Now showing items 80-99 of 136

  • Interim report on the Causes of and Circumstances attending the Explosion which occured at Whitehaven William Colliery, Cumberland, on the 15th August, 1947 

    Bryan, A. M. (His Majesty's Stationery Office, 1947-10)
    MINISTRY OF FUEL AND POWER INTERIM REPORT On the Causes of and Circumstances attending the Explosion which occurred at Whitehaven "William" Colliery, Cumberland, on the 15th August, 1947 By A. M. BRYAN, Esq., J.P., ...
  • International Convention for the Safety of Life at Sea, 1948 

    Anonymous (Her Majesty's Stationery Office, 1953-01)
  • Isamode: Theorem Proving with Isabelle inside Emacs 

    Aspinall, David (The University of Edinburgh, 2000)
    This paper documents Isamode, a user-interface and suite of editing functions for using the theorem prover Isabelle inside Emacs.
  • Learning Inequated Range Restricted Horn Expressions 

    Arias, Marta; Khardon, Roni (2000-03)
    A learning algorithm for the class of inequated range restricted Horn expressions is presented and proved correct. The main property of this class is that all the terms in the conclusion of a clause appear in the antecedent ...
  • Long-term care facilities in Ontario, Canada: A waste management overview 

    Gales, John; Roy-Poirier, A; Champagne, P (white paper report, 2009)
    Long-term care (LTC) facilities are growing in number in the province of Ontario. Typically, Canadian LTC facilities house an average of over 100 residents. Environmental concerns associated to waste management in LTC ...
  • Making a Productive Use of Failure to Generate Witnesses for Coinduction from Divergent Proof Attempts 

    Dennis, Louise; Bundy, Alan; Green, Ian (1999)
    Coinduction is a proof rule. It is the dual of induction. It allows reasoning about non--well--founded structures such as lazy lists or streams and is of particular use for reasoning about equivalences. A central difficulty ...
  • Million Atom KS-DFT with CP2K 

    Bethune, Iain; Carter, Adam; Guo, Xu; Korosoglou, Paschalis (2011)
    CP2K is a powerful materials science and computational chemistry code and is widely used by research groups across Europe and beyond. The recent addition of a linear scaling KS-DFT method within the code has made it possible ...
  • Mineral Resources Consultative Committee - Fluorspar 

    Notholt, A. J. G.; Highley, D. E. (Her Majesty's Stationery Office, 1971)
    Widespread and increasing interest in the mineral resources of the United Kingdom has led the Mineral Resources Consultative Committee to undertake the collation of the factual information at present available about minerals ...
  • MOOCs @ Edinburgh 2013: Report #1 

    MOOCs@Edinburgh Group (The University of Edinburgh, 2013-05-10)
    A report summarising the experience of the University of Edinburgh of offering our first 6 massive open online courses (MOOCs) in partnership with Coursera
  • Multi-Predicate Induction Schemes for Mutual Recursion 

    Boulton, Richard (2000-04)
    Where mutually recursive data types are used in programming languages, etc., mutually recursive functions are usually required. Mutually recursive functions are also quite common for non-mutually recursive types. Reasoning ...
  • A New Algorithm for Learning Range Restricted Horn Expressions 

    Arias, Marta; Khardon, Roni (2000-03)
    A learning algorithm for the class of range restricted Horn expressions is presented and proved correct. The algorithm works within the framework of learning from entailment, where the goal is to exactly identify some ...
  • OAIS Five-year review: Recommendations for update 

    Higgins, Sarah; Semple, Najla (Digital Curation Centre, 2006-10-31)
    This document is a compilation of comments gathered from a joint meeting of the Networks Associates Members of the Digital Curation Centre and members of the Digital Preservation Coalition on 13 October 2006. It was ...
  • Online intermediaries and copyright liability 

    Waelde, Charlotte; Edwards, Lilian (World Intellectual Property Organisation, 2005)
    The report, presented to the World Intellectual Property Organisation, examines the role of online intermediaries, and liability for copyright infringement. The authors discuss the difficulties found in disclosure identity ...
  • Policy and Contract Management for Semantic Web Services 

    Uszok, A; Bradshaw, J M; Jeffers, R; Johnson, M; Tate, Austin; Dalton, J; Aitken, Stuart (AAAI Press, 2004-03)
    This paper summarizes our efforts to develop capabilities for policy and contract management for Semantic Web Services applications. KAoS services and tools allow for the specification, management, analyzes, disclosure and ...
  • The Polyadic pi-Calculus: A Tutorial 

    Milner, Robin (The University of Edinburgh, 1991)
    The pi-calculus is a model of concurrent computation based upon the notion of naming. It is first presented in its simplest and original form, with the help of several illustrative applications. Then it is generalized from ...
  • A practical guide to implementing the DCC testbed methodology 

    Jones, Sarah; McCann, Patrick; Kim, Yunhyong (Digital Curation Centre, 2009)
    The Digital Curation Centre is committed to advancing knowledge in digital preservation. As digital preservation is a young discipline many of its methods are untested. The testbed methodology developed by DCC researchers ...
  • A preliminary analysis of some Flambeau data 

    Western, A.M. (Home Office Scientific Advisers's Branch, 1967-01)
    Three burns are covered: 760-1, 760-2, and 460-14. Temperatures, thermal radiation, etc. were analysed, but not air movements or pressure measurements. A standard empirical intensity-tille curve was fitted to all of them, ...
  • Project Store: Work Package 5 evaluation 

    Pryor, Graham (2007)
    A final report to the StORe Project Board on the process and outcomes of the project, including recommendations for further development
  • Proofs About Lists Using Ellipsis 

    Bundy, Alan; Richardson, Julian (1999-09)
    In this paper we explore the use of ellipsis in proofs about lists. We present a higher-order formulation of elliptic formulae, and describe its implementation in the LambdaClam proof planner. We use an unambiguous ...
  • Report of Home Office Gas Cylinders and Containers Committee 

    Anonymous (Home Office, Fire Department, 1969)
    Report of Home Office Gas Cylinders and Containers Committee