default search action
Colin J. Fidge
Person information
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Md. Razon Hossain, Md Whaiduzzaman, Alistair Barros, Colin J. Fidge:
Dynamic microservice placement in multi-tier Fog networks. Internet Things 26: 101224 (2024) - [j60]Elena Basan, Alexander S. Basan, Alexey S. Mushenko, Alexey Nekrasov, Colin J. Fidge, Alexander Lesnikov:
Analysis of Attack Intensity on Autonomous Mobile Robots. Robotics 13(7): 101 (2024) - [c95]Babar Shahzaad, Alistair Barros, Colin J. Fidge:
Edge-Mapping of Service Function Trees for Sensor Event Processing. ICWS 2024: 1227-1237 - [i4]Thakshila Imiya Mohottige, Artem Polyvyanyy, Rajkumar Buyya, Colin J. Fidge, Alistair Barros:
Service Colonies: A Novel Architectural Style for Developing Software Systems with Autonomous and Cooperative Services. CoRR abs/2407.07267 (2024) - [i3]Babar Shahzaad, Alistair Barros, Colin J. Fidge:
Edge-Mapping of Service Function Trees for Sensor Event Processing. CoRR abs/2407.11302 (2024) - [i2]Thakshila Imiya Mohottige, Artem Polyvyanyy, Rajkumar Buyya, Colin J. Fidge, Alistair Barros:
Microservices-based Software Systems Reengineering: State-of-the-Art and Future Directions. CoRR abs/2407.13915 (2024) - 2023
- [j59]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering a data interpreted petri net model of industrial control systems for anomaly detection. Expert Syst. Appl. 230: 120511 (2023) - [j58]Alexey Nekrasov, Alena B. Khachaturian, Colin J. Fidge:
Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval. Remote. Sens. 15(6): 1613 (2023) - [j57]Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Evgeniya Ishchukova, Anatoly Basyuk, Alexandr Lesnikov:
Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode. Sensors 23(4): 1996 (2023) - [j56]Andrei Furda, Alessandro Soro, Erwin Fielt, Nicola Bartlett, Colin J. Fidge, Jesse Steineck, Lionel van den Berg:
Jump-Starting Software Engineering Careers. IEEE Softw. 40(5): 108-115 (2023) - [c94]Alireza Nili, Colin J. Fidge, Michael Rosemann:
Why do project managers underuse Management Information Systems theories in their management of IT projects? CENTERIS/ProjMAN/HCist 2023: 1578-1585 - 2022
- [j55]Xuelei Wang, Colin J. Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li:
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems. IEEE Access 10: 6629-6649 (2022) - [j54]Md Whaiduzzaman, Alistair Barros, Moumita Chanda, Supti Barman, Tania Sultana, Md. Sazzadur Rahman, Shanto Roy, Colin J. Fidge:
A Review of Emerging Technologies for IoT-Based Smart Cities. Sensors 22(23): 9271 (2022) - [j53]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control. IEEE Trans. Ind. Informatics 18(6): 3734-3743 (2022) - 2021
- [j52]Md Whaiduzzaman, Md. Julkar Nayeen Mahi, Alistair Barros, Md. Ibrahim Khalil, Colin J. Fidge, Rajkumar Buyya:
BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture. IEEE Access 9: 106655-106674 (2021) - [j51]Md Whaiduzzaman, Nishat Farjana, Alistair Barros, Md. Julkar Nayeen Mahi, Md. Shahriare Satu, Shanto Roy, Colin J. Fidge:
HIBAF: A data security scheme for fog computing. J. High Speed Networks 27(4): 381-402 (2021) - [j50]Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Ján Gamec, Mária Gamcová:
A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes. Sensors 21(2): 509 (2021) - [j49]Ján Labun, Pavol Kurdel, Alexey Nekrasov, Mária Gamcová, Marek Ceskovic, Colin J. Fidge:
Specific Resonant Properties of Non-Symmetrical Microwave Antennas. Sensors 21(3): 939 (2021) - [j48]Ján Gamec, Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Nikita Sushkin:
An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 21(18): 6116 (2021) - [j47]Md. Razon Hossain, Md Whaiduzzaman, Alistair Barros, Shelia Rahman Tuly, Md. Julkar Nayeen Mahi, Shanto Roy, Colin J. Fidge, Rajkumar Buyya:
A scheduling-based dynamic fog computing framework for augmenting resource utilization. Simul. Model. Pract. Theory 111: 102336 (2021) - [c93]Md Whaiduzzaman, Alistair Barros, Ahmedur Rahman Shovon, Md. Razon Hossain, Colin J. Fidge:
A Resilient Fog-IoT Framework for Seamless Microservice Execution. SCC 2021: 213-221 - [c92]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks. CAiSE 2021: 432-448 - 2020
- [j46]Ján Labun, Gabriel Kalapos, Marek Ceskovic, Pavol Kurdel, Ján Gamec, Alexey Nekrasov, Colin J. Fidge, Miroslav Lassák:
A Simple High-Precision 2-Port Vector Analyzer. IEEE Access 8: 196609-196617 (2020) - [c91]Mahesh Fernando, Colin J. Fidge, Tony Sahama:
Design Guidelines for Effective Occupation-Based Personal Health Records. ACSW 2020: 25:1-25:10 - [c90]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering. CAiSE 2020: 3-19 - [c89]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. TrustCom 2020: 1920-1925 - [i1]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. CoRR abs/2010.07493 (2020)
2010 – 2019
- 2019
- [c88]Mahesh Fernando, Colin J. Fidge, Tony Sahama:
An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records. ACSW 2019: 23:1-23:10 - [c87]Chathurika Wickramage, Colin J. Fidge, Chun Ouyang, Tony Sahama:
Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling. ACSW 2019: 35:1-35:10 - [c86]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Business Object Centric Microservices Patterns. OTM Conferences 2019: 476-495 - [c85]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Availability and Scalability Optimized Microservice Discovery from Enterprise Systems. OTM Conferences 2019: 496-514 - 2018
- [j45]Andrei Furda, Colin J. Fidge, Alistair Barros:
A practical approach for detecting multi-tenancy data interference. Sci. Comput. Program. 163: 160-173 (2018) - [j44]Andrei Furda, Colin J. Fidge, Olaf Zimmermann, Wayne Kelly, Alistair Barros:
Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency. IEEE Softw. 35(3): 63-72 (2018) - [c84]Mahesh Fernando, Colin J. Fidge, Tony Sahama, K. Priyantha Hewagamage:
Employees' perceptions of sharing employer-sponsored personal health records. ACSW 2018: 35:1-35:10 - [c83]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Artem Polyvyanyy, Colin J. Fidge:
Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems. ICSOC 2018: 37-53 - [c82]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic. OTM Conferences (2) 2018: 60-79 - 2017
- [j43]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
Scalable and efficient data distribution for distributed computing of all-to-all comparison problems. Future Gener. Comput. Syst. 67: 152-162 (2017) - [j42]Anastasiia Pika, Michael Leyer, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Wil M. P. van der Aalst:
Mining Resource Profiles from Event Logs. ACM Trans. Manag. Inf. Syst. 8(1): 1:1-1:30 (2017) - [c81]Daniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge:
Authenticated encryption for time-sensitive critical infrastructure. ACSW 2017: 19:1-19:10 - [c80]Chathurika Wickramage, Colin J. Fidge, Tony Sahama, Roy Wong:
Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies. GLOBECOM 2017: 1-6 - [c79]Pramitha Perera, Yu-Chu Tian, Colin J. Fidge, Wayne Kelly:
A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic. ICONIP (1) 2017: 445-454 - 2016
- [j41]Subrata Chakraborty, Kerrie L. Mengersen, Colin J. Fidge, Lin Ma, David Lassen:
A Bayesian Network-based customer satisfaction model: a tool for management decisions in railway transport. Decis. Anal. 3: 4 (2016) - [j40]Anastasiia Pika, Wil M. P. van der Aalst, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede:
Evaluating and predicting overall process risk using event logs. Inf. Sci. 352-353: 98-120 (2016) - [j39]Yi-Fan Zhang, Yu-Chu Tian, Colin J. Fidge, Wayne Kelly:
Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems. J. Parallel Distributed Comput. 93-94: 87-101 (2016) - [c78]Donna Teague, Colin J. Fidge, Yue Xu:
Combining unsupervised and invigilated assessment of introductory programming. ACSW 2016: 9 - [c77]Jack Parry, Daniel Hunter, Kenneth Radke, Colin J. Fidge:
A network forensics tool for precise data packet capture and replay in cyber-physical systems. ACSW 2016: 22 - [c76]Chathurika Wickramage, Tony Sahama, Colin J. Fidge:
Anatomy of log files: Implications for information accountability measures. HealthCom 2016: 1-6 - [c75]Mahesh Fernando, Tony Sahama, Colin J. Fidge, K. Priyantha Hewagamage:
Personal health records as sources of productivity evidence. ICC 2016: 1-6 - 2015
- [j38]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge:
LibVM: an architecture for shared library sandboxing. Softw. Pract. Exp. 45(12): 1597-1617 (2015) - [c74]Ayodeji James Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c73]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge, Jing Gao:
Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems. ICONIP (3) 2015: 683-691 - [c72]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
Distributed computing of all-to-all comparison problems in heterogeneous systems. IECON 2015: 2053-2058 - [c71]Samuel A. Brian, Richard N. Thomas, James M. Hogan, Colin J. Fidge:
Planting Bugs: A System for Testing Students' Unit Tests. ITiCSE 2015: 45-50 - 2014
- [j37]Suriadi Suriadi, Burkhard Weiß, Axel Winkelmann, Arthur H. M. ter Hofstede, Michael Adams, Raffaele Conforti, Colin J. Fidge, Marcello La Rosa, Chun Ouyang, Anastasiia Pika, Michael Rosemann, Moe Thandar Wynn:
Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis. Commun. Assoc. Inf. Syst. 34: 52 (2014) - [j36]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
Precise relative clock synchronization for distributed control using TSC registers. J. Netw. Comput. Appl. 44: 63-71 (2014) - [j35]Madhushika M. E. Karunarathna, Yu-Chu Tian, Colin J. Fidge:
Domain-specific application analysis for customized instruction identification. Microprocess. Microsystems 38(7): 637-648 (2014) - [c70]Anastasiia Pika, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Michael Leyer, Wil M. P. van der Aalst:
An Extensible Framework for Analysing Resource Behaviour Using Event Logs. CAiSE 2014: 564-579 - [c69]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
A distributed computing framework for All-to-All comparison problems. IECON 2014: 2499-2505 - 2013
- [c68]Colin J. Fidge, Jim Hogan, Raymond Lister:
What vs. how: comparing students' testing and coding skills. ACE 2013: 97-106 - [c67]Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Profiling Event Logs to Configure Risk Indicators for Process Delays. CAiSE 2013: 465-481 - [c66]Christophe Hauser, Frederic Tronel, Colin J. Fidge, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c65]Madhushika M. E. Karunarathna, Yu-Chu Tian, Colin J. Fidge, Ross Hayward:
Algorithm clustering for multi-algorithm processor design. ICCD 2013: 451-454 - [c64]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Java Bytecode Programs (S). SEKE 2013: 394-399 - [p2]Bandar Alhaqbani, Michael Adams, Colin J. Fidge, Arthur H. M. ter Hofstede:
Privacy-Aware Workflow Management. Business Process Management 2013: 111-128 - 2012
- [j34]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge:
A Hardware Virtualization Based Component Sandboxing Architecture. J. Softw. 7(9): 2107-2118 (2012) - [c63]Chris Mills, Colin J. Fidge, Diane Corney:
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. AISC 2012: 59-70 - [c62]Christopher Doble, Colin J. Fidge, Diane Corney:
Data Flow Analysis of Embedded Program Expressions. AISC 2012: 71-82 - [c61]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c60]Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Predicting Deadline Transgressions Using Event Logs. Business Process Management Workshops 2012: 211-216 - 2011
- [j33]Moe Thandar Wynn, Chun Ouyang, Arthur H. M. ter Hofstede, Colin J. Fidge:
Data and process requirements for product recall coordination. Comput. Ind. 62(7): 776-786 (2011) - [j32]Lifeng Ai, Maolin Tang, Colin J. Fidge:
Partitioning composite web services for decentralized execution using a genetic algorithm. Future Gener. Comput. Syst. 27(2): 157-172 (2011) - [c59]Chun Ouyang, Moe Thandar Wynn, Jan-Christian Kuhr, Michael Adams, Thomas Becker, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow support for scheduling in surgical care processes. ECIS 2011: 30 - [c58]Lifeng Ai, Maolin Tang, Colin J. Fidge:
Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution Genetic Algorithm. ICONIP (2) 2011: 258-267 - [c57]Li Gui, Yu-Chu Tian, Colin J. Fidge:
A conditional retransmission enabled transport protocol for real-time networked control systems. LCN 2011: 231-234 - [c56]Bandar Alshammari, Colin J. Fidge, Diane Corney:
A Hierarchical Security Assessment Model for Object-Oriented Programs. QSIC 2011: 218-227 - 2010
- [j31]Lifeng Ai, Maolin Tang, Colin J. Fidge:
QoS-oriented Resource Allocation and Scheduling of Multiple CompositeWeb Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm. Aust. J. Intell. Inf. Process. Syst. 12(1) (2010) - [j30]Bandar Alhaqbani, Colin J. Fidge:
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance. Int. J. Inf. Secur. Priv. 4(4): 35-59 (2010) - [c55]Chun Ouyang, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Jan-Christian Kuhr:
Modelling Complex Resource Requirements in Business Process Management Systems. ACIS 2010 - [c54]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs. APSEC 2010: 186-195 - [c53]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Object-Oriented Designs. Australian Software Engineering Conference 2010: 55-64 - [c52]Maolin Tang, Colin J. Fidge:
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. AISC 2010: 12-21 - [c51]Reza Hassanzadeh, Tony Sahama, Colin J. Fidge:
A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards. E-HEALTH 2010: 102-113 - [c50]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
Performance analysis of IEEE 802.11 DCF based WNCS networks. LCN 2010: 496-503 - [c49]Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. NSS 2010: 351-356 - [p1]Moe Thandar Wynn, Anne Rozinat, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Process Mining and Simulation. Modern Business Process Automation 2010: 437-457
2000 – 2009
- 2009
- [j29]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow simulation for operational decision support. Data Knowl. Eng. 68(9): 834-850 (2009) - [j28]Bandar Alhaqbani, Audun Jøsang, Colin J. Fidge:
A Medical Data Reliability Assessment Model. J. Theor. Appl. Electron. Commer. Res. 4(2): 64-63 (2009) - [c48]Maolin Tang, Colin J. Fidge:
A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications. IEEE Congress on Evolutionary Computation 2009: 3226-3233 - [c47]Raymond Lister, Colin J. Fidge, Donna Teague:
Further evidence of a relationship between explaining, tracing and writing skills in introductory programming. ITiCSE 2009: 161-165 - [c46]Colin J. Fidge, Diane Corney:
Integrating hardware and software information flow analyses. LCTES 2009: 157-166 - [c45]Guosong Tian, Colin J. Fidge, Yu-Chu Tian:
Hybrid system simulation of computer control applications over communication networks. MASCOTS 2009: 1-10 - [c44]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Object-Oriented Class Designs. QSIC 2009: 11-20 - 2008
- [c43]Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Marlon Dumas:
Product flow analysis in distribution networks with a fixed time horizon. ACSC 2008: 73-81 - [c42]Colin J. Fidge:
Relative simulation and model checking of real-time processes. ACSC 2008: 157-165 - [c41]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow Simulation for Operational Decision Support Using Design, Historic and State Information. BPM 2008: 196-211 - [c40]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
High-Precision Relative Clock Synchronization Using Time Stamp Counters. ICECCS 2008: 69-78 - 2007
- [c39]Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols. ACSC 2007: 171-180 - [c38]Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Arthur H. M. ter Hofstede, Wil M. P. van der Aalst:
Business Process Simulation for Operational Decision Support. Business Process Management Workshops 2007: 66-77 - [c37]Bandar Alhaqbani, Colin J. Fidge:
Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops 2007: 371-382 - [c36]Li Gui, Yu-Chu Tian, Colin J. Fidge:
Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. ESA 2007: 121-126 - 2006
- [j27]Andrew Rae, Colin J. Fidge, Luke Wildman:
Fault Evaluation for Security-Critical Communications Devices. Computer 39(5): 61-68 (2006) - [j26]Karl Lermer, Colin J. Fidge:
Procedure compilation in the refinement calculus. Formal Aspects Comput. 18(2): 152-180 (2006) - [j25]Colin J. Fidge:
Formal change impact analyses for emulated control software. Int. J. Softw. Tools Technol. Transf. 8(4-5): 321-335 (2006) - [c35]Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes. ACSC 2006: 303-310 - [c34]Benjamin W. Long, Colin J. Fidge:
Formally Analysing a Security Protocol for Replay Attacks. ASWEC 2006: 171-180 - [c33]Phil Cook, Colin J. Fidge:
Well-Measuring Programs. ASWEC 2006: 253-261 - [c32]Colin J. Fidge, Yu-Chu Tian:
Functional Analysis of a Real-Time Protocol for Networked Control Systems. ATVA 2006: 446-460 - 2005
- [j24]Andrew Rae, Colin J. Fidge:
Identifying Critical Components During Information Security Evaluations. J. Res. Pract. Inf. Technol. 37(4) (2005) - [j23]Andrew Rae, Colin J. Fidge:
Information Flow Analysis for Fail-Secure Devices. Comput. J. 48(1): 17-26 (2005) - [j22]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
A theory for execution-time derivation in real-time programs. Theor. Comput. Sci. 346(1): 3-27 (2005) - [c31]Colin J. Fidge, Phil Cook:
Model Checking Interrupt-Dependent Software. APSEC 2005: 51-58 - [c30]Colin J. Fidge, Peter J. Robinson, Steve Dunne:
Refinement Laws for Verifying Library Subroutine Adaptation. Australian Software Engineering Conference 2005: 224-232 - 2003
- [j21]Colin J. Fidge, Carron Shankland:
But What if I Don't Want to Wait Forever? Formal Aspects Comput. 14(3): 281-294 (2003) - [j20]Luke Wildman, Colin J. Fidge, David A. Carrington:
The Variety of Variables in Automated Real-Time Refinement. Formal Aspects Comput. 15(2-3): 258-279 (2003) - [j19]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
Linear Approximation of Execution-Time Constraints. Formal Aspects Comput. 15(4): 319-348 (2003) - [j18]Colin J. Fidge:
Foreword. Theor. Comput. Sci. 293(3): 477 (2003) - [c29]Colin J. Fidge:
Verifying Emulation of Legacy Mission Computer Systems. FME 2003: 187-207 - [c28]Benjamin W. Long, Colin J. Fidge, Antonio Cerone:
A Z Based Approach to Verifying Security Protocols. ICFEM 2003: 375-395 - [c27]Geoffrey Watson, Colin J. Fidge:
A Partial-Correctness Semantics for Modelling Assembler Programs. SEFM 2003: 82-90 - [c26]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
Formal Semantics for Program Paths. CATS 2003: 58-81 - 2002
- [j17]Karl Lermer, Colin J. Fidge:
A formal model of real-time program compilation. Theor. Comput. Sci. 282(1): 151-190 (2002) - [c25]Neil J. Robinson, Colin J. Fidge:
Animation of Data Refinements. APSEC 2002: 137-146 - [c24]Colin J. Fidge:
Contextual Matching of Software Library Components. APSEC 2002: 297-306 - [c23]Colin J. Fidge:
Timing Analysis of Assembler Code Control-Flow Paths. FME 2002: 370-389 - [c22]Luke Wildman, Colin J. Fidge:
The variety of variables in computer-aided real-time programming. Refine 2002: 21-36 - 2001
- [j16]Ian J. Hayes, Colin J. Fidge, Karl Lermer:
Semantic characterisation of dead control-flow paths. IEE Proc. Softw. 148(6): 175-186 (2001) - [c21]Colin J. Fidge:
Compilation of Specifications. APSEC 2001: 355-362 - [c20]Neil J. Robinson, Colin J. Fidge:
Visualisation of Refinements. Australian Software Engineering Conference 2001: 244-254 - [c19]Andrew P. Martin, Colin J. Fidge:
Lifting in Z. CATS 2001: 197-219 - [c18]Colin J. Fidge:
Preface. CATS 2001: 282-283 - [e1]Colin J. Fidge:
Computing: The Australasian Theory Symposium, CATS 2001, Gold Coast, Australia, January 29-30, 2001. Electronic Notes in Theoretical Computer Science 42, Elsevier 2001 [contents] - 2000
- [j15]Graeme Smith, Colin J. Fidge:
Incremental Development of Real-Time Requirements: The Light Control Case Study. J. Univers. Comput. Sci. 6(7): 704-730 (2000) - [j14]Luke Wildman, Colin J. Fidge, David A. Carrington:
Computer-aided development of a real-time program. Softw. Concepts Tools 19(4): 190-202 (2000) - [c17]Colin J. Fidge:
The Algebra of Multi-tasking. AMAST 2000: 213-227
1990 – 1999
- 1999
- [j13]Colin J. Fidge, Ian J. Hayes, Geoffrey Watson:
The deadline command. IEE Proc. Softw. 146(2): 104-111 (1999) - [c16]Karl Lermer, Colin J. Fidge:
A Formal Model of Real-Time Program Compilation. ARTS 1999: 192-210 - [c15]Colin J. Fidge:
Modelling Discrete Behaviour in a Continuous-Time Formalism. IFM 1999: 170-188 - 1998
- [j12]Colin J. Fidge:
A Limitation of Vector Timestamps for Reconstructing Distributed Computations. Inf. Process. Lett. 68(2): 87-91 (1998) - [j11]Colin J. Fidge:
Real-Time Schedulability Tests for Preemptive Multitasking. Real Time Syst. 14(1): 61-93 (1998) - [c14]Colin J. Fidge, Ian J. Hayes, Brendan P. Mahony:
Defining Differentiation and Integration in Z. ICFEM 1998: 64-75 - [c13]Colin J. Fidge, Ian J. Hayes, Andrew P. Martin, Axel Wabenhorst:
A Set-Theoretic Model for Real-Time Specification and Reasoning. MPC 1998: 188-206 - 1997
- [j10]Colin J. Fidge, Andy J. Wellings:
An Action-Based Formal Model for Concurrent Real-Time Systems. Formal Aspects Comput. 9(2): 175-207 (1997) - [j9]Colin J. Fidge, Peter Kearney, Mark Utting:
A Formal Method for Building Concurrent Real-Time Software. IEEE Softw. 14(2): 99-106 (1997) - [c12]Colin J. Fidge:
Refinement Rules for Real-Time Multi-tasking Programs. AMAST 1997: 199-215 - [c11]Karl Lermer, Colin J. Fidge:
A Methodology for Compilation of High-Integrity Real-Time Programs. Euro-Par 1997: 1274-1281 - 1996
- [j8]Colin J. Fidge:
It's now or never. XRDS 2(3): 4-5 (1996) - [j7]Colin J. Fidge:
Fundamentals of Distributed System Observation. IEEE Softw. 13(6): 77-83 (1996) - [c10]Colin J. Fidge, Mark Utting, Peter Kearney, Ian J. Hayes:
Integrating Real-Time Scheduling Theory and Program Refinement. FME 1996: 327-346 - 1995
- [c9]Colin J. Fidge, Peter Kearney, Mark Utting:
Interactively Verifying a Simple Real-time Scheduler. CAV 1995: 395-408 - 1994
- [c8]Colin J. Fidge:
Adding Real Time to Formal Program Development. FME 1994: 618-638 - [c7]Colin J. Fidge:
Proof Obligations for Real-Time Refinement. Refine 1994: 279-305 - 1993
- [j6]Colin J. Fidge:
A Formal Definition of Priority in CSP. ACM Trans. Program. Lang. Syst. 15(4): 681-705 (1993) - [c6]Colin J. Fidge:
Real-Time Refinement. FME 1993: 314-331 - 1992
- [j5]Colin J. Fidge, Andrew M. Lister:
Disciplined approach to real-time systems design. Inf. Softw. Technol. 34(9): 603-610 (1992) - [c5]Colin J. Fidge:
A constraint-oriented real-time process calculus. FORTE 1992: 363-378 - [c4]Colin J. Fidge:
Specification and Verification of Real-Time Behaviour Using Z and RTL. FTRTFT 1992: 393-409 - 1991
- [j4]Colin J. Fidge:
Logical Time in Distributed Computing Systems. Computer 24(8): 28-33 (1991) - [c3]Colin J. Fidge:
Process Algebra Traces Augmented with Causal Relationships. FORTE 1991: 527-541 - 1990
- [c2]Colin J. Fidge:
A LOTOS Interpreter for Simulating Real-Time Behaviour. FORTE 1990: 523-526
1980 – 1989
- 1988
- [j3]Colin J. Fidge:
A LISP Implementation of the Model for 'Communicating Sequential Processes'. Softw. Pract. Exp. 18(10): 923-943 (1988) - [c1]Colin J. Fidge:
Partial Orders for Parallel Debugging. Workshop on Parallel and Distributed Debugging 1988: 183-194 - 1987
- [j2]Colin J. Fidge:
Reproducible Tests in CSP. Aust. Comput. J. 19(2): 92-98 (1987) - 1983
- [j1]Colin J. Fidge, Robert S. V. Pascoe:
A Comparison of the Concurrency Constructs and Module Facilities of CHILL and Ada. Aust. Comput. J. 15(1): 17-27 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint