Skip to main content

Research Repository

Advanced Search

All Outputs (3489)

The multimedia challenges raised by pervasive games (2005)
Presentation / Conference Contribution
Capra, M., Radenkovic, M., Benford, S., Oppermann, L., Drozd, A., & Flintham, M. The multimedia challenges raised by pervasive games. Presented at 13th Annual ACM International Conference on Multimedia (MULTIMEDIA '05)

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other multimedia sensors, combined with wir... Read More about The multimedia challenges raised by pervasive games.

A Decomposition, Construction and Post-Processing Approach for Nurse Rostering (2005)
Presentation / Conference Contribution
Brucker, P., Qu, R., Burke, E., & Post, G. (2005). A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

This paper presents our work on decomposing a specific nurse rostering problem by cyclically assigning blocks of shifts, which are designed considering both hard and soft constraints, to groups of nurses. The rest of the shifts are then assigned to t... Read More about A Decomposition, Construction and Post-Processing Approach for Nurse Rostering.

An Architecture for Proof Planning Systems (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). An Architecture for Proof Planning Systems. In L. P. Kaelbling, & A. Saffoitti (Eds.),

This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

Student attitudes to plagiarism and collusion within computer science (2005)
Presentation / Conference Contribution
Dennis, L. A. (2005). Student attitudes to plagiarism and collusion within computer science. In A. P. Smith, & F. Duggan (Eds.),

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed... Read More about Student attitudes to plagiarism and collusion within computer science.

What can be learned from failed proofs of non-theorems? (2005)
Presentation / Conference Contribution
Dennis, L. A., & Nogueira, P. (2005). What can be learned from failed proofs of non-theorems?. In J. Hurd, E. Smith, & A. Darbari (Eds.),

This paper reports an investigation into the link between failed proofs and non-theorems. It seeks to answer the question of whether anything more can be learned from a failed proof attempt than can be discovered from a counter-example. We suggest... Read More about What can be learned from failed proofs of non-theorems?.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Accurate Step Counting (2005)
Presentation / Conference Contribution
Hope, C., & Hutton, G. (2005). Accurate Step Counting.

Starting with an evaluator for a language, an abstract machine for the same language can be mechanically derived using successive program transformations. This has relevance to studying both the space and time properties of programs because these ca... Read More about Accurate Step Counting.

Calculating an Exceptional Machine (2005)
Presentation / Conference Contribution
Hutton, G., & Wright, J. (2005). Calculating an Exceptional Machine.

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalizatio... Read More about Calculating an Exceptional Machine.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance' (2005)
Presentation / Conference Contribution
Kim, J., Wilson, W., Aickelin, U., & McLeod, J. (2005). 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'.

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present t... Read More about 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'.

Encapsulating and Manipulating Component Object Graphics (COGs) using SVG (2005)
Presentation / Conference Contribution
Macdonald, A. J., Brailsford, D. F., & Bagley, S. R. (2005). Encapsulating and Manipulating Component Object Graphics (COGs) using SVG. In P. R. King (Ed.),

Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised XML documents.There is increasing interest in using SVG as a Page Descri... Read More about Encapsulating and Manipulating Component Object Graphics (COGs) using SVG.

Designing the spectator experience (2005)
Presentation / Conference Contribution
Reeves, S., Benford, S., O'Malley, C., & Fraser, M. (2005). Designing the spectator experience.

Interaction is increasingly a public affair, taking place in our theatres, galleries, museums, exhibitions and on the city streets. This raises a new design challenge for HCI, questioning how a performer s interaction with a computer experienced is b... Read More about Designing the spectator experience.

Strategic Alert Throttling for Intrusion Detection Systems (2005)
Presentation / Conference Contribution
Tedesco, G., & Aickelin, U. (2005). Strategic Alert Throttling for Intrusion Detection Systems.

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are ver... Read More about Strategic Alert Throttling for Intrusion Detection Systems.

Enhancing composite Digital Documents Using XML-based Standoff Markup (2005)
Presentation / Conference Contribution
Thomas, P. L., & Brailsford, D. F. (2005). Enhancing composite Digital Documents Using XML-based Standoff Markup. In P. R. King (Ed.),

Document representations can rapidly become unwieldy if they try to encapsulate all possible document properties, ranging from abstract structure to detailed rendering and layout.
We present a composite document approach wherein an XMLbased document... Read More about Enhancing composite Digital Documents Using XML-based Standoff Markup.

'Towards a Conceptual Framework for Innate Immunity' (2005)
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. (2005). 'Towards a Conceptual Framework for Innate Immunity'.

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopt... Read More about 'Towards a Conceptual Framework for Innate Immunity'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004, September). Immune System Approaches to Intrusion Detection - A Review (ICARIS). Presented at Artificial Immune Systems, Sicily, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Creating Structured PDF Files Using XML Templates (2004)
Presentation / Conference Contribution
Hardy, M., Brailsford, D. F., & Thomas, P. (2004). Creating Structured PDF Files Using XML Templates. In J.-Y. Vion-Dury (Ed.),

This paper describes a tool for recombining the logical structure from an XML document with the typeset appearance of the corresponding PDF document. The tool uses the XML representation as a template for the insertion of the logical structure into t... Read More about Creating Structured PDF Files Using XML Templates.

Extraction of titanium from solid titanium dioxide in molten salts (2004)
Presentation / Conference Contribution
Fray, D. J., & Chen, G. Z. (2004). Extraction of titanium from solid titanium dioxide in molten salts. In Cost-Affordable Titanium (9-17)

The search for a cheaper replacement for the Hunter and Kroll Processes has continued ever since titanium was first produced commercially. In 2000, the authors reported that it was possible to reduce titanium and other metal oxides directly to metals... Read More about Extraction of titanium from solid titanium dioxide in molten salts.

Exploring the provision of social support within a computer-mediated huntington's disease support network (2004)
Presentation / Conference Contribution
Coulson, N., Aubeeluck, A., Buchanan, H., Semper, H., & Rooney, E. (2004). Exploring the provision of social support within a computer-mediated huntington's disease support network. Psychology and Health, 19(Issue sup1),

Objectives: The unique constraints placed upon the Huntington's Disease [HD] carer, and the lack of time and social support identified by this group may make computer-mediated support groups a unique channel of social support for these individuals. T... Read More about Exploring the provision of social support within a computer-mediated huntington's disease support network.