David Gray

According to our database1, David Gray authored at least 38 papers between 1988 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Constructive Alignment of Learning Outcomes with Student Perceptions in a first-year Engineering Course.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Characterizing Inter-Layer Functional Mappings of Deep Learning Models.
CoRR, 2019

Brand Switching Pattern Discovery by Data Mining Techniques for the Telecommunication Industry in Australia.
Australas. J. Inf. Syst., 2016

The Commodity Exporting Country A Spectral Analysis of Brazilian and Australian Equity Markets.
Proceedings of the Computational Models of Complex Systems, 2014

DConfusion: a technique to allow cross study performance evaluation of fault prediction studies.
Autom. Softw. Eng., 2014

Robust low loss splicing of hollow core photonic bandgap fiber to itself.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Towards Verifying Voter Privacy through Unlinkability.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

A Systematic Literature Review on Fault Prediction Performance in Software Engineering.
IEEE Trans. Software Eng., 2012

Reflections on the NASA MDP data sets.
IET Softw., 2012

Comparing the performance of fault prediction models which report multiple performance measures: recomputing the confusion matrix.
Proceedings of the 8th International Conference on Predictive Models in Software Engineering, 2012

Developing Fault-Prediction Models: What the Research Can Show Industry.
IEEE Softw., 2011

Further thoughts on precision.
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011

The misuse of the NASA metrics data program data sets for automated software defect prediction.
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011

Holistic analysis of mix protocols.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Predicting drug absorption rates through human skin.
Proceedings of the International Joint Conference on Neural Networks, 2010

Software defect prediction using static code metrics underestimates defect-proneness.
Proceedings of the International Joint Conference on Neural Networks, 2010

E-Voting: A New Approach Using Double-Blind Identity-Based Encryption.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding.
Proceedings of the Wireless Algorithms, 2009

Adaptive pattern-based image compression for ultra-low bandwidth weapon seeker image communication.
Proceedings of the Visual Information Processing XVIII, 2009

Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

ProVer: A Secure System for the Provision of Verified Location Information.
Proceedings of the Mobile Computing, Applications, and Services, 2009

Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics.
Proceedings of the Engineering Applications of Neural Networks, 2009

Exploration of uncertainty in bidirectional vector fields.
Proceedings of the Visualization and Data Analysis 2008, 2008

An Access Control Model for Location based Services.
Proceedings of the Security in Information Systems, 2008

A frequency based sighting blurring algorithm for use with location based services on the internet.
Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, 2008

A three-party architecture and protocol that supports users with multiple identities for use with location based services.
Proceedings of the 5th international conference on Pervasive services, 2008

A formally verified proof of the prime number theorem.
ACM Trans. Comput. Log., 2007

Secure pseudonym management using mediated identity-based encryption.
J. Comput. Secur., 2006

A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebraic Methods Program., 2005

A Denotational Approach to the Static Analysis of Cryptographic Processes.
Electron. Notes Theor. Comput. Sci., 2005

A Static Analysis of PKI-Based Systems.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

Synthesising Attacks on Cryptographic Protocols.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Anonymous coursework submission.
Proceedings of the 4th International Conference on Computer Systems and Technologies: e-Learning, 2003

Specifying and Verifying IP with Linear Logic.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Four Logics and a Protocol.
Proceedings of the 3rd Irish Workshop on Formal Methods, Galway, Ireland, July 1999, 1999

Introduction to the formal design of real-time systems.
Applied computing, Springer, ISBN: 978-3-540-76140-2, 1999

The use of functional annotations in verifying imperative programs.
Softw. Eng. J., 1990

The Formal Specification of a Small Bookshop Information System.
IEEE Trans. Software Eng., 1988