Skip to main content

Research Repository

Advanced Search

Outputs (2368)

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. An Architecture for Proof Planning Systems. Presented at Nineteenth International Joint Conference on Artificial Intelligence, IJCAI-05

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. Student attitudes to plagiarism and collusion within computer science. Presented at Plagiarism: Prevention, Practics and Policy

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. What can be learned from failed proofs of non-theorems?. Presented at Theorem Proving in Higher Order Logics: Emerging Trends Proceedings

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. Accurate Step Counting. Presented at 17th International Workshop on Implementation and Application of Functional Languages

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.

Calculating an Exceptional Machine (2005)
Presentation / Conference Contribution
Hutton, G., & Wright, J. Calculating an Exceptional Machine. Presented at Proceedings of the Fifth Symposium on Trends in Functional Programming

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalizatio... Read More about Calculating an Exceptional Machine.

Enhancing composite Digital Documents Using XML-based Standoff Markup (2005)
Presentation / Conference Contribution
Thomas, P. L., & Brailsford, D. F. Enhancing composite Digital Documents Using XML-based Standoff Markup. Presented at ACM Symposium on Document Enginering (DocEng05)

Document representations can rapidly become unwieldy if they try to encapsulate all possible document properties, ranging from abstract structure to detailed rendering and layout.
We present a composite document approach wherein an XMLbased document... Read More about Enhancing composite Digital Documents Using XML-based Standoff Markup.

Designing the spectator experience (2005)
Presentation / Conference Contribution
Reeves, S., Benford, S., O'Malley, C., & Fraser, M. Designing the spectator experience. Presented at SIGCHI Conference on Human Factors in Computing Systems (CHI)

Interaction is increasingly a public affair, taking place in our theatres, galleries, museums, exhibitions and on the city streets. This raises a new design challenge for HCI, questioning how a performer s interaction with a computer experienced is b... Read More about Designing the spectator experience.

Encapsulating and Manipulating Component Object Graphics (COGs) using SVG (2005)
Presentation / Conference Contribution
Macdonald, A. J., Brailsford, D. F., & Bagley, S. R. Encapsulating and Manipulating Component Object Graphics (COGs) using SVG. Presented at ACM Symposium on Document Engineering (DocEng05)

Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised XML documents.There is increasing interest in using SVG as a Page Descri... Read More about Encapsulating and Manipulating Component Object Graphics (COGs) using SVG.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. Presented at Adaptive and Resilient Computing Security Workshop (ARCS-05)

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.