default search action
Aidan J. Delaney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Aidan J. Delaney:
Defining star-free regular languages using diagrammatic logic. University of Brighton, UK, 2012
Journal Articles
- 2020
- [j6]Haralambos Mouratidis, Shaun Shei, Aidan J. Delaney:
A security requirements modelling language for cloud computing environments. Softw. Syst. Model. 19(2): 271-295 (2020) - 2015
- [j5]Gem Stapleton, Beryl Plimmer, Aidan J. Delaney, Peter J. Rodgers:
Combining Sketching and Traditional Diagram Editing Tools. ACM Trans. Intell. Syst. Technol. 6(1): 10:1-10:29 (2015) - 2014
- [j4]Aidan J. Delaney, Gem Stapleton, John Taylor, Simon J. Thompson:
A normal form for spider diagrams of order. J. Vis. Lang. Comput. 25(6): 935-944 (2014) - 2013
- [j3]Aidan J. Delaney, Gem Stapleton, John Taylor, Simon J. Thompson:
On the expressiveness of spider diagrams and commutative star-free regular languages. J. Vis. Lang. Comput. 24(4): 273-288 (2013) - [j2]Peter Chapman, Gem Stapleton, Aidan J. Delaney:
On the expressiveness of second-order spider diagrams. J. Vis. Lang. Comput. 24(5): 327-349 (2013) - 2008
- [j1]Gem Stapleton, Aidan J. Delaney:
Evaluating and generalizing constraint diagrams. J. Vis. Lang. Comput. 19(4): 499-521 (2008)
Conference and Workshop Papers
- 2018
- [c26]Almas Baimagambetov, John Howse, Gem Stapleton, Aidan J. Delaney:
Generating Effective Euler Diagrams. Diagrams 2018: 39-54 - [c25]Shan Chen, Aidan J. Delaney:
Diagrammatically Formalising Constraints of a Privacy Ontology. Diagrams 2018: 672-679 - 2017
- [c24]Shaun Shei, Haralambos Mouratidis, Aidan J. Delaney:
A Security Requirements Modelling Language to Secure Cloud Computing Environments. BPMDS/EMMSAD@CAiSE 2017: 337-345 - [c23]Gem Stapleton, Aidan J. Delaney, Michael Compton, Peter Chapman:
Visualizing ALC Using Concept Diagrams. GKR 2017: 99-117 - [c22]Nikolaos Argyropoulos, Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney, Andrew Fish, Stefanos Gritzalis:
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements. HICSS 2017: 1-10 - 2016
- [c21]Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney:
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective. TrustBus 2016: 48-62 - 2015
- [c20]Shaun Shei, Aidan J. Delaney, Stelios Kapetanakis, Haralambos Mouratidis:
Visually Mapping Requirements Models to Cloud Services. DMS 2015: 108-114 - [c19]Shaun Shei, Luis Márquez Alcañiz, Haralambos Mouratidis, Aidan J. Delaney, David Garcia Rosado, Eduardo Fernández-Medina:
Modelling secure cloud systems based on system requirements. ESPRE 2015: 19-24 - 2014
- [c18]Aidan J. Delaney, Eric Kow, Peter Chapman, Jon Nicholson:
Generating and Navigating Large Euler Diagrams. ED/GViP@Diagrams 2014: 23-31 - [c17]Aidan J. Delaney, Gem Stapleton, John Taylor, Simon J. Thompson:
A Normal Form for Spider Diagrams of Order. DMS 2014: 300-309 - 2013
- [c16]Martin Griffin, Aidan J. Delaney, Karina Rodriguez-Echavarria:
GPGPU Implementation of a Generative Modelling Language. DMS 2013: 194-197 - [c15]Gem Stapleton, John Howse, Kerry Taylor, Aidan J. Delaney, Jim Burton, Peter Chapman:
Towards Diagrammatic Ontology Patterns. WOP 2013 - 2012
- [c14]Gem Stapleton, John Howse, Peter Chapman, Ian Oliver, Aidan J. Delaney:
What Can Concept Diagrams Say? Diagrams 2012: 291-293 - [c13]Jon Nicholson, Aidan J. Delaney:
Formalising Simple Codecharts. Diagrams 2012: 346-348 - [c12]Jon Nicholson, Aidan J. Delaney, Gem Stapleton:
Formalizing the Syntax of Codecharts. DMS 2012: 181-184 - [c11]Jon Nicholson, Aidan J. Delaney, Gem Stapleton:
Linking codecharts with programs. VL/HCC 2012: 259-260 - 2011
- [c10]Gem Stapleton, Aidan J. Delaney, Peter Rodgers, Beryl Plimmer:
Recognising Sketches of Euler Diagrams Augmented with Graphs. DMS 2011: 279-284 - [c9]Mengdi Wang, Beryl Plimmer, Paul Schmieder, Gem Stapleton, Peter Rodgers, Aidan J. Delaney:
SketchSet: Creating Euler diagrams using pen or mouse. VL/HCC 2011: 75-82 - 2010
- [c8]Aidan J. Delaney, Gem Stapleton, John Taylor, Simon J. Thompson:
Fragments of Spider Diagrams of Order and Their Relative Expressiveness. Diagrams 2010: 69-83 - [c7]Aidan J. Delaney, Beryl Plimmer, Gem Stapleton, Peter J. Rodgers:
Recognizing Sketches of Euler Diagrams Drawn with Ellipses. DMS 2010: 305-310 - 2008
- [c6]Aidan J. Delaney, John Taylor, Simon J. Thompson:
Spider Diagrams of Order and a Hierarchy of Star-Free Regular Languages. Diagrams 2008: 172-187 - [c5]Karina Rodriguez-Echavarria, Craig Moore, David C. Morris, David Arnold, Aidan J. Delaney, Robin Heath:
Studying Users' Acceptability Towards 3D Immersive Environments - Virtual Tours: A Case Study. GRAPP 2008: 477-484 - 2007
- [c4]Aidan J. Delaney, Gem Stapleton:
Spider Diagrams of Order. VLL 2007: 27-39 - [c3]Gem Stapleton, Aidan J. Delaney:
Towards Overcoming Deficiencies in Constraint Diagrams. VL/HCC 2007: 33-40 - 2006
- [c2]Aidan J. Delaney:
Towards understanding Source and Configuration Management tools as a method of introducing learners to the culture of software development. PPIG 2006: 15 - 2002
- [c1]Aidan J. Delaney, Thomas J. Naughton:
Emulation of an unconventional model of computation in Java. PPPJ/IRE 2002: 1-6
Editorship
- 2014
- [e1]Tim Dwyer, Helen C. Purchase, Aidan J. Delaney:
Diagrammatic Representation and Inference - 8th International Conference, Diagrams 2014, Melbourne, VIC, Australia, July 28 - August 1, 2014. Proceedings. Lecture Notes in Computer Science 8578, Springer 2014, ISBN 978-3-662-44042-1 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint