The semantics of augmented constraint diagrams A Fish, J Flower, J Howse Journal of Visual Languages & Computing 16 (6), 541-573, 2005 | 100 | 2005 |
General Euler diagram generation P Rodgers, L Zhang, A Fish Diagrammatic Representation and Inference: 5th International Conference …, 2008 | 74 | 2008 |
Euler diagram generation J Flower, A Fish, J Howse Journal of Visual Languages & Computing 19 (6), 675-694, 2008 | 71 | 2008 |
Automated theorem proving in Euler diagram systems G Stapleton, J Masthoff, J Flower, A Fish, J Southern Journal of Automated Reasoning 39, 431-470, 2007 | 61 | 2007 |
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages H Störrle, A Fish International Conference on Model Driven Engineering Languages and Systems …, 2013 | 60 | 2013 |
Exploring the notion of ‘clutter’in Euler diagrams C John, A Fish, J Howse, J Taylor International Conference on Theory and Application of Diagrams, 267-282, 2006 | 37 | 2006 |
Apparatus: A framework for security analysis in internet of things systems O Mavropoulos, H Mouratidis, A Fish, E Panaousis Ad Hoc Networks 92, 101743, 2019 | 36 | 2019 |
ASTo: A tool for security analysis of IoT systems O Mavropoulos, H Mouratidis, A Fish, E Panaousis 2017 IEEE 15th International Conference on Software Engineering Research …, 2017 | 34 | 2017 |
Investigating reasoning with constraint diagrams A Fish, J Flower Electronic Notes in Theoretical Computer Science 127 (4), 53-69, 2005 | 34 | 2005 |
An investigation on online versus batch learning in predicting user behaviour N Burlutskiy, M Petridis, A Fish, A Chernov, N Ali Research and Development in Intelligent Systems XXXIII: Incorporating …, 2016 | 32 | 2016 |
User-comprehension of Euler diagrams A Fish, B Khazaei, C Roast Journal of Visual Languages & Computing 22 (5), 340-354, 2011 | 30 | 2011 |
A reading algorithm for constraint diagrams A Fish, J Flower, J Howse IEEE Symposium on Human Centric Computing Languages and Environments, 2003 …, 2003 | 29 | 2003 |
A conceptual model to support security analysis in the internet of things O Mavropoulos, H Mouratidis, A Fish, E Panaousis, C Kalloniatis Computer Science and Information Systems 14 (2), 557-578, 2017 | 27 | 2017 |
Embedding wellformed Euler diagrams P Rodgers, L Zhang, G Stapleton, A Fish 2008 12th International Conference Information Visualisation, 585-593, 2008 | 27 | 2008 |
Visual exploration system in an industrial context A Fish, C Gargiulo, D Malandrino, D Pirozzi, V Scarano IEEE Transactions on Industrial Informatics 12 (2), 567-575, 2016 | 23 | 2016 |
Visual qualities of the unified modeling language: deficiencies and improvements A Fish, H Storrle IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007 …, 2007 | 20 | 2007 |
Apparatus: Reasoning About Security Requirements in the Internet of Things O Mavropoulos, H Mouratidis, A Fish, E Panaousis, C Kalloniatis Advanced Information Systems Engineering Workshops: CAiSE 2016 International …, 2016 | 19 | 2016 |
A combinatorial approach to knot recognition A Fish, A Lisitsa, D Stanovský Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015 …, 2015 | 19 | 2015 |
Incorporating privacy patterns into semi-automatic business process derivation N Argyropoulos, C Kalloniatis, H Mouratidis, A Fish 2016 IEEE Tenth International Conference on Research Challenges in …, 2016 | 18 | 2016 |
Detecting unknots via equational reasoning, I: Exploration A Fish, A Lisitsa International Conference on Intelligent Computer Mathematics, 76-91, 2014 | 18 | 2014 |