Skip to main content

Research Repository

Advanced Search

All Outputs (2001)

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). An Architecture for Proof Planning Systems. In L. P. Kaelbling, & A. Saffoitti (Eds.),

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). Student attitudes to plagiarism and collusion within computer science. In A. P. Smith, & F. Duggan (Eds.),

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. (2005). What can be learned from failed proofs of non-theorems?. In J. Hurd, E. Smith, & A. Darbari (Eds.),

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. (2005). Accurate Step Counting.

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.

Calculating an Exceptional Machine (2005)
Presentation / Conference Contribution
Hutton, G., & Wright, J. (2005). Calculating an Exceptional Machine.

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalizatio... Read More about Calculating an Exceptional Machine.

Encapsulating and Manipulating Component Object Graphics (COGs) using SVG (2005)
Presentation / Conference Contribution
Macdonald, A. J., Brailsford, D. F., & Bagley, S. R. (2005). Encapsulating and Manipulating Component Object Graphics (COGs) using SVG. In P. R. King (Ed.),

Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised XML documents.There is increasing interest in using SVG as a Page Descri... Read More about Encapsulating and Manipulating Component Object Graphics (COGs) using SVG.

Enhancing composite Digital Documents Using XML-based Standoff Markup (2005)
Presentation / Conference Contribution
Thomas, P. L., & Brailsford, D. F. (2005). Enhancing composite Digital Documents Using XML-based Standoff Markup. In P. R. King (Ed.),

Document representations can rapidly become unwieldy if they try to encapsulate all possible document properties, ranging from abstract structure to detailed rendering and layout.
We present a composite document approach wherein an XMLbased document... Read More about Enhancing composite Digital Documents Using XML-based Standoff Markup.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004, September). Immune System Approaches to Intrusion Detection - A Review (ICARIS). Presented at Artificial Immune Systems, Sicily, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Creating Structured PDF Files Using XML Templates (2004)
Presentation / Conference Contribution
Hardy, M., Brailsford, D. F., & Thomas, P. (2004). Creating Structured PDF Files Using XML Templates. In J.-Y. Vion-Dury (Ed.),

This paper describes a tool for recombining the logical structure from an XML document with the typeset appearance of the corresponding PDF document. The tool uses the XML representation as a template for the insertion of the logical structure into t... Read More about Creating Structured PDF Files Using XML Templates.

'Artificial Immune Systems: A new Decision Making Paradigm for Operational Research' (2004)
Presentation / Conference Contribution
Aickelin, U. (2004). 'Artificial Immune Systems: A new Decision Making Paradigm for Operational Research'.

Over the last few years, more and more heuristic decision making techniques have been inspired by nature, e.g. evolutionary algorithms, ant colony optimisation and simulated annealing. More recently, a novel computational intelligence technique inspi... Read More about 'Artificial Immune Systems: A new Decision Making Paradigm for Operational Research'.

'Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments' (2004)
Presentation / Conference Contribution
Aickelin, U., Burke, E., & Mohamed Din, A. (2004). 'Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments'.

ABSTRACT

Artificial immune system can be used to generate schedules in changing environments and it has been proven to be more robust than schedules developed using a genetic algorithm. Good schedules can be produced especially when the number of... Read More about 'Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments'.

'On Affinity Measures for Artificial Immune System Movie Recommenders' (2004)
Presentation / Conference Contribution
Aickelin, U., & Chen, Q. (2004). 'On Affinity Measures for Artificial Immune System Movie Recommenders'.

Abstract. We combine Artificial Immune Systems (AIS) technology with Collaborative Filtering (CF) and use it to build a movie recommendation system. We already know that Artificial Immune Systems work well as movie recommenders from previous work by... Read More about 'On Affinity Measures for Artificial Immune System Movie Recommenders'.

An Indirect Genetic Algorithm for a Nurse Scheduling Problem (2004)
Journal Article
Aickelin, U., & Dowsland, K. (2004). An Indirect Genetic Algorithm for a Nurse Scheduling Problem. Computers and Operations Research, 31(5), https://doi.org/10.1016/S0305-0548%2803%2900034-0

This paper describes a Genetic Algorithms approach to a manpower-scheduling problem arising at a major UK hospital. Although Genetic Algorithms have been successfully used for similar problems in the past, they always had to overcome the limitations... Read More about An Indirect Genetic Algorithm for a Nurse Scheduling Problem.

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

INTRODUCTION

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

'The application of Bayesian Optimization and Classifier Systems in Nurse Scheduling' (2004)
Presentation / Conference Contribution
Li, J., & Aickelin, U. (2004). 'The application of Bayesian Optimization and Classifier Systems in Nurse Scheduling'.

Abstract. Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person's assignment. Unlike our previous work of using genetic algorit... Read More about 'The application of Bayesian Optimization and Classifier Systems in Nurse Scheduling'.

Building Better Nurse Scheduling Algorithms (2004)
Journal Article
Aickelin, U., & White, P. (2004). Building Better Nurse Scheduling Algorithms. Annals of Operations Research, 128, https://doi.org/10.1023/B%3AANOR.0000019103.31340.a6

The aim of this research is twofold: Firstly, to model and solve a complex nurse scheduling problem with an integer programming formulation and evolutionary algorithms. Secondly, to detail a novel statistical method of comparing and hence building be... Read More about Building Better Nurse Scheduling Algorithms.

'Movie Recommendation Systems Using An Artificial Immune System' (2004)
Presentation / Conference Contribution
Chen, Q., & Aickelin, U. (2004). 'Movie Recommendation Systems Using An Artificial Immune System'.

We apply the Artificial Immune System (AIS)technology to the collaborative Filtering (CF)technology when we build the movie recommendation system. Two different affinity measure algorithms of AIS, Kendall tau and Weighted Kappa, are used to calculate... Read More about 'Movie Recommendation Systems Using An Artificial Immune System'.

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004). 'Immune System Approaches to Intrusion Detection - A Review'.

Abstract. The use of artificial immune systems in intrusion detection is
an appealing concept for two reasons. Firstly, the human immune system
provides the human body with a high level of protection from invading
pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

Page Composition using PPML as a Link-editing Script (2004)
Presentation / Conference Contribution
Bagley, S. R., & Brailsford, D. F. (2004). Page Composition using PPML as a Link-editing Script. In J. Vion-Dury (Ed.),

The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this way then the individual graphic objects must have known bounding boxe... Read More about Page Composition using PPML as a Link-editing Script.