Skip to main content

Research Repository

Advanced Search

All Outputs (23)

A component based heuristic search method with evolutionary eliminations for hospital personnel scheduling (2008)
Journal Article
Li, J., Aickelin, U., & Burke, E. (in press). A component based heuristic search method with evolutionary eliminations for hospital personnel scheduling. INFORMS Journal on Computing, 21(3), https://doi.org/10.1287/ijoc.1080.0298

Nurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with evolutionary eliminations for a nurse scheduling problem arising at a major U... Read More about A component based heuristic search method with evolutionary eliminations for hospital personnel scheduling.

Datatype-generic termination proofs (2008)
Journal Article
Backhouse, R., & Doornbos, H. (2008). Datatype-generic termination proofs. Theory of Computing Systems, 43(3-4), https://doi.org/10.1007/s00224-007-9056-z

Datatype-generic programs are programs that are parameterised by a datatype. We review the allegorical foundations of a methodology of designing datatype-generic programs. The notion of F-reductivity, where F parametrises a datatype, is reviewed and... Read More about Datatype-generic termination proofs.

Great deluge with non-linear decay rate for solving course timetabling problems (2008)
Conference Proceeding
Landa-Silva, D., & Obit, J. H. (2008). Great deluge with non-linear decay rate for solving course timetabling problems. https://doi.org/10.1109/IS.2008.4670447

Course timetabling is the process of allocating, subject to constraints, limited rooms and timeslots for a set of courses to take place. Usually, in addition to constructing a feasible timetable (all constraints satisfied), there are desirable goals... Read More about Great deluge with non-linear decay rate for solving course timetabling problems.

A survey of search methodologies and automated system development for examination timetabling (2008)
Journal Article
Qu, R., Burke, E., McCollum, B., Merlot, L., & Lee, S. (2008). A survey of search methodologies and automated system development for examination timetabling. Journal of Scheduling, 12(1), https://doi.org/10.1007/s10951-008-0077-5

Examination timetabling is one of the most important administrative activities that takes place in all academic institutions. In this paper, we present a critical discussion of the research on exam timetabling which has taken place in the last decade... Read More about A survey of search methodologies and automated system development for examination timetabling.

Hybridizations within a graph based hyper-heuristic framework for university timetabling problems (2008)
Journal Article
Qu, R., & Burke, E. (2008). Hybridizations within a graph based hyper-heuristic framework for university timetabling problems. Journal of the Operational Research Society, 60(9), https://doi.org/10.1057/jors.2008.102

A significant body of recent literature has explored various research directions in hyper-heuristics (which can be thought as heuristics to choose heuristics). In this paper, we extend our previous work to construct a unified graph-based hyper-heuris... Read More about Hybridizations within a graph based hyper-heuristic framework for university timetabling problems.

Evolutionary multi-objective simulated annealing with adaptive and competitive search direction (2008)
Conference Proceeding
Li, H., & Landa-Silva, D. (2008). Evolutionary multi-objective simulated annealing with adaptive and competitive search direction. https://doi.org/10.1109/CEC.2008.4631246

In this paper, we propose a population-based implementation of simulated annealing to tackle multi-objective optimisation problems, in particular those of combinatorial nature. The proposed algorithm is called Evolutionary Multiobjective Simulated An... Read More about Evolutionary multi-objective simulated annealing with adaptive and competitive search direction.

A frequency domain approach to roto-translation estimation using gradient cross-correlation (2008)
Conference Proceeding
Tzimiropoulos, G., Argyriou, V., & Stathaki, T. (2008). A frequency domain approach to roto-translation estimation using gradient cross-correlation.

A novel frequency domain approach to roto-translation estimation is presented. The baseline gradient cross-correlation method is extended to handle rotations. A key feature of the proposed scheme is the ability to achieve good performance in the pres... Read More about A frequency domain approach to roto-translation estimation using gradient cross-correlation.

Tracking sub-page components in document workflows (2008)
Conference Proceeding
Ollis, J. A., Bagley, S. R., & Brailsford, D. F. (2008). Tracking sub-page components in document workflows. . https://doi.org/10.1145/1410140.1410156

Documents go through numerous transformations and intermediate formats as they are processed from abstract markup into final printable form. This notion of a document workflow is well established but it is common to find that ideas about document com... Read More about Tracking sub-page components in document workflows.

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

Introduction to Multi-Agent Simulation (2008)
Book Chapter
Siebers, P., & Aickelin, U. (2008). Introduction to Multi-Agent Simulation. In F. Adam, & P. Humphreys (Eds.), Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

When designing systems that are complex, dynamic and stochastic in nature, simulation is generally recognised as one of the best design support technologies, and a valuable aid in the strategic and tactical decision making process. A simulation model... Read More about Introduction to Multi-Agent Simulation.

Adaptive and assortative mating scheme for evolutionary multi-objective algorithms (2008)
Book Chapter
Le, K., & Landa-Silva, D. (2008). Adaptive and assortative mating scheme for evolutionary multi-objective algorithms. In Artificial Evolution: 8th International Conference, Evolution Artificielle, EA 2007, Tours, France, October 29-31, 2007, Revised Selected Papers, (172-183). Springer Verlag. https://doi.org/10.1007/978-3-540-79305-2_15

We are interested in the role of restricted mating schemes in the context of evolutionary multi-objective algorithms. In this paper, we propose an adaptive assortative mating scheme that uses similarity in the decision space (genotypic assortative ma... Read More about Adaptive and assortative mating scheme for evolutionary multi-objective algorithms.

Multi-Agent Simulation and Management Practices (2008)
Book Chapter
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. (2008). Multi-Agent Simulation and Management Practices. In Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

Intelligent agents offer a new and exciting way of understanding the world of work. Agent-Based Simulation (ABS), one way of using intelligent agents, carries great potential for progressing our understanding of management practices and how they link... Read More about Multi-Agent Simulation and Management Practices.

Enhancing productivity: the role of management practices (2008)
Journal Article
Siebers, P., Aickelin, U., Battisti, G., Celia, H., Clegg, C., Fu, X., …Peixoto, A. (2008). Enhancing productivity: the role of management practices

There is no doubt that management practices are linked to the productivity and performance of a company. However, research findings are mixed. This paper provides a multi-disciplinary review of the current evidence of such a relationship and offers s... Read More about Enhancing productivity: the role of management practices.

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More about Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows.

DCA for bot detection (2008)
Book Chapter
Al-Hammadi, Y., Aickelin, U., & Greensmith, J. (2008). DCA for bot detection. In IEEE Congress on Evolutionary Computation, 2008: CEC 2008. IEEE

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex d... Read More about DCA for bot detection.

Detecting bots based on keylogging activities (2008)
Book Chapter
Al-Hammadi, Y., & Aickelin, U. (2008). Detecting bots based on keylogging activities. In Proceedings of the Third International Conference on Availability, Security, and Reliability: March 4-7, 2008, Barcelona, Spain. Barcelona, Spain: IEEE Computer Society

Real-time alert correlation with type graphs (2008)
Book Chapter
Tedesco, G., & Aickelin, U. (2008). Real-time alert correlation with type graphs. In R. Sekar, & A. K. Pujari (Eds.), Information systems security: 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008: proceedings /. Springer

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose whic... Read More about Real-time alert correlation with type graphs.

The Motif Tracking Algorithm (2008)
Journal Article
Wilson, W., Birkin, P., & Aickelin, U. (2008). The Motif Tracking Algorithm. International Journal of Automation and Computing, 5(January), 32–44

The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper we introduce the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to iden... Read More about The Motif Tracking Algorithm.

Symmetry detection using frequency domain motion estimation techniques (2008)
Conference Proceeding
Tzimiropoulos, G., Argyriou, V., & Stathaki, T. (2008). Symmetry detection using frequency domain motion estimation techniques. . https://doi.org/10.1109/ICASSP.2008.4517746

A frequency domain approach for the detection of symmetries in real images is presented. Our framework is based on recent state-of-the-art research where motion estimation techniques are employed to sequentially determine all the associated parameter... Read More about Symmetry detection using frequency domain motion estimation techniques.

A comparison of three different methods for classification of breast cancer data (2008)
Conference Proceeding
Soria, D., Garibaldi, J. M., Biganzoli, E. M., & Ellis, I. O. (2008). A comparison of three different methods for classification of breast cancer data.

The classification of breast cancer patients is of great importance in cancer diagnosis. During the last few years, many algorithms have been proposed for this task. In this paper, we review different supervised machine learning techniques for classi... Read More about A comparison of three different methods for classification of breast cancer data.