From Lions to Poodles to Armenian Rabbits: embodied conversational agents in the COMPANIONS project.
(2009)
Presentation / Conference Contribution
Mival, O. (2009, April). From Lions to Poodles to Armenian Rabbits: embodied conversational agents in the COMPANIONS project. Presented at The Reign of Catz and Dogz Symposium, CHI 2009
Outputs (119)
Play up, play up and play the game. (2009)
Journal Article
McEwan, T. (2009). Play up, play up and play the game. Interfaces / the British HCI Group newsletter, 7The rules of the game are changing – we now have rules! In many walks of life, competency frameworks are emerging to define and compare roles (meeting legal requirements such as gender pay equality), and individuals are to be benchmarked against role... Read More about Play up, play up and play the game..
On AIRS and clonal selection for machine learning (2009)
Presentation / Conference Contribution
McEwan, C., & Hart, E. (2009, August). On AIRS and clonal selection for machine learning. Presented at ICARIS 2009: Artificial Immune Systems, YorkMany recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex network theory, particularly in the area of small-world and scale-free top... Read More about On AIRS and clonal selection for machine learning.
An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3971Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.
Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009, July). Application and analysis of private matching schemes based on commutative cryptosystems. Presented at 9th European Conference on Information Warfare and SecurityPrivacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..
JCSP agents-based service discovery for pervasive computing. (2009)
Presentation / Conference Contribution
Kosek, A., Kerridge, J., Syed, A., & Armitage, A. (2009, November). JCSP agents-based service discovery for pervasive computing. Presented at Communicating Process Architectures 2009 - WoTUG-32Device and service discovery is a very important topic when considering pervasive environments. The discovery mechanism is required to work in networks with dynamic topology and on limited software, and be able to accept different device descriptions... Read More about JCSP agents-based service discovery for pervasive computing..
Form (2009)
Book Chapter
Kennedy, J., & Cannon, A. (2009). Form. In L. Liu, & M. T. Özsu (Eds.), Encyclopedia of Database Systems. Springer-Verlag
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009, July). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. Presented at 2009 33rd Annual IEEE International Computer Software and Applications ConferenceThe evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.
The secret life of the immune system: inspiring pervasive systems (2009)
Newspaper / Magazine
Hart, E. (2009). The secret life of the immune system: inspiring pervasive systemsThe immune system performs more than simply defence and exploiting its additional functionality can lead to the design of better pervasive adaptive systems.
Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6699Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.