling schemes S Al-khazraji, S North 2017 International Conference on Engineering and Technology (ICET), 1-6, 2017 | 3 | 2017 |