From Lions to Poodles to Armenian Rabbits: embodied conversational agents in the COMPANIONS project.
(2009)
Presentation / Conference Contribution
Mival, O. (2009). From Lions to Poodles to Armenian Rabbits: embodied conversational agents in the COMPANIONS project. In Proceedings of The Reign of Catz and Dogz Symposium, CHI 2009, Boston, April 2009
All Outputs (123)
Play up, play up and play the game. (2009)
Journal Article
McEwan, T. (2009). Play up, play up and play the game. Interfaces / the British HCI Group newsletter, 7The rules of the game are changing – we now have rules! In many walks of life, competency frameworks are emerging to define and compare roles (meeting legal requirements such as gender pay equality), and individuals are to be benchmarked against role... Read More about Play up, play up and play the game..
On AIRS and clonal selection for machine learning (2009)
Presentation / Conference Contribution
McEwan, C., & Hart, E. (2009). On AIRS and clonal selection for machine learning. In Artificial Immune Systems (67-79). https://doi.org/10.1007/978-3-642-03246-2_11Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex network theory, particularly in the area of small-world and scale-free top... Read More about On AIRS and clonal selection for machine learning.
An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. (2009). An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3971Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.
Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..
JCSP agents-based service discovery for pervasive computing. (2009)
Presentation / Conference Contribution
Kosek, A., Kerridge, J., Syed, A., & Armitage, A. (2009, November). JCSP agents-based service discovery for pervasive computing. Presented at Communicating Process Architectures 2009 - WoTUG-32Device and service discovery is a very important topic when considering pervasive environments. The discovery mechanism is required to work in networks with dynamic topology and on limited software, and be able to accept different device descriptions... Read More about JCSP agents-based service discovery for pervasive computing..
Form (2009)
Book Chapter
Kennedy, J., & Cannon, A. (2009). Form. In L. Liu, & M. T. Özsu (Eds.), Encyclopedia of Database Systems. Springer-Verlag
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. In Proceedings - International Computer Software and Applications Conference (249-254). https://doi.org/10.1109/compsac.2009.142The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.
The secret life of the immune system: inspiring pervasive systems (2009)
Newspaper / Magazine
Hart, E. (2009). The secret life of the immune system: inspiring pervasive systemsThe immune system performs more than simply defence and exploiting its additional functionality can lead to the design of better pervasive adaptive systems.
Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6699Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.
Self-efficacy as a factor in the evaluation of e-petitions. (2009)
Presentation / Conference Contribution
Cruickshank, P., & Smith, C. F. (2009, September). Self-efficacy as a factor in the evaluation of e-petitionsE-petitions are seen as one response to a perceived decline in public trust of political institutions and the associated symptoms of disengagement. In this paper, some current research into epetitioning in Europe is reviewed, and the need to understa... Read More about Self-efficacy as a factor in the evaluation of e-petitions..
Analysis and evaluation of network intrusion detection methods to uncover data theft (2009)
Thesis
Corsini, J. Analysis and evaluation of network intrusion detection methods to uncover data theft. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4031Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is partly due to the fact that signature detection is a well-known technology, as opposed to anomaly detection which is one of the hot topics in network... Read More about Analysis and evaluation of network intrusion detection methods to uncover data theft.
Application of CoSMoS parallel design patterns to a pedestrian simulation. (2009)
Presentation / Conference Contribution
Clayton, S., Urquhart, N. B., & Kerridge, J. (2009, September). Application of CoSMoS parallel design patterns to a pedestrian simulation. Presented at International Conference on Parallel Processing and Applied Mathematics PPAM 2009: Parallel Processing and Applied MathematicsIn this paper, we discuss the implementation of a simple pedestrian simulation that uses a multi agent based design pattern developed by the CoSMoS research group. Given the nature of Multi Agent Systems (MAS), parallel processing techniques are inev... Read More about Application of CoSMoS parallel design patterns to a pedestrian simulation..
An application of CoSMoS design methods to pedestrian simulation. (2009)
Presentation / Conference Contribution
Clayton, S., Urquhart, N., & Kerridge, J. (2009, November). An application of CoSMoS design methods to pedestrian simulation. Presented at 32nd Communicating Process Architectures Conference, CPA 2009, Eindhoven, The NetherlandsIn this paper, we discuss the implementation of a simple pedestrian simulation that uses a multi agent based design pattern developed by the CoSMoS research group. Given the nature of Multi Agent Systems (MAS), parallel processing techniques are inev... Read More about An application of CoSMoS design methods to pedestrian simulation..
An investigation into distributed channel mobility support for Communicating Process Architectures. (2009)
Presentation / Conference Contribution
Chalmers, K., & Kerridge, J. (2009, November). An investigation into distributed channel mobility support for Communicating Process Architectures. Presented at 32nd Communicating Process Architecture conference (CPA)Localised mobile channel support is now a feature of Communicating Process Architecture (CPA) based frameworks, from JCSP and C++CSP to occam-pi. Distributed mobile channel support has also been attempted in JCSP Networking and occam-pi via the pony... Read More about An investigation into distributed channel mobility support for Communicating Process Architectures..
Investigating communicating sequential processes for Java to support ubiquitous computing (2009)
Thesis
Chalmers, K. (2009). Investigating communicating sequential processes for Java to support ubiquitous computing. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3507Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via computational elements. These elements are designed to augment and support our lives, thus allowing us to perform our tasks and goals. The main... Read More about Investigating communicating sequential processes for Java to support ubiquitous computing.
Presence for everyone - a short guide to presence research. (2009)
Book
Smyth, M. (2009). D. Benyon, M. Smyth, & I. Helgason (Eds.). Presence for everyone - a short guide to presence research. Centre for Interaction DesignEvery day in countless interactions you and I use media to immerse ourselves in virtual environments of information, gaming, video, and social networking. For these moments we are not fully present in our rooms, offices, and streets. Connected by int... Read More about Presence for everyone - a short guide to presence research..
Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems (2009)
Book Chapter
Hart, E., McEwan, C., & Davoudani, D. (2009). Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems. In C. Mumford, & L. Jain (Eds.), Intelligent Systems Reference Library; Computational Intelligence (527-558). Springer-Verlag. https://doi.org/10.1007/978-3-642-01799-5_16Despite a steady increase in the application of algorithms inspired by the natural immune system to a variety of domains over the previous decade, we argue that the field of Artificial Immune Systems has yet to achieve its full potential. We suggest... Read More about Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems.
Open source software adoption in non-profit organisations – socio-technical perspectives (2009)
Thesis
Zhang, G. Open source software adoption in non-profit organisations – socio-technical perspectives. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3811Open source software has grown from a small sub-community of developers and users with their own ideologies to a significant element in the IT strategies of major vendors.
Open source communities and practices have been researched extensively and th... Read More about Open source software adoption in non-profit organisations – socio-technical perspectives.
An application of formal concept analysis to semantic neural decoding. (2009)
Journal Article
Endres, D., Foldiak, P., & Priss, U. (2009). An application of formal concept analysis to semantic neural decoding. Annals of Mathematics and Artificial Intelligence, 57, 233-248. https://doi.org/10.1007/s10472-010-9196-8This paper proposes a novel application of Formal Concept Analysis (FCA) to neural decoding: the semantic relationships between the neural representations of large sets of stimuli are explored using concept lattices. In particular, the effects of neu... Read More about An application of formal concept analysis to semantic neural decoding..