Research explorer tool

17 results

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks

Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...

Representation in the (Artificial) Immune System.

Journal Article
McEwan, C., & Hart, E. (2009)
Representation in the (Artificial) Immune System. Journal of Mathematical Modelling and Algorithms, 8, 125-149. https://doi.org/10.1007/s10852-009-9104-6
Much of contemporary research in Artificial Immune Systems (AIS) has partitioned into either algorithmic machine learning and optimisation, or, modelling biologically plausibl...

Workplace soundscape mapping: a trial of Macaulay and Crerar’s method.

Presentation / Conference
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2006, June)
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method. Paper presented at ICAD 2006: The 12th International Conference on Auditory Display, London, UK
This paper describes a trial of Macaulay and Crerar’s method of mapping a workplace soundscape to assess its fitness as a basis for an extended soundscape mapping method. Twel...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...

Mobile agents and processes using communicating process architectures.

Conference Proceeding
Kerridge, J., Haschke, J., & Chalmers, K. (2007)
Mobile agents and processes using communicating process architectures. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 397-410. doi:10.3233/978-1-58603-907-3-397
The mobile agent concept has been developed over a number of years and is widely accepted as one way of solving problems that require the achievement of a goal that cannot be ...

Dendritic cell trafficking: from Immunology to Engineering.

Conference Proceeding
Hart, E., & Davoudani, D. (2009)
Dendritic cell trafficking: from Immunology to Engineering. In Artificial Immune Systems,, 11-13. https://doi.org/10.1007/978-3-642-03246-2_4
The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that oper...

Computing the State of Specknets: an immune-inspired approach.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2009)
Computing the State of Specknets: an immune-inspired approach. In Performance Evaluation of Computer and Telecommunication Systems, 2008. SPECTS 2008. International Symposium on, 52-59
Speckled Computing is an emerging technology based on the deployment of thousands of minute semiconductor grains in dense, wireless networks known as Specknets. Specknets coll...

Structure versus function: a topological perspective on immune networks.

Journal Article
Hart, E., Bersini, H., & Santos, F. (2009)
Structure versus function: a topological perspective on immune networks. Natural Computing, https://doi.org/10.1007/s11047-009-9138-8
Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex...

Computing the State of Specknets: further analysis of an innate immune-inspired model.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2008)
Computing the State of Specknets: further analysis of an innate immune-inspired model. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial Immune Systems, 7th International Conference, ICARIS 2008, Phuket, Thailand, August 2008, Proceedings, 95-106. https://doi.org/10.1007/978-3-540-85072-4
Specknets consist of hundreds of miniature devices, which are each capable of processing data and communicating wirelessly across short distances. Such networks, with their gr...

Integrating and extending JCSP.

Conference Proceeding
Welch, P., Brown, N., Moores, J., Chalmers, K., & Sputh, B. (2007)
Integrating and extending JCSP. In A. McEwan, S. Schneider, W. Ifill, & P. Welch (Eds.), Communicating Process Architectures 2007, 349-370
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone's JCSP Network Edition and th...