Skip to main content

Research Repository

Advanced Search

All Outputs (1967)

On the comparison of proof planning systems: Lambda-clam, Omega and IsaPlanner
Conference Proceeding
Dennis, L. A., Jamnik, M., & Pollet, M. (2005). On the comparison of proof planning systems: Lambda-clam, Omega and IsaPlanner. In J. Carette, & W. Farmer (Eds.),

We present a framework for describing proof planners. This framework is based around a decomposition of proof planners into planning states, proof language, proof plans, proof methods, proof revision, proof control and planning algorithms. We us... Read More about On the comparison of proof planning systems: Lambda-clam, Omega and IsaPlanner.

Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses, both reac... Read More about Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Re-tracing the past: mixing realities in museum settings
Conference Proceeding
Fraser, M., Bowers, J., Brundell, P., O'Malley, C., Reeves, S., Benford, S., …Hellström, S. O. Re-tracing the past: mixing realities in museum settings.

Interactive exhibits are now commonplace in museum settings. However, many technologies co-exist uneasily with more traditional methods of display. In this paper we describe a design strategy for mixing realities in museum spaces. An approach i... Read More about Re-tracing the past: mixing realities in museum settings.

A New Paradigm for Heuristic Decision Making, Invited Keynote Talk
Conference Proceeding
Aickelin, U. A New Paradigm for Heuristic Decision Making, Invited Keynote Talk.

Over the last few years, more and more heuristic decision making techniques have been inspired by nature, e.g. evolutionary algorithms, ant colony optimisation and simulated annealing. More recently, a novel computational intelligence technique inspi... Read More about A New Paradigm for Heuristic Decision Making, Invited Keynote Talk.

A Note on Collaborating Adversaries in the Srinathan-Kumar-Rangan Transmission Protocol
Book
Moss, B. (2003). A Note on Collaborating Adversaries in the Srinathan-Kumar-Rangan Transmission Protocol. University of Nottingham

We show, by means of brief demonstration, that the underlying transmission protocol in [1] cannot determine dishonest paths when adversaries collaborate. Hence, this method of tolerating mixed adversaries on an asynchronous network is flawed.

On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
Journal Article
Cayzer, S., & Aickelin, U. On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems

It has previously been shown that a recommender based on immune system idiotypic principles can outperform one based on correlation alone. This paper reports the results of work in progress, where we undertake some investigations into the nature of t... Read More about On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems.

A Hybrid Genetic Algorithm to Solve a Logt-Sizing and Scheduling Problem
Conference Proceeding
Staggemeier, A., Clark, A., Aickelin, U., & Smith, J. A Hybrid Genetic Algorithm to Solve a Logt-Sizing and Scheduling Problem.

Abstract: This paper reports a lot-sizing and scheduling problem, which minimizes inventory and backlog costs on m parallel machines with sequence-dependent set-up times over t periods. Problem solutions are represented as product subsets ordered and... Read More about A Hybrid Genetic Algorithm to Solve a Logt-Sizing and Scheduling Problem.

And now for something completely different: looking ahead to new encryption and secrecy protocols
Conference Proceeding
Ashman, H., & Gilbert, M. (2001). And now for something completely different: looking ahead to new encryption and secrecy protocols.

Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. The Internet has made it possible to transmit vast volumes of data more rapidly and ch... Read More about And now for something completely different: looking ahead to new encryption and secrecy protocols.

A Simulator Program for Evaluating and Improving the Nottingham Muse Architecture.
Book
Barrett, N. K., Brailsford, D. F., & Duckworth, R. J. (1986). A Simulator Program for Evaluating and Improving the Nottingham Muse Architecture. Computer Science

This paper describes the modelling and simulation of the Nottingham MUSE (MUltiple Stream Evaluator) machine. MUSE is a data flow machine capable of supporting structured parallel computation. The simulator described in this paper was designed to ena... Read More about A Simulator Program for Evaluating and Improving the Nottingham Muse Architecture..

Development of a Real Time System in Algol 68.
Conference Proceeding
Mander, K. C., & Brailsford, D. F. (1975). Development of a Real Time System in Algol 68. In C. C. Charlton, & P. H. Leng (Eds.),

For various reasons, many Algol 68 compilers do not directly implement the parallel processing operations defined in the Revised Algol 68 Report. It is still possible however, to perform parallel processing, multitasking and simulation provided that... Read More about Development of a Real Time System in Algol 68..

Creating personalised energy plans: from groups to individuals using Fuzzy C Means Clustering
Conference Proceeding
Dent, I., Wagner, C., Aickelin, U., & Rodden, T. Creating personalised energy plans: from groups to individuals using Fuzzy C Means Clustering.

Changes in the UK electricity market mean that domestic users will be required to modify their usage behaviour in accordance with energy eciency targets. Clustering allows usage data, collected at the household level, to be clustered into groups... Read More about Creating personalised energy plans: from groups to individuals using Fuzzy C Means Clustering.

Modelling reactive and proactive behaviour in simulation
Conference Proceeding
Majid, M. A., Siebers, P., & Aickelin, U. Modelling reactive and proactive behaviour in simulation.

This research investigated the simulation model behaviour of a traditional and combined discrete event as well as agent based simulation models when modelling human reactive and proactive behaviour in human centric complex systems. A departmental st... Read More about Modelling reactive and proactive behaviour in simulation.

Discovering sequential patterns in a UK general practice database
Conference Proceeding
Reps, J., Garibaldi, J. M., Aickelin, U., Soria, D., Gibson, J. E., & Hubbard, R. B. Discovering sequential patterns in a UK general practice database.

The wealth of computerised medical information becoming readily available presents the opportunity to examine patterns of illnesses, therapies and responses. These patterns may be able to predict illnesses that a patient is likely to develop, allowi... Read More about Discovering sequential patterns in a UK general practice database.