Skip to main content

Research Repository

Advanced Search

All Outputs (14)

The danger theory and its application to Artificial Immune Systems (2002)
Conference Proceeding
Aickelin, U., & Cayzer, S. (2002). The danger theory and its application to Artificial Immune Systems. In J. Timmis, & P. J. Bentley (Eds.), ICARIS 2002: 1st International Conference on Artificial Immune Systems, 141-148

Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune Sy... Read More about The danger theory and its application to Artificial Immune Systems.

The Design of a Real Time VLSI Optical Centroid Processor (2002)
Conference Proceeding
Pui, B. H., Hayes-Gill, B., Clark, M., Somekh, M., See, C., Morgan, S., & Ng, A. (2002). The Design of a Real Time VLSI Optical Centroid Processor. In IEEE Sensors 2002 : first IEEE International Conference on Sensors. https://doi.org/10.1109/ICSENS.2002.1036977

A real time VLSI optical centroid processor has been developed as part of a larger Shack-Hartmann wavefront sensor system for applications in adaptive optics. The implementation of the optical centroid detection system was demonstrated successfully u... Read More about The Design of a Real Time VLSI Optical Centroid Processor.

Applications of temporal links: recording and replaying virtual environments (2002)
Conference Proceeding
Greenhalgh, C., Flintham, M., Purbrick, J., Benford, S., & Craven, M. (2002). Applications of temporal links: recording and replaying virtual environments. In Proceedings IEEE Virtual Reality 2002 (101-108). https://doi.org/10.1109/VR.2002.996512

Temporal links allow recordings of multi-user sessions to be dynamically inserted into current virtual worlds in a flexible and principled way. We explore key applications of temporal links, showing how they can add new content to virtual worlds, sup... Read More about Applications of temporal links: recording and replaying virtual environments.

Inductive Theorem Proving and Computer Algebra in the Mathweb Software Bus (2002)
Conference Proceeding
Zimmer, J., & Dennis, L. A. (2002). Inductive Theorem Proving and Computer Algebra in the Mathweb Software Bus. In J. Calmet, B. Belaid, O. Capriotti, L. Hencoque, & V. Sorge (Eds.),

Reasoning systems have reached a high degree of maturity in the last decade. However, even the most successful systems are usually not general purpose problem solvers but are typically specialised on problems in a certain domain. The MathWeb SOftwa... Read More about Inductive Theorem Proving and Computer Algebra in the Mathweb Software Bus.

Hash-Tree Anti-Tampering Schemes (2002)
Conference Proceeding
Moss, B., & Ashman, H. (2002). Hash-Tree Anti-Tampering Schemes.

Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes. The main problems of co... Read More about Hash-Tree Anti-Tampering Schemes.

'An Artificial Immune System as a Recommender System for Web Sites' (2002)
Conference Proceeding
Morrison, T., & Aickelin, U. (2002). 'An Artificial Immune System as a Recommender System for Web Sites'.

Artificial Immune Systems have been used successfully to build recommender systems for film databases. In this research, an attempt is made to extend this idea to web site recommendation. A collection of more than 1000 individuals' web profiles (alte... Read More about 'An Artificial Immune System as a Recommender System for Web Sites'.

Mapping and Displaying Structural Transformations between XML and PDF (2002)
Conference Proceeding
Hardy, M. R. B., & Brailsford, D. F. (2002). Mapping and Displaying Structural Transformations between XML and PDF. In R. Furuta, J. Maletic, & E. Munson (Eds.),

Documents are often marked up in XML-based tagsets to delineate major structural components such as headings, paragraphs, figure captions and so on, without much regard to their eventual displayed appearance. And yet these same abstract documents, af... Read More about Mapping and Displaying Structural Transformations between XML and PDF.

A Comparison of two Proof Critics: Power vs. Robustness (2002)
Conference Proceeding
Dennis, L. A., & Bundy, A. (2002). A Comparison of two Proof Critics: Power vs. Robustness. In V. A. Carreno, C. A. Munoz, & S. Tahar (Eds.),

Proof critics are a technology from the proof planning paradigm. They examine failed proof attempts in order to extract information which can be used to generate a patch which will allow the proof to go through. We consider the proof of the $quot;wh... Read More about A Comparison of two Proof Critics: Power vs. Robustness.

The NumbersWithNames Program (2002)
Conference Proceeding
Colton, S., & Dennis, L. A. (2002). The NumbersWithNames Program.

We present the NumbersWithNames program which performs data-mining on the Encyclopedia of Integer Sequences to find interesting conjectures in number theory. The program forms conjectures by finding empirical relationships between a sequence chosen... Read More about The NumbersWithNames Program.

'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems' (2002)
Conference Proceeding
Cayzer, S., & Aickelin, U. (2002). 'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'.

It has previously been shown that a recommender based on immune system idiotypic principles can outperform one based on correlation alone. This paper reports the results of work in progress, where we undertake some investigations into the nature of t... Read More about 'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'.

Knowledge discovery in hyper-heuristic using case-based reasoning on course timetabling (2002)
Conference Proceeding
Burke, E., MacCarthy, B. L., Petrovic, S., & Qu, R. (2002). Knowledge discovery in hyper-heuristic using case-based reasoning on course timetabling.

This paper presents a new hyper-heuristic method using Case-Based Reasoning (CBR) for solving course timetabling problems. The term Hyper-heuristics has recently been employed to refer to 'heuristics that choose heuristics' rather than heuristics tha... Read More about Knowledge discovery in hyper-heuristic using case-based reasoning on course timetabling.

Non-Symbolic Fragmentation (2002)
Conference Proceeding
Ashman, H., Coupe, H., Smith, P., Neville-Smith, M., & Gilbert, M. (2002). Non-Symbolic Fragmentation.

This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries... Read More about Non-Symbolic Fragmentation.

Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary Algorithm (2002)
Conference Proceeding
Aickelin, U., & Bull, L. (2002). Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary Algorithm.

This paper combines the idea of a hierarchical distributed genetic algorithm with different inter-agent partnering strategies. Cascading clusters of sub-populations are built from bottom up, with higher-level sub-populations optimising larger parts o... Read More about Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary Algorithm.