Skip to main content

Research Repository

Advanced Search

All Outputs (146)

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Calculating an Exceptional Machine (2005)
Presentation / Conference Contribution
Hutton, G., & Wright, J. (2005). Calculating an Exceptional Machine.

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalizatio... Read More about Calculating an Exceptional Machine.

Framing post-conflict societies: an analysis of the international pathologisation of Cambodia and the post-Yugoslav states (2005)
Journal Article
Hughes, C., & Pupavac, V. (2005). Framing post-conflict societies: an analysis of the international pathologisation of Cambodia and the post-Yugoslav states. Third World Quarterly, 26(6), https://doi.org/10.1080/01436590500089232

The article examines the pathologisation of post-conflict societies through a comparison of the framing of the Cambodian and post-Yugoslav states. The notion of failed states fixes culpability for war on societies in question, rendering the domestic... Read More about Framing post-conflict societies: an analysis of the international pathologisation of Cambodia and the post-Yugoslav states.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. (2005). Accurate Step Counting.

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.

Structural characterisation of MBE grown zinc-blende Ga1-xMnxN/GaAs(001) as a function of Ga flux (2005)
Book Chapter
Han, Y., Fay, M. W., Brown, P. D., Novikov, S. V., Edmonds, K., Gallagher, B., …Foxon, C. (2005). Structural characterisation of MBE grown zinc-blende Ga1-xMnxN/GaAs(001) as a function of Ga flux. In A. Cullis, & J. Hutchison (Eds.), Microscopy of semiconducting materials: proceedings of the 14th conference: April 11-14, 2005, Oxford, UK. Springer-Verlag

Ga1-xMnxN films grown on semi-insulating GaAs(001) substrates at 680°C with fixed Mn flux and varied Ga flux demonstrated a transition from zinc-blende/wurtzite mixed phase growth for low Ga flux (N-rich conditions) to zinc-blende single phase growth... Read More about Structural characterisation of MBE grown zinc-blende Ga1-xMnxN/GaAs(001) as a function of Ga flux.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Structural characterisation of spintronic GaMnAs and GaMnN heterostructures grown by molecular beam epitaxy (2005)
Book Chapter
Fay, M. W., Han, Y., Novikov, S. V., Edmonds, K., Wang, K., Gallagher, B., …Brown, P. D. (2005). Structural characterisation of spintronic GaMnAs and GaMnN heterostructures grown by molecular beam epitaxy. In A. Cullis, & A. Hutchison (Eds.), Microscopy of semiconducting materials: proceedings of the 14th conference: April 11-14, 2005, Oxford, UK. Springer-Verlag

Observations of orthogonal orientations demonstrate the development of banded contrast features on inclined {-1-1-1}B planes for the [110] projection within micron thick samples, attributed to a compositional fluctuation in the Mn content. The relat... Read More about Structural characterisation of spintronic GaMnAs and GaMnN heterostructures grown by molecular beam epitaxy.

Databases sui generis right: what is a substantial investment? A tentative definition (2005)
Journal Article
Derclaye, E. (2005). Databases sui generis right: what is a substantial investment? A tentative definition. International Review of Intellectual Property and Competition Law, 36(1),

This article reviews the national case law and summarises the views of commentators relating to the concept of substantial investment. This the requirement for a database to be protected by the European sui generis right. The discussion shows that th... Read More about Databases sui generis right: what is a substantial investment? A tentative definition.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. (2005). What can be learned from failed proofs of non-theorems?. In J. Hurd, E. Smith, & A. Darbari (Eds.),

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). Student attitudes to plagiarism and collusion within computer science. In A. P. Smith, & F. Duggan (Eds.),

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). An Architecture for Proof Planning Systems. In L. P. Kaelbling, & A. Saffoitti (Eds.),

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

A Recommender System based on Idiotypic Artificial Immune Networks (2005)
Journal Article
Cayzer, S., & Aickelin, U. (2005). A Recommender System based on Idiotypic Artificial Immune Networks. https://doi.org/10.1007/s10852-004-5336-7

The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an Artificial Immune System (AIS) that exploits some of these characteristics and is applied to the task of film reco... Read More about A Recommender System based on Idiotypic Artificial Immune Networks.

Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems (2005)
Book Chapter
Burke, E., Dror, M., Petrovic, S., & Qu, R. (2005). Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems. In B. Golden, S. Raghavan, & E. Wasil (Eds.), The Next Wave in Computing, Optimization, and Decision Technologies. Springer

This paper is concerned with the hybridization of two graph coloring heuristics (Saturation Degree and Largest Degree), and their application within a hyperheuristic for exam timetabling problems. Hyper-heuristics can be seen as algorithms which inte... Read More about Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems.

A Decomposition, Construction and Post-Processing Approach for Nurse Rostering (2005)
Presentation / Conference Contribution
Brucker, P., Qu, R., Burke, E., & Post, G. (2005). A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

This paper presents our work on decomposing a specific nurse rostering problem by cyclically assigning blocks of shifts, which are designed considering both hard and soft constraints, to groups of nurses. The rest of the shifts are then assigned to t... Read More about A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

Managing product variety in quotation processes (2005)
Journal Article
Bramham, J., MacCarthy, B. L., & Guinery, J. (2005). Managing product variety in quotation processes. Journal of Manufacturing Technology Management, 16(4), https://doi.org/10.1108/17410380510594507

Purpose – Manufacturers across many sectors increasingly operate in high variety environments. Research evidence suggests that variety has a negative impact on performance. However, the research literature is limited on the enablers that allow variet... Read More about Managing product variety in quotation processes.