Skip to main content

Research Repository

Advanced Search

Outputs (2242)

A Recommender System based on Idiotypic Artificial Immune Networks (2005)
Journal Article
Cayzer, S., & Aickelin, U. (2005). A Recommender System based on Idiotypic Artificial Immune Networks. https://doi.org/10.1007/s10852-004-5336-7

The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an Artificial Immune System (AIS) that exploits some of these characteristics and is applied to the task of film reco... Read More about A Recommender System based on Idiotypic Artificial Immune Networks.

'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance' (2005)
Presentation / Conference Contribution
Kim, J., Wilson, W., Aickelin, U., & McLeod, J. 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present t... Read More about 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'.

Strategic Alert Throttling for Intrusion Detection Systems (2005)
Presentation / Conference Contribution
Tedesco, G., & Aickelin, U. Strategic Alert Throttling for Intrusion Detection Systems. Presented at 4th WSEAS International Conference on Information Security

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are ver... Read More about Strategic Alert Throttling for Intrusion Detection Systems.

'Towards a Conceptual Framework for Innate Immunity' (2005)
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. 'Towards a Conceptual Framework for Innate Immunity'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopt... Read More about 'Towards a Conceptual Framework for Innate Immunity'.

A Decomposition, Construction and Post-Processing Approach for Nurse Rostering (2005)
Presentation / Conference Contribution
Brucker, P., Qu, R., Burke, E., & Post, G. A Decomposition, Construction and Post-Processing Approach for Nurse Rostering. Presented at Multidisciplinary International Conference on Scheduling : Theory and Applications

This paper presents our work on decomposing a specific nurse rostering problem by cyclically assigning blocks of shifts, which are designed considering both hard and soft constraints, to groups of nurses. The rest of the shifts are then assigned to t... Read More about A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems (2005)
Book Chapter
Burke, E., Dror, M., Petrovic, S., & Qu, R. (2005). Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems. In B. Golden, S. Raghavan, & E. Wasil (Eds.), The Next Wave in Computing, Optimization, and Decision Technologies. Springer

This paper is concerned with the hybridization of two graph coloring heuristics (Saturation Degree and Largest Degree), and their application within a hyperheuristic for exam timetabling problems. Hyper-heuristics can be seen as algorithms which inte... Read More about Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems.

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. An Architecture for Proof Planning Systems. Presented at Nineteenth International Joint Conference on Artificial Intelligence, IJCAI-05

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. Student attitudes to plagiarism and collusion within computer science. Presented at Plagiarism: Prevention, Practics and Policy

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. What can be learned from failed proofs of non-theorems?. Presented at Theorem Proving in Higher Order Logics: Emerging Trends Proceedings

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. Accurate Step Counting. Presented at 17th International Workshop on Implementation and Application of Functional Languages

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.