default search action
Ewen Denney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Ewen Denney, Ganesh Pai:
Reconciling Safety Measurement and Dynamic Assurance. SAFECOMP 2024: 51-67 - [i3]Ewen Denney, Ganesh Pai:
Reconciling Safety Measurement and Dynamic Assurance. CoRR abs/2405.19641 (2024) - 2023
- [c48]Irfan Sljivo, Ewen Denney, Jonathan Menzies:
Guided Integration of Formal Verification in Assurance Cases. ICFEM 2023: 172-190 - [i2]Erfan Asaadi, Ewen Denney, Ganesh Pai:
Towards Quantification of Assurance for Learning-enabled Components. CoRR abs/2301.08980 (2023) - 2020
- [j11]Erfan Asaadi, Ewen Denney, Jonathan Menzies, Ganesh J. Pai, Dimo Petroff:
Dynamic Assurance Cases: A Pathway to Trusted Autonomy. Computer 53(12): 35-46 (2020) - [c47]Ewen Denney, Ganesh Pai, Colin Smith:
Hazard Contribution Modes of Machine Learning Components. SafeAI@AAAI 2020: 14-22 - [c46]Erfan Asaadi, Ewen Denney, Ganesh Pai:
Quantifying Assurance in Learning-Enabled Systems. SAFECOMP 2020: 270-286 - [i1]Erfan Asaadi, Ewen Denney, Ganesh Pai:
Quantifying Assurance in Learning-enabled Systems. CoRR abs/2006.10345 (2020)
2010 – 2019
- 2019
- [j10]Ewen Denney, Ganesh Pai, Iain Whiteside:
The role of safety architectures in aviation safety cases. Reliab. Eng. Syst. Saf. 191 (2019) - [c45]Erfan Asaadi, Ewen Denney, Ganesh Pai:
Towards Quantification of Assurance for Learning-Enabled Components. EDCC 2019: 55-62 - 2018
- [j9]Ewen Denney, Ganesh Pai:
Tool support for assurance case development. Autom. Softw. Eng. 25(3): 435-499 (2018) - [j8]Ewen Denney, Perdita Stevens, Andrzej Wasowski:
Editorial. Formal Aspects Comput. 30(1): 1 (2018) - 2017
- [c44]Kyle J. S. White, Ewen Denney, Matt D. Knudson, Angelos K. Marnerides, Dimitrios P. Pezaros:
A programmable SDN+NFV-based architecture for UAV telemetry monitoring. CCNC 2017: 522-527 - [c43]Ewen Denney, Ganesh Pai, Iain Whiteside:
Model-Driven Development of Safety Architectures. MoDELS 2017: 156-166 - [c42]Ewen Denney, Ganesh Pai, Iain Whiteside:
Modeling the Safety Architecture of UAS Flight Operations. SAFECOMP 2017: 162-178 - 2016
- [c41]Ewen Denney, Ganesh J. Pai:
Composition of Safety Argument Patterns. SAFECOMP 2016: 51-63 - 2015
- [c40]Ewen Denney, Ganesh J. Pai, Iain Whiteside:
Formal Foundations for Hierarchical Safety Cases. HASE 2015: 52-59 - [c39]Ewen Denney, Ganesh J. Pai, Ibrahim Habli:
Dynamic Safety Cases for Through-Life Safety Assurance. ICSE (2) 2015: 587-590 - [c38]Ewen Denney, Ganesh J. Pai:
Towards a Formal Basis for Modular Safety Cases. SAFECOMP 2015: 328-343 - 2014
- [j7]Ewen Denney, Ganesh J. Pai:
Automating the Assembly of Aviation Safety Cases. IEEE Trans. Reliab. 63(4): 830-849 (2014) - [c37]Ewen Denney, Dwight Naylor, Ganesh J. Pai:
Querying Safety Cases. SAFECOMP 2014: 294-309 - 2013
- [j6]Ki Yung Ahn, Ewen Denney:
A framework for testing first-order logic axioms in program verification. Softw. Qual. J. 21(1): 159-200 (2013) - [c36]Ewen Denney, Ganesh Pai, Ibrahim Habli, Tim Kelly, John C. Knight:
1st international workshop on assurance cases for software-intensive systems (ASSURE 2013). ICSE 2013: 1505-1506 - [c35]Ewen Denney, Ganesh Pai:
Evidence arguments for using formal methods in software certification. ISSRE (Supplemental Proceedings) 2013: 375-380 - [c34]David Aspinall, Ewen Denney, Christoph Lüth:
A Semantic Basis for Proof Queries and Transformations. LPAR 2013: 53-70 - [c33]Ewen Denney, Ganesh Pai, Iain Whiteside:
Hierarchical Safety Cases. NASA Formal Methods 2013: 478-483 - [c32]Ewen Denney, Ganesh Pai:
A Formal Basis for Safety Case Patterns. SAFECOMP 2013: 21-32 - [e4]Ewen Denney, Ibrahim Habli, Tim Kelly, John C. Knight, Ganesh Pai:
Proceedings of the 1st International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE '13, San Francisco, California, USA, May 19, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6324-2 [contents] - [e3]Ewen Denney, Tevfik Bultan, Andreas Zeller:
2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013. IEEE 2013 [contents] - 2012
- [c31]Ewen Denney, Ganesh Pai, Ibrahim Habli:
Perspectives on software safety case development for unmanned aircraft. DSN 2012: 1-8 - [c30]Ewen Denney, Ganesh Pai, Josef Pohl:
Heterogeneous Aviation Safety Cases: Integrating the Formal and the Non-formal. ICECCS 2012: 199-208 - [c29]Ewen Denney, Ganesh Pai, Corey Ippolito, Ritchie Lee:
An Integrated Safety and Systems Engineering Methodology for Small Unmanned Aircraft Systems. Infotech@Aerospace 2012 - [c28]David Aspinall, Ewen Denney, Christoph Lüth:
Querying Proofs. LPAR 2012: 92-106 - [c27]Ewen Denney, Ganesh Pai:
A Lightweight Methodology for Safety Case Assembly. SAFECOMP 2012: 1-12 - [c26]Ewen Denney, Ganesh Pai, Josef Pohl:
AdvoCATE: An Assurance Case Automation Toolset. SAFECOMP Workshops 2012: 8-21 - 2011
- [c25]Ewen Denney, Ganesh Pai, Ibrahim Habli:
Towards Measurement of Confidence in Safety Cases. ESEM 2011: 380-383 - [e2]Ewen Denney, Ulrik Pagh Schultz:
Generative Programming And Component Engineering, Proceedings of the 10th International Conference on Generative Programming and Component Engineering, GPCE 2011, Portland, Oregon, USA, October 22-24, 2011. ACM 2011, ISBN 978-1-4503-0689-8 [contents] - 2010
- [j5]Ewen Denney, Dimitra Giannakopoulou, Corina S. Pasareanu:
Preface: Special Issue on Nasa Formal Methods Symposium 2009. Innov. Syst. Softw. Eng. 6(3): 171-172 (2010) - [j4]David Aspinall, Ewen Denney, Christoph Lüth:
Tactics for Hierarchical Proof. Math. Comput. Sci. 3(3): 309-330 (2010) - [c24]Nurlida Basir, Ewen Denney, Bernd Fischer:
Deriving Safety Cases for Hierarchical Structure in Model-Based Development. SAFECOMP 2010: 68-81 - [c23]Ki Yung Ahn, Ewen Denney:
Testing First-Order Logic Axioms in Program Verification. TAP@TOOLS 2010: 22-37
2000 – 2009
- 2009
- [c22]Ewen Denney, Bernd Fischer:
A Verification-Driven Approach to Traceability and Documentation for Auto-Generated Mathematical Software. ASE 2009: 560-564 - [e1]Ewen Denney, Dimitra Giannakopoulou, Corina S. Pasareanu:
First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009. NASA Conference Proceedings NASA/CP-2009-215407, 2009 [contents] - 2008
- [c21]David Aspinall, Ewen Denney, Christoph Lüth:
A Tactic Language for Hiproofs. AISC/MKM/Calculemus 2008: 339-354 - [c20]Ewen Denney, Bernd Fischer:
Explaining Verification Conditions. AMAST 2008: 145-159 - [c19]Ewen Denney, Bernd Fischer:
Generating customized verifiers for automatically generated code. GPCE 2008: 77-88 - [c18]Nurlida Basir, Ewen Denney, Bernd Fischer:
Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information. SAFECOMP 2008: 249-262 - [c17]Nurlida Basir, Ewen Denney, Bernd Fischer:
Deriving Safety Cases for the Formal Safety Certification of Automatically Generated Code. SafeCert@ETAPS 2008: 19-26 - 2006
- [j3]Ewen Denney, Bernd Fischer, Johann Schumann:
An Empirical Evaluation of Automated Theorem Provers in Software Certification. Int. J. Artif. Intell. Tools 15(1): 81-108 (2006) - [c16]Ewen Denney, Bernd Fischer:
A generic annotation inference algorithm for the safety certification of automatically generated code. GPCE 2006: 121-130 - [c15]Ewen Denney, Bernd Fischer:
Extending Source Code Generators for Evidence-Based Software Certification. ISoLA 2006: 138-145 - [c14]Ewen Denney, Bernd Fischer:
Annotation Inference for Safety Certification of Automatically Generated Code (Extended Abstract). ASE 2006: 265-268 - 2005
- [c13]Ewen Denney, Bernd Fischer:
Certifiable Program Generation. GPCE 2005: 17-28 - [c12]Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones:
Software certificate management (SoftCeMent'05). ASE 2005: 463 - [c11]Ewen Denney, John Power, Konstantinos Tourlas:
Hiproofs: A Hierarchical Notion of Proof Tree. MFPS 2005: 341-359 - 2004
- [c10]Ewen Denney, Ram Prasad Venkatesan:
A Generic Software Safety Document Generator. AMAST 2004: 102-116 - [c9]Ewen Denney, Bernd Fischer, Johann Schumann:
Using Automated Theorem Provers to Certify Auto-generated Aerospace Software. IJCAR 2004: 198-212 - [c8]Ewen Denney, Bernd Fischer, Johann Schumann:
Adding Assurance to Automatically Generated Code. HASE 2004: 297-299 - [c7]Ewen Denney, Jon Whittle:
Combining Model-Driven and Schema-Based Program Synthesis. Software Engineering Research and Practice 2004: 207-211 - 2003
- [c6]Ewen Denney, Bernd Fischer:
Correctness of Source-Level Safety Policies. FME 2003: 894-913 - 2002
- [j2]Ewen Denney, Thomas P. Jensen:
Correctness of Java card method lookup via logical relations. Theor. Comput. Sci. 283(2): 305-331 (2002) - 2001
- [c5]Marc Éluard, Thomas P. Jensen, Ewen Denney:
An Operational Semantics of the Java Card Firewall. E-smart 2001: 95-110 - [c4]Ewen Denney:
The Synthesis of a Java Card Tokenization Algorithm. ASE 2001: 43-50 - 2000
- [c3]Ewen Denney, Thomas P. Jensen:
Correctness of Java Card Method Lookup via Logical Relations. ESOP 2000: 104-118 - [c2]Ewen Denney:
A Prototype Proof Translator from HOL to Coq. TPHOLs 2000: 108-125
1990 – 1999
- 1999
- [b1]Ewen Denney:
A theory of program refinement. University of Edinburgh, UK, 1999 - 1998
- [j1]Ewen Denney:
Simply-typed underdeterminism. J. Comput. Sci. Technol. 13(6): 491-508 (1998) - [c1]Ewen Denney:
Refinement types for specification. PROCOMET 1998: 148-166
Coauthor Index
aka: Ganesh Pai
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint