


default search action
Peter A. Lindsay
Person information
- affiliation: University of Queensland, Brisbane, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c34]Peter A. Lindsay, Sentot Kromodimoeljo, Paul A. Strooper, Mohamed Almorsy:
Automation of Test Case Generation from Behavior Tree Requirements Models. ASWEC 2015: 118-127 - [c33]Sentot Kromodimoeljo, Peter A. Lindsay:
Automatic Generation of Minimal Cut Sets. ESSS 2015: 33-47 - 2012
- [j10]Peter A. Lindsay
, Nisansala Yatapanage
, Kirsten Winter:
Cut Set Analysis using Behavior Trees and model checking. Formal Aspects Comput. 24(2): 249-266 (2012) - [j9]Soon-Kyeong Kim, Toby Myers, Marc-Florian Wendland, Peter A. Lindsay
:
Execution of natural language requirements using State Machines synthesised from Behavior Trees. J. Syst. Softw. 85(11): 2652-2664 (2012) - 2011
- [j8]Lars Grunske
, Kirsten Winter, Nisansala Yatapanage
, Saad Zafar
, Peter A. Lindsay
:
Experience with fault injection experiments for FMEA. Softw. Pract. Exp. 41(11): 1233-1258 (2011) - 2010
- [c32]Peter A. Lindsay, Franz J. Rammig, Mike Hinchey, Jon Timmis:
Preface. DIPES/BICC 2010: 219 - [c31]Peter A. Lindsay:
Behavior Trees: From Systems Engineering to Software Engineering. SEFM 2010: 21-30 - [c30]Peter A. Lindsay, Kirsten Winter, Nisansala Yatapanage
:
Safety Assessment Using Behavior Trees and Model Checking. SEFM 2010: 181-190 - [e5]Mike Hinchey, Bernd Kleinjohann, Lisa Kleinjohann, Peter A. Lindsay, Franz J. Rammig, Jon Timmis, Marilyn Wolf:
Distributed, Parallel and Biologically Inspired Systems - 7th IFIP TC 10 Working Conference, DIPES 2010 and 3rd IFIP TC 10 International Conference, BICC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. IFIP Advances in Information and Communication Technology 329, Springer 2010, ISBN 978-3-642-15233-7 [contents]
2000 – 2009
- 2009
- [c29]Kuang-Yuan Chen, Peter A. Lindsay:
Feedback of Delayed Rewards in XCS for Environments with Aliasing States. ACAL 2009: 252-261 - [c28]Kuang-Yuan Chen, Peter A. Lindsay, Peter J. Robinson, Hussein A. Abbass
:
A hierarchical conflict resolution method for multi-agent path planning. IEEE Congress on Evolutionary Computation 2009: 1169-1176 - 2008
- [j7]Antonio Cerone, Simon Connelly, Peter A. Lindsay:
Formal analysis of human operator behavioural patterns in interactive surveillance systems. Softw. Syst. Model. 7(3): 273-286 (2008) - 2007
- [c27]Simon Connelly, Peter A. Lindsay, Marcus Gallagher
:
An agent based approach to examining shared situation awareness. ICECCS 2007: 138-147 - [c26]Kuang-Yuan Chen, Hai Huong Dam, Peter A. Lindsay, Hussein A. Abbass
:
Biasing XCS with Domain Knowledge for Planning Flight Trajectories in a Moving Sector Free Flight Environment. ALIFE 2007: 456-462 - 2006
- [c25]Lars Grunske
, Peter A. Lindsay, Egor Bondarev, Yiannis Papadopoulos, David Parker:
An Outline of an Architecture-Based Method for Optimizing Dependability Attributes of Software-Intensive Systems. WADS 2006: 188-209 - 2005
- [j6]David Hemer, Peter A. Lindsay
:
Template-based construction of verified software. IEE Proc. Softw. 152(1): 2-12 (2005) - [c24]Lars Grunske
, Peter A. Lindsay, Nisansala Yatapanage
, Kirsten Winter:
An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees. IFM 2005: 129-149 - [c23]Antonio Cerone, Peter A. Lindsay, Simon Connelly:
Formal Analysis of Human-computer Interaction using Model-checking. SEFM 2005: 352-362 - 2004
- [j5]Hagen Völzer, Anthony MacDonald, Brenton Atchison, Andrew Hanlon, Peter A. Lindsay, Paul A. Strooper
:
SubCM: A Tool for Improved Visibility of Software Change in an Industrial Setting. IEEE Trans. Software Eng. 30(10): 675-693 (2004) - [c22]Cameron Smith, Kirsten Winter, Ian J. Hayes, R. Geoff Dromey, Peter A. Lindsay, David A. Carrington:
An Environment for Building a System out of its Requirements. ASE 2004: 398-399 - [c21]Christian Hamoy, David Hemer, Peter A. Lindsay:
HazLog: Tool Support for Hazard Management. SCS 2004: 77-87 - [e4]Peter A. Lindsay, Anthony Cant:
Safety Critical Systems and Software 2003, Eigth Australian Workshop on Safety-Related Programmable Systems, (SCS2003), Canberra, ACT, Australia, 9-10 October 2003. CRPIT 33, Australian Computer Society 2004 [contents] - 2003
- [e3]Peter A. Lindsay:
Safety Critical Systems and Software 2002, Seventh Australian Workshop on Safety-Related Programmable Systems, (SCS2002), Adelaide, Australia, 17-18 October 2002. CRPIT 15, Australian Computer Society 2003, ISBN 0-909-92593-3 [contents] - 2002
- [c20]David Hemer, Peter A. Lindsay:
Supporting Component-Based Reuse in CARE. ACSC 2002: 95-104 - [c19]Peter A. Lindsay, Simon Connelly:
Modelling Erroneous Operator Behaviours for an Air-Traffic Control Task. AUIC 2002: 43-54 - [c18]Hagen Völzer, Brenton Atchison, Paul A. Strooper, Peter A. Lindsay, Anthony MacDonald:
A Tool for Subsystem Configuration Management. ICSM 2002: 492-500 - [e2]Lars-Henrik Eriksson, Peter A. Lindsay:
FME 2002: Formal Methods - Getting IT Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings. Lecture Notes in Computer Science 2391, Springer 2002, ISBN 3-540-43928-5 [contents] - 2001
- [c17]David Hemer, Peter A. Lindsay:
Specification-Based Retrieval Strategies for Module Reuse. Australian Software Engineering Conference 2001: 235-243 - [c16]Peter A. Lindsay, Anthony MacDonald, Paul A. Strooper, Mark Staples:
A Framework for Subsystem-Based Configuration Management . Australian Software Engineering Conference 2001: 275-284 - [c15]David Leadbetter, Andrew Hussey, Peter A. Lindsay, Andrew Neal
, Mike Humphreys:
Towards Model Based Prediction of Human Error Rates in Interactive Systems. AUIC 2001: 42-49 - [c14]Jason McDonald, Leesa Murray, Peter A. Lindsay, Paul A. Strooper:
Module Testing Embedded Software--An Industrial Pilot Project. ICECCS 2001: 233- - [c13]Peter A. Lindsay:
Improved Acquisition Processes for Safety-Critical Systems in the Australian Department of Defence. SCS 2001: 31-38 - [e1]Peter A. Lindsay:
Safety Critical Systems and Software 2001, Sixth Australian Workshop on Safety-Related Programmable Systems, (SCS2001), St Lucia, Queensland, Australia, 6 July 2001. CRPIT 3, Australian Computer Society 2001, ISBN 0-909-92581-X [contents] - 2000
- [c12]Brenton Atchison, Peter A. Lindsay:
Safety validation of embedded control software using Z animation. HASE 2000: 228-237 - [c11]Peter A. Lindsay, John A. McDermid, David J. Tombs:
Deriving Quantified Safety Requirements in Complex Systems. SAFECOMP 2000: 117-130
1990 – 1999
- 1998
- [c10]Peter A. Lindsay, Owen Traynor:
Supporting Fine-Grained Traceability in Software Development Environments. SCM 1998: 133-139 - 1997
- [j4]Peter A. Lindsay:
Formal approach to specification and verification of task management in interactive systems. IEE Proc. Softw. Eng. 144(4): 206-214 (1997) - [c9]David Hemer, Peter A. Lindsay:
Reuse of Verified Design Templates Through Extended Pattern Matching. FME 1997: 495-514 - [c8]Peter A. Lindsay, David Hemer:
Using CARE to Construct Verified Software. ICFEM 1997: 122-131 - [c7]Peter A. Lindsay, John A. McDermid:
A systematic approach to software safety integrity levels. SAFECOMP 1997: 70-82 - 1996
- [c6]Tracey Hart, Fiona Linn, Roberto Morello, Greg Royle, Peter Kearney, Peter A. Lindsay, Kelvin J. Ross, Owen Traynor:
Formal Methods Pilot Project. APSEC 1996: 238-245 - [c5]Peter A. Lindsay, David Hemer:
An Industrial-Strength Method For The Construction Of Formally Verified Software. Australian Software Engineering Conference 1996: 27- - 1994
- [b2]Juan Bicarregui
, John S. Fitzgerald, Peter A. Lindsay, Richard C. Moore, Brian Ritchie:
Proof in VDM: A Practitioner's Guide. Formal approaches to computing and information technology, Springer 1994, ISBN 978-3-540-19813-0, pp. 1-341 - [c4]Peter A. Lindsay:
On transferring VDM verification techniques to Z. FME 1994: 190-213 - [c3]Kelvin J. Ross, Peter A. Lindsay:
A Precise Examination of the Behaviour of Process Models. FME 1994: 251-270 - 1993
- [c2]Kelvin J. Ross, Peter A. Lindsay:
Maintaining Consistency Under Changes to Formal Specifications. FME 1993: 558-577 - 1991
- [b1]Clifford B. Jones, K. D. Jones, Peter Alexander Lindsay, Richard C. Moore:
Mural - a formal development support system. Springer 1991, ISBN 3-540-19651-X, pp. I-XIII, 1-421
1980 – 1989
- 1988
- [j3]Peter A. Lindsay:
A survey of mechanical support for formal reasoning. Softw. Eng. J. 3(1): 3-27 (1988) - [j2]Peter A. Lindsay:
On Alternating omega-Automata. J. Comput. Syst. Sci. 36(1): 16-24 (1988) - [c1]Cliff B. Jones
, Peter A. Lindsay:
A Support System for Formal Reasoning: Requirements and Status. VDM Europe 1988: 139-152 - 1986
- [j1]Peter A. Lindsay:
Alternation and omega-Type Turing Acceptors. Theor. Comput. Sci. 43: 107-115 (1986)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint