Progressive skinning for video game character animations.
(2006)
Presentation / Conference Contribution
Pilgrim, S. J., Aguado, A., Mitchell, K., & Steed, A. (2006, December). Progressive skinning for video game character animations. Presented at ACM SIGGRAPH 2006 Sketches on - SIGGRAPH '06
Mobile Multicast Route Optimisation (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006, June). Mobile Multicast Route Optimisation. Presented at 2006 IEEE International Conference on CommunicationsThe multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional delay in receiving multicast packets due to handover delay, join latency, a... Read More about Mobile Multicast Route Optimisation.
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.
PN code acquisition with a CA-CFAR adaptive digital matched filter and its realisation using FPGA. (2006)
Presentation / Conference Contribution
Wie, B., Sharif, M., Almaini, A. E. A., & Binnie, D. (2006, September). PN code acquisition with a CA-CFAR adaptive digital matched filter and its realisation using FPGA. Presented at Proceedings of IEEE 13th International Conference on Systems, Signals & Image Processing, IWSSIP’06,In this paper the performance of a Cell Averaging Constant False Alarm Rate (CA-CFAR) Pseudo-Noise (PN) code adaptive detector is analysed for a single path communication channel. The detection process uses a digital Matched Filter (MF) and is implem... Read More about PN code acquisition with a CA-CFAR adaptive digital matched filter and its realisation using FPGA..
Metaheuristics for university course timetabling. (2006)
Thesis
Lewis, R. M. R. Metaheuristics for university course timetabling. (Thesis). Napier University. http://researchrepository.napier.ac.uk/id/eprint/2392The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways in which metaheuristic techniques might be applied to these sorts of problems. Using a popular benc... Read More about Metaheuristics for university course timetabling..
Combining dimensional analysis and heuristics for causal ordering. (2006)
Book Chapter
Shen, Q., & Peng, T. (2006). Combining dimensional analysis and heuristics for causal ordering. In A. Bundy, & S. Wilson (Eds.), Rob Milne: A Tribute to a Pioneering AI Scientist, Entrepreneur and Mountaineer (39-53). IOS PressThis paper is a refined version of the work that the authors presented at the 13th International Workshop on Qualitative Reasoning, jointly with the late Dr Rob Milne. It is dedicated to Rob in recognition of his significant contribution and support... Read More about Combining dimensional analysis and heuristics for causal ordering..
A comparison of data mining methods and logistic regression to determine factors associated with death following injury. (2006)
Book Chapter
Penny, K. I., & Chesney, T. (2006). A comparison of data mining methods and logistic regression to determine factors associated with death following injury. In Data analysis, classification and the forward search: proceedings of the meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, Univeristy of Parma June 6-8 2005 (417-423). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-35978-8_46A comparison of techniques for analysing trauma injury data collected over ten years at a hospital trauma unit in the U.K. is reported. The analysis includes a comparison of four data mining techniques to determine factors associated with death follo... Read More about A comparison of data mining methods and logistic regression to determine factors associated with death following injury..
Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, July). Investigating false positive reduction in HTTP via procedure analysis. Presented at IEEE International Conference on Networking and Services (ICNS 2006)This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..
Real-time construction of aircraft landing schedules using an evolutionary algorithm (2006)
Presentation / Conference Contribution
Urquhart, N. (2006, July). Real-time construction of aircraft landing schedules using an evolutionary algorithm. Presented at Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06, Seattle, Washington, USAThis poster investigates the use of Evolutionary Algorithms (EAs) to optimise solutions to the Dynamic Aircraft Landing Problem (DALP). The approach adopted here uses an EA to evolve improvements to the solution so as to move towards an optimum solut... Read More about Real-time construction of aircraft landing schedules using an evolutionary algorithm.
Standard Data Model Representation for Taxonomic Information (2006)
Journal Article
Kennedy, J., Hyam, R., Kukla, R., & Paterson, T. (2006). Standard Data Model Representation for Taxonomic Information. OMICS, 10(2), 220-230. https://doi.org/10.1089/omi.2006.10.220The names used by biologists to label the observations they make are imprecise. This is an issue as workers increasingly seek to exploit data gathered from multiple, unrelated sources on line. Even when the international codes of nomenclature are fol... Read More about Standard Data Model Representation for Taxonomic Information.
Sound and soundscape classification: Establishing key auditory dimensions and their relative importance (2006)
Presentation / Conference Contribution
McGregor, I., LePlâtre, G., Crerar, A., & Benyon, D. (2006, June). Sound and soundscape classification: Establishing key auditory dimensions and their relative importance. Presented at The 12th International Conference on Auditory Display, ICAD2006This paper investigates soundscape classification by using two different forms of data gathering and two different populations. The first method involves a questionnaire completed by 75 audio professionals. The second uses a speak-aloud experiment, d... Read More about Sound and soundscape classification: Establishing key auditory dimensions and their relative importance.
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006, June). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. Presented at 5th European Conference on Information Warfare and Security (ECIW)Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..
Achieving smooth component integration with generative aspects and component adaptation. (2006)
Presentation / Conference Contribution
Feng, Y., Liu, X., & Kerridge, J. (2006, June). Achieving smooth component integration with generative aspects and component adaptation. Presented at 9th International Conference on Software Reuse, ICSR 2006, Torino, ItalyDue to the availability of components and the diversity of target applications, mismatches between pre-qualified existing components and the particular reuse context in applications are often inevitable and have been a major hurdle of component reusa... Read More about Achieving smooth component integration with generative aspects and component adaptation..
Data mining medical information: should artificial neural networks be used to analyse trauma audit data? (2006)
Journal Article
Chesney, T., Penny, K. I., Oakley, P., Davies, S., Chesney, D., Maffulli, N., & Templeton, J. (2006). Data mining medical information: should artificial neural networks be used to analyse trauma audit data?. International Journal of Healthcare Information Systems and Informatics, 1, 51-64. https://doi.org/10.4018/jhisi.2006040104Trauma audit is intended to develop effective care for injured patients through process and outcome analysis, and dissemination of results. The system records injury details such as the patient’s sex and age, the mechanism of the injury, various meas... Read More about Data mining medical information: should artificial neural networks be used to analyse trauma audit data?.
DS-CDMA PN code acquisition in Rayleigh Fading Channel. (2006)
Journal Article
Sharif, M., Obiebi, J., & Sharp, J. (2006). DS-CDMA PN code acquisition in Rayleigh Fading Channel. The Mediterranean journal of electronics and communications, 2, 59-71In this paper, an adaptive double dwell PN code acquisition circuit suitable for use in DS-CDMA systems is proposed. The adaptive nature of the circuit is based on the cell averaging constant false alarm rate technique. It is analysed in a Rayleigh f... Read More about DS-CDMA PN code acquisition in Rayleigh Fading Channel..
FCA interpretation of relation algebra. (2006)
Presentation / Conference Contribution
Priss, U. (2006, February). FCA interpretation of relation algebra. Presented at 4th International Conference on Formal Concept AnalysisThis paper discusses an interpretation of relation algebra and fork algebra with respect to FCA contexts. In this case, "relation algebra" refers to the DeMorgan-Peirce-Schroeder-Tarski algebra and not to the "relational algebra" as described by Codd... Read More about FCA interpretation of relation algebra..
NetHost-sensor: Monitoring a target host's application via system calls (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may em... Read More about NetHost-sensor: Monitoring a target host's application via system calls.