Skip to main content

Research Repository

Advanced Search

All Outputs (24)

An Animation System for Fracturing of Rigid Objects (2005)
Book Chapter
Kucukyilmaz, A., & Ozguc, B. (2005). An Animation System for Fracturing of Rigid Objects. In Computer and Information Sciences - ISCIS 2005: 20th International Symposium, Istanbul, Turkey, October 26-28, 2005. Proceedings (688--697). Springer Berlin Heidelberg. https://doi.org/10.1007/11569596_71

This paper describes a system for the animation of fracturing brittle objects. The system combines rigid body simulation methods with a constraint-based model to animate fracturing of arbitrary polyhedral shaped objects under impact. The objects are... Read More about An Animation System for Fracturing of Rigid Objects.

Multi-objective hyper-heuristic approaches for space allocation and timetabling (2005)
Book Chapter
Burke, E. K., Landa Silva, D. J., & Soubeiga, E. (2005). Multi-objective hyper-heuristic approaches for space allocation and timetabling. In Meta-heuristics: Progress as Real Problem Solvers (129-158). Springer Verlag. https://doi.org/10.1007/0-387-25383-1_6

An important issue in multi-objective optimisation is how to ensure that the obtained non-dominated set covers the Pareto front as widely as possible. A number of techniques (e.g. weight vectors, niching, clustering, cellular structures, etc.) have b... Read More about Multi-objective hyper-heuristic approaches for space allocation and timetabling.

Hybrid Variable Neighborhood HyperHeuristicsfor Exam Timetabling Problems (2005)
Presentation / Conference Contribution
Qu, R., & Burke, E. (2005, August). Hybrid Variable Neighborhood HyperHeuristicsfor Exam Timetabling Problems. Paper presented at The Sixth Metaheuristics International Conference 2005, Vienna, Austria

This paper presents our work on analysing the high level search within a graph based hyperheuristic. The graph based hyperheuristic solves the problem at a higher level by searching through permutations of graph heuristics rather than the actual solu... Read More about Hybrid Variable Neighborhood HyperHeuristicsfor Exam Timetabling Problems.

Report on BCTCS 2005 (2005)
Journal Article
Hutton, G. (2005). Report on BCTCS 2005

This report contains edited abstracts from BCTCS 2005, which was held on 22nd to 24th March 2005 in Nottingham, England.

Expected, sensed, and desired: A framework for designing sensing-based interaction (2005)
Journal Article
Benford, S., Schnädelbach, H., Koleva, B., Anastasi, R., Greenhalgh, C., Rodden, T., …Steed, A. (2005). Expected, sensed, and desired: A framework for designing sensing-based interaction. ACM Transactions on Computer-Human Interaction, 12(1), 3-30. https://doi.org/10.1145/1057237.1057239

Movements of interfaces can be analyzed in terms of whether they are expected, sensed, and desired. Expected movements are those that users naturally perform; sensed are those that can be measured by a computer; and desired movements are those that a... Read More about Expected, sensed, and desired: A framework for designing sensing-based interaction.

The multimedia challenges raised by pervasive games (2005)
Presentation / Conference Contribution
Capra, M., Radenkovic, M., Benford, S., Oppermann, L., Drozd, A., & Flintham, M. The multimedia challenges raised by pervasive games. Presented at 13th Annual ACM International Conference on Multimedia (MULTIMEDIA '05)

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other multimedia sensors, combined with wir... Read More about The multimedia challenges raised by pervasive games.

Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems (2005)
Book Chapter
Burke, E., Dror, M., Petrovic, S., & Qu, R. (2005). Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems. In B. Golden, S. Raghavan, & E. Wasil (Eds.), The Next Wave in Computing, Optimization, and Decision Technologies. Springer

This paper is concerned with the hybridization of two graph coloring heuristics (Saturation Degree and Largest Degree), and their application within a hyperheuristic for exam timetabling problems. Hyper-heuristics can be seen as algorithms which inte... Read More about Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems.

Enhancing composite Digital Documents Using XML-based Standoff Markup (2005)
Presentation / Conference Contribution
Thomas, P. L., & Brailsford, D. F. (2005). Enhancing composite Digital Documents Using XML-based Standoff Markup. In P. R. King (Ed.),

Document representations can rapidly become unwieldy if they try to encapsulate all possible document properties, ranging from abstract structure to detailed rendering and layout. We present a composite document approach wherein an XMLbased document... Read More about Enhancing composite Digital Documents Using XML-based Standoff Markup.

Encapsulating and Manipulating Component Object Graphics (COGs) using SVG (2005)
Presentation / Conference Contribution
Macdonald, A. J., Brailsford, D. F., & Bagley, S. R. (2005). Encapsulating and Manipulating Component Object Graphics (COGs) using SVG. In P. R. King (Ed.),

Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised XML documents.There is increasing interest in using SVG as a Page Descri... Read More about Encapsulating and Manipulating Component Object Graphics (COGs) using SVG.

Calculating an Exceptional Machine (2005)
Presentation / Conference Contribution
Hutton, G., & Wright, J. (2005). Calculating an Exceptional Machine.

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalizatio... Read More about Calculating an Exceptional Machine.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. (2005). Accurate Step Counting.

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. (2005). What can be learned from failed proofs of non-theorems?. In J. Hurd, E. Smith, & A. Darbari (Eds.),

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). Student attitudes to plagiarism and collusion within computer science. In A. P. Smith, & F. Duggan (Eds.),

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). An Architecture for Proof Planning Systems. In L. P. Kaelbling, & A. Saffoitti (Eds.),

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

Artificial immune systems (2005)
Book Chapter
Aickelin, U., & Dasgupta, D. (2005). Artificial immune systems. In E. K. Burke, & G. Kendall (Eds.), Search Methodologies : Introductory Tutorials in Optimisation, Decision Support Techniques. Springer. https://doi.org/10.1007/0-387-28356-0

The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distri... Read More about Artificial immune systems.

A Decomposition, Construction and Post-Processing Approach for Nurse Rostering (2005)
Presentation / Conference Contribution
Brucker, P., Qu, R., Burke, E., & Post, G. (2005). A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

This paper presents our work on decomposing a specific nurse rostering problem by cyclically assigning blocks of shifts, which are designed considering both hard and soft constraints, to groups of nurses. The rest of the shifts are then assigned to t... Read More about A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

'Towards a Conceptual Framework for Innate Immunity' (2005)
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. (2005). 'Towards a Conceptual Framework for Innate Immunity'.

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopt... Read More about 'Towards a Conceptual Framework for Innate Immunity'.

Strategic Alert Throttling for Intrusion Detection Systems (2005)
Presentation / Conference Contribution
Tedesco, G., & Aickelin, U. (2005). Strategic Alert Throttling for Intrusion Detection Systems.

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are ver... Read More about Strategic Alert Throttling for Intrusion Detection Systems.

Designing the spectator experience (2005)
Presentation / Conference Contribution
Reeves, S., Benford, S., O'Malley, C., & Fraser, M. (2005). Designing the spectator experience.

Interaction is increasingly a public affair, taking place in our theatres, galleries, museums, exhibitions and on the city streets. This raises a new design challenge for HCI, questioning how a performer s interaction with a computer experienced is b... Read More about Designing the spectator experience.