Skip to main content

Research Repository

Advanced Search

Symbiotic cognitive networks: a proposal. (2010)
Presentation / Conference Contribution
Rasheed, T., Hart, E., Falconer, R., & Bown, J. (2010, July). Symbiotic cognitive networks: a proposal. Presented at 9th International Conference Artificial Immune Systems ICARIS 2010

We describe the concept of a cognitive network and propose that ecosystems of co-existing networks which are globally energy efficient while providing the expected quality of service can be realised by exploiting two mechanisms which occur in biologi... Read More about Symbiotic cognitive networks: a proposal..

Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings (2010)
Presentation / Conference Contribution
(2010, July). Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings. Presented at 9th International Conference, ICARIS 2010, Edinburgh, UK

Artificial immune systems (AIS) is a diverse and maturing area of research that bridges the disciplines of immunology and computation. The original research impetus in AIS had a clear focus on applying immunological principles to computational proble... Read More about Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings.

Recognize contextual situation in pervasive environments using process mining techniques (2010)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011). Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7

Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of features describing different aspects of the environment has to be captured and... Read More about Recognize contextual situation in pervasive environments using process mining techniques.

On artificial immune systems and swarm intelligence (2010)
Journal Article
Timmis, J., Andrews, P., & Hart, E. (2010). On artificial immune systems and swarm intelligence. Swarm Intelligence, 4(4), 247-273. https://doi.org/10.1007/s11721-010-0045-5

This position paper explores the nature and role of two bio-inspired paradigms, namely Artificial Immune Systems (AIS) and Swarm Intelligence (SI). We argue that there are many aspects of AIS that have direct parallels with SI and examine the role of... Read More about On artificial immune systems and swarm intelligence.

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory (2010)
Journal Article
Hall, H., Widen, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011

This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between actors may predict their information sharing behaviour when they move into... Read More about Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory.

Using real-world geospatial data with evolutionary algorithms. (2010)
Presentation / Conference Contribution
Urquhart, N. B. (2010, January). Using real-world geospatial data with evolutionary algorithms. Paper presented at Universities' Transport Study Group

Developments in the field of Geographical Information Systems (GIS) have increased the availability of on-line road network data and associated routing services. The ability to integrate such data and services into web sites and other business system... Read More about Using real-world geospatial data with evolutionary algorithms..

The end of cognition? (2009)
Journal Article
Turner, P. (2009). The end of cognition?. Human Technology: An Interdisciplinary Journal on Humans in ICT Environments, 5, 5-11

An investigation into distributed channel mobility support for Communicating Process Architectures. (2009)
Presentation / Conference Contribution
Chalmers, K., & Kerridge, J. (2009, November). An investigation into distributed channel mobility support for Communicating Process Architectures. Presented at 32nd Communicating Process Architecture conference (CPA)

Localised mobile channel support is now a feature of Communicating Process Architecture (CPA) based frameworks, from JCSP and C++CSP to occam-pi. Distributed mobile channel support has also been attempted in JCSP Networking and occam-pi via the pony... Read More about An investigation into distributed channel mobility support for Communicating Process Architectures..

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009, July). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. Presented at 2009 33rd Annual IEEE International Computer Software and Applications Conference

The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.

The semantic structure of Roget’s Thesaurus cross-references. (2009)
Presentation / Conference Contribution
Old, L. J. (2009, July). The semantic structure of Roget’s Thesaurus cross-references. Presented at 17th International Conference on Conceptual Structures (ICCS'09) - SENSE'09

This study analyzed a database version of Roget’s Thesaurus (Roget’s International Thesaurus, 3rd Edition, 1962) for connectivity patterns among cross-references in order to identify the implicit conceptual structure. Semantic patterns implicit in th... Read More about The semantic structure of Roget’s Thesaurus cross-references..

Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems (2009)
Presentation / Conference Contribution
Riley, C., Johnson, G., McCracken, H., & Al-Saffar, A. (2009, August). Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems. Presented at 12th IFIP TC 13 International Conference, Uppsala, Sweden

Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diver... Read More about Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems.

Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems (2009)
Book Chapter
Hart, E., McEwan, C., & Davoudani, D. (2009). Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems. In C. Mumford, & L. Jain (Eds.), Intelligent Systems Reference Library; Computational Intelligence (527-558). Springer-Verlag. https://doi.org/10.1007/978-3-642-01799-5_16

Despite a steady increase in the application of algorithms inspired by the natural immune system to a variety of domains over the previous decade, we argue that the field of Artificial Immune Systems has yet to achieve its full potential. We suggest... Read More about Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems.

Revisiting the potentialities of a mechanical thesaurus. (2009)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2009, May). Revisiting the potentialities of a mechanical thesaurus

This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto modern, Formal Concept Analysis (FCA) terminology and three of her thesaurus algo... Read More about Revisiting the potentialities of a mechanical thesaurus..

On AIRS and clonal selection for machine learning (2009)
Presentation / Conference Contribution
McEwan, C., & Hart, E. (2009, August). On AIRS and clonal selection for machine learning. Presented at ICARIS 2009: Artificial Immune Systems, York

Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex network theory, particularly in the area of small-world and scale-free top... Read More about On AIRS and clonal selection for machine learning.

Strengthening the Forward Variable Selection Stopping Criterion (2009)
Presentation / Conference Contribution
Herrera, L. J., Rubio, G., Pomares, H., Paechter, B., Guillén, A., & Rojas, I. Strengthening the Forward Variable Selection Stopping Criterion

Given any modeling problem, variable selection is a preprocess step that selects the most relevant variables with respect to the output variable. Forward selection is the most straightforward strategy for variable selection; its application using the... Read More about Strengthening the Forward Variable Selection Stopping Criterion.

Dendritic cell trafficking: from Immunology to Engineering. (2009)
Presentation / Conference Contribution
Hart, E., & Davoudani, D. (2009, August). Dendritic cell trafficking: from Immunology to Engineering. Presented at 8th International Conference, ICARIS 2009, York, UK

The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that operate in environments with constraints similar to those faced by the immune s... Read More about Dendritic cell trafficking: from Immunology to Engineering..

Integrated many-to-many multicast addressing and access control method (2009)
Presentation / Conference Contribution
Romdhani, I., & Yassin Al-Dubai, A. (2009, July). Integrated many-to-many multicast addressing and access control method. Presented at 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

Culture & biometrics: regional differences in the perception of biometric authentication technologies (2009)
Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009). Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24(3), 295-306. https://doi.org/10.1007/s00146-009-0218-1

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in o... Read More about Culture & biometrics: regional differences in the perception of biometric authentication technologies.

Representation in the (Artificial) Immune System (2009)
Journal Article
McEwan, C., & Hart, E. (2009). Representation in the (Artificial) Immune System. Journal of Mathematical Modelling and Algorithms, 8(2), 125-149. https://doi.org/10.1007/s10852-009-9104-6

Much of contemporary research in Artificial Immune Systems (AIS) has partitioned into either algorithmic machine learning and optimisation, or, modelling biologically plausible dynamical systems, with little overlap between. We propose that this dich... Read More about Representation in the (Artificial) Immune System.