Belief and bounded rationality
Journal Article
Jago, M. (2006). Belief and bounded rationality
All Outputs (1967)
Imagine the possibilities: information without overload
Journal Article
Jago, M. (2006). Imagine the possibilities: information without overloadInformation is often modelled as a set of relevant possibilities, treated as logically possible worlds. However, this has the unintuitive consequence that the logical consequences of an agent's information cannot be informative for that agent. There... Read More about Imagine the possibilities: information without overload.
Simulation Optimization of the Crossdock Door Assignmnet Problem
Conference Proceeding
Aickelin, U., & Adewunmi, A. (2006). Simulation Optimization of the Crossdock Door Assignmnet Problem.The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel distance by material handling equipment is minimized. We propose a two... Read More about Simulation Optimization of the Crossdock Door Assignmnet Problem.
Improved Squeaky Wheel Optimisation for Driver Scheduling
Conference Proceeding
Aickelin, U., Burke, E., & Li, J. Improved Squeaky Wheel Optimisation for Driver Scheduling.This paper presents a technique called Improved Squeaky Wheel Optimisation (ISWO) for driver scheduling problems. It improves the original Squeaky Wheel Optimisation’s (SWO) effectiveness and execution speed by incorporating two additional steps of S... Read More about Improved Squeaky Wheel Optimisation for Driver Scheduling.
Detecting Botnets Through Log Correlation
Conference Proceeding
Al-Hammadi, Y., & Aickelin, U. Detecting Botnets Through Log Correlation.Botnets, which consist of thousands of compromised machines, can cause a significant threat to other systems by launching Distributed Denial of Service attacks, keylogging, and backdoors. In response to this threat, new effective techniques are neede... Read More about Detecting Botnets Through Log Correlation.
BioHEL: Bioinformatics-oriented Hierarchical Evolutionary Learning
Book
Bacardit, J., & Krasnogor, N. (2006). BioHEL: Bioinformatics-oriented Hierarchical Evolutionary Learning. Computer Science & ITThis technical report briefly describes our recent work in the iterative rule learning approach (IRL) of evolutionary learning/genetics-based machine learning. This approach was initiated by the SIA system. A more recent example is HIDER. Our approac... Read More about BioHEL: Bioinformatics-oriented Hierarchical Evolutionary Learning.
Dempster-Shafer for Anomaly Detection
Conference Proceeding
Chen, Q., & Aickelin, U. Dempster-Shafer for Anomaly Detection.In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is possible to achieve better results than by using a single signal. We furt... Read More about Dempster-Shafer for Anomaly Detection.
Modelling Immunological Memory
Book Chapter
Garrett, S., Robbins, M., Walker, J., Wilson, W., & Aickelin, U. Modelling Immunological Memory. In D. Flower, & J. Timmis (Eds.), Silico Immunology. SpringerAccurate immunological models offer the possibility of performing highthroughput experiments in silico that can predict, or at least suggest, in vivo phenomena. In this chapter, we compare various models of immunological memory. We first validate an... Read More about Modelling Immunological Memory.
Dendritic Cells for Real-Time Anomaly Detection
Conference Proceeding
Greensmith, J., & Aickelin, U. Dendritic Cells for Real-Time Anomaly Detection.Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time... Read More about Dendritic Cells for Real-Time Anomaly Detection.
Articulation and Clarification of the Dendric Cell Algorithm
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.
Dendritic Cells for Anomaly Detection
Conference Proceeding
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection.Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.
Rule-based and Resource-bounded: A New Look at Epistemic Logic
Conference Proceeding
Jago, M. (2006). Rule-based and Resource-bounded: A New Look at Epistemic Logic.Syntactic logics do not suffer from the problems of logical omniscience but are often thought to lack interesting properties relating to epistemic notions. By focusing on the case of rule-based agents, I develop a framework for modelling resource-bou... Read More about Rule-based and Resource-bounded: A New Look at Epistemic Logic.
Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling
Book Chapter
Li, J., & Aickelin, U. Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling. In M. Pelikan, K. Sastry, & E. Cantu-Paz (Eds.), Algorithms to Applications (Studies in Computational Intelligence). SpringerOur research has shown that schedules can be built mimicking a human scheduler by using a set of rules that involve domain knowledge. This chapter presents a Bayesian Optimization Algorithm (BOA) for the nurse scheduling problem that chooses such su... Read More about Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling.
A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel Scheduling
Journal Article
Li, J., Aickelin, U., & Burke, E. A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel SchedulingNurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with adaptive perturbations, for a nurse scheduling problem arising at a major UK... Read More about A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel Scheduling.
An Immune Network Intrusion Detection System Utilising Correlation Context
Conference Proceeding
Tedesco, G., & Aickelin, U. An Immune Network Intrusion Detection System Utilising Correlation Context.Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on... Read More about An Immune Network Intrusion Detection System Utilising Correlation Context.
Integrating Innate and Adaptive Immunity for Intrusion Detection
Conference Proceeding
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.
Experimenting with Innate Immunity
Conference Proceeding
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity.libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.
Libtissue - Implementing Innate Immunity
Conference Proceeding
Twycross, J., & Aickelin, U. Libtissue - Implementing Innate Immunity.In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial immune systems (AISs) and presented an outline for a conceptualframework for such systems. A number of key general properties observed in th... Read More about Libtissue - Implementing Innate Immunity.
Oil Price Trackers Inspired by Immune Memory
Conference Proceeding
Wilson, W., Birkin, P., & Aickelin, U. Oil Price Trackers Inspired by Immune Memory.We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future... Read More about Oil Price Trackers Inspired by Immune Memory.
Price Trackers Inspired by Immune Memory
Conference Proceeding
Wilson, W., Birkin, P., & Aickelin, U. Price Trackers Inspired by Immune Memory.In this paper we outline initial concepts for an immune inspired algorithm to evaluate price time series data. The proposed solution evolves a short term pool of trackers dynamically through a process of proliferation and mutation, with each member a... Read More about Price Trackers Inspired by Immune Memory.