default search action
David Gray
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Adeel Rafiq, Muhammad Zeeshan Shakir, David Gray, Julie Inglis, Fraser Ferguson:
Empowering Managed Service Providers: Decentralised AI-Enabled Monitoring in Multi-Tenant Networks. BigComp 2024: 124-130 - 2021
- [c25]Siddharth S. Kumar, Jennifer M. Case, David Gray, Nicole P. Pitterson:
Constructive Alignment of Learning Outcomes with Student Perceptions in a first-year Engineering Course. FIE 2021: 1-5
2010 – 2019
- 2019
- [i2]Donald E. Waagen, Katie Rainey, Jamie Gantert, David Gray, Megan King, M. Shane Thompson, Jonathan Barton, Will Waldron, Samantha Livingston, Don Hulsey:
Characterizing Inter-Layer Functional Mappings of Deep Learning Models. CoRR abs/1907.04223 (2019) - 2016
- [j10]Md Zahidul Islam, Steven D'Alessandro, Michael Furner, Lester Johnson, David Gray, Leanne Carter:
Brand Switching Pattern Discovery by Data Mining Techniques for the Telecommunication Industry in Australia. Australas. J. Inf. Syst. 20 (2016) - 2014
- [j9]David Bowes, Tracy Hall, David Gray:
DConfusion: a technique to allow cross study performance evaluation of fault prediction studies. Autom. Softw. Eng. 21(2): 287-313 (2014) - [p1]David Gray, John McManus:
The Commodity Exporting Country A Spectral Analysis of Brazilian and Australian Equity Markets. Computational Models of Complex Systems 2014: 25-43 - 2013
- [c24]Denis Butin, David Gray, Giampaolo Bella:
Towards Verifying Voter Privacy through Unlinkability. ESSoS 2013: 91-106 - [c23]John P. Wooler, David Gray, Francesco Poletti, Marco N. Petrovich, Natalie V. Wheeler, Francesca Parmigiani, David J. Richardson:
Robust low loss splicing of hollow core photonic bandgap fiber to itself. OFC/NFOEC 2013: 1-3 - 2012
- [j8]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Reflections on the NASA MDP data sets. IET Softw. 6(6): 549-558 (2012) - [j7]Tracy Hall, Sarah Beecham, David Bowes, David Gray, Steve Counsell:
A Systematic Literature Review on Fault Prediction Performance in Software Engineering. IEEE Trans. Software Eng. 38(6): 1276-1304 (2012) - [c22]David Bowes, Tracy Hall, David Gray:
Comparing the performance of fault prediction models which report multiple performance measures: recomputing the confusion matrix. PROMISE 2012: 109-118 - 2011
- [j6]Tracy Hall, Sarah Beecham, David Bowes, David Gray, Steve Counsell:
Developing Fault-Prediction Models: What the Research Can Show Industry. IEEE Softw. 28(6): 96-99 (2011) - [c21]Giampaolo Bella, Denis Butin, David Gray:
Holistic analysis of mix protocols. IAS 2011: 338-343 - [c20]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
The misuse of the NASA metrics data program data sets for automated software defect prediction. EASE 2011: 96-103 - [c19]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Further thoughts on precision. EASE 2011: 129-133 - 2010
- [c18]David Gray, Caroline Sheedy:
E-Voting: A New Approach Using Double-Blind Identity-Based Encryption. EuroPKI 2010: 93-108 - [c17]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Software defect prediction using static code metrics underestimates defect-proneness. IJCNN 2010: 1-7 - [c16]Yi Sun, Lun Tak Lam, Gary P. Moss, Maria Prapopoulou, Rod Adams, Neil Davey, David Gray, Marc B. Brown:
Predicting drug absorption rates through human skin. IJCNN 2010: 1-5
2000 – 2009
- 2009
- [c15]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics. EANN 2009: 223-234 - [c14]Michelle Graham, David Gray:
ProVer: A Secure System for the Provision of Verified Location Information. MobiCASE 2009: 366-373 - [c13]Michelle Graham, David Gray:
Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. MobiSec 2009: 160-171 - [c12]Hai Wei, Sakina Zabuawala, Karthik Mahesh Varadarajan, Jacob Yadegar, Joseph Yadegar, David Gray, John McCalmont, James Utt:
Adaptive pattern-based image compression for ultra-low bandwidth weapon seeker image communication. Visual Information Processing 2009: 73410 - [c11]Michelle Graham, David Gray:
Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding. WASA 2009: 378-387 - 2008
- [c10]Cameron Ross Dunne, Thibault Candebat, David Gray:
A three-party architecture and protocol that supports users with multiple identities for use with location based services. ICPS 2008: 1-10 - [c9]Cameron Ross Dunne, Thibault Candebat, David Gray:
A frequency based sighting blurring algorithm for use with location based services on the internet. Mobile HCI 2008: 3-12 - [c8]Cameron Ross Dunne, Thibault Candebat, David Gray:
An Access Control Model for Location based Services. WOSIS 2008: 49-58 - [c7]Torre Zuk, Jon Downton, David Gray, Sheelagh Carpendale, J. D. Liang:
Exploration of uncertainty in bidirectional vector fields. Visualization and Data Analysis 2008: 68090B - 2007
- [j5]Jeremy Avigad, Kevin Donnelly, David Gray, Paul Raff:
A formally verified proof of the prime number theorem. ACM Trans. Comput. Log. 9(1): 2 (2007) - 2006
- [j4]Thibault Candebat, David Gray:
Secure pseudonym management using mediated identity-based encryption. J. Comput. Secur. 14(3): 249-267 (2006) - 2005
- [j3]Benjamin Aziz, Geoff W. Hamilton, David Gray:
A static analysis of cryptographic processes: the denotational approach. J. Log. Algebraic Methods Program. 64(2): 285-320 (2005) - [c6]Benjamin Aziz, David Gray, Geoff W. Hamilton:
A Static Analysis of PKI-Based Systems. ICTCS 2005: 51-65 - [i1]Jeremy Avigad, Kevin Donnelly, David Gray, Paul Raff:
A formally verified proof of the prime number theorem. CoRR abs/cs/0509025 (2005) - 2004
- [c5]David Sinclair, David Gray, Geoff W. Hamilton:
Synthesising Attacks on Cryptographic Protocols. ATVA 2004: 49-63 - 2003
- [c4]David Gray:
Anonymous coursework submission. CompSysTech 2003: 556-561 - [c3]Benjamin Aziz, Geoff W. Hamilton, David Gray:
A Denotational Approach to the Static Analysis of Cryptographic Processes. SVV@ICLP 2003: 19-36 - 2000
- [c2]David Sinclair, James F. Power, J. Paul Gibson, David Gray, Geoff W. Hamilton:
Specifying and Verifying IP with Linear Logic. ICDCS Workshop on Distributed System Validation and Verification 2000: E104-E110
1990 – 1999
- 1999
- [b1]David Gray:
Introduction to the formal design of real-time systems. Applied computing, Springer 1999, ISBN 978-3-540-76140-2, pp. I-XIII, 1-461 - [c1]David Gray, Geoff W. Hamilton, David Sinclair, J. Paul Gibson, James F. Power:
Four Logics and a Protocol. IWFM 1999 - 1990
- [j2]Robin A. Nicholl, Maurice Clint, David Gray, Tina M. Nicholl:
The use of functional annotations in verifying imperative programs. Softw. Eng. J. 5(5): 280-288 (1990)
1980 – 1989
- 1988
- [j1]David Gray:
The Formal Specification of a Small Bookshop Information System. IEEE Trans. Software Eng. 14(2): 263-272 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint