Research explorer tool

17 results

Dendritic cell trafficking: from Immunology to Engineering.

Conference Proceeding
Hart, E., & Davoudani, D. (2009)
Dendritic cell trafficking: from Immunology to Engineering. In Artificial Immune Systems,, (11-13). https://doi.org/10.1007/978-3-642-03246-2_4
The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that oper...

Computing the State of Specknets: an immune-inspired approach.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2009)
Computing the State of Specknets: an immune-inspired approach. In Performance Evaluation of Computer and Telecommunication Systems, 2008. SPECTS 2008. International Symposium on, 52-59
Speckled Computing is an emerging technology based on the deployment of thousands of minute semiconductor grains in dense, wireless networks known as Specknets. Specknets coll...

Structure versus function: a topological perspective on immune networks

Journal Article
Hart, E., Bersini, H., & Santos, F. (2009)
Structure versus function: a topological perspective on immune networks. Natural Computing, https://doi.org/10.1007/s11047-009-9138-8
Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex...

Workplace soundscape mapping: a trial of Macaulay and Crerar’s method.

Presentation / Conference
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2006, June)
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method. Paper presented at ICAD 2006: The 12th International Conference on Auditory Display, London, UK
This paper describes a trial of Macaulay and Crerar’s method of mapping a workplace soundscape to assess its fitness as a basis for an extended soundscape mapping method. Twel...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...

Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks

Journal Article
Min, G., Wu, Y., Li, K., & Al-Dubai, A. (2009)
Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks. International Journal of Communication Systems, 23, 1111-1126. https://doi.org/10.1002/dac.1074
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless m...

Computing the State of Specknets: further analysis of an innate immune-inspired model.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2008)
Computing the State of Specknets: further analysis of an innate immune-inspired model. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial Immune Systems, 7th International Conference, ICARIS 2008, Phuket, Thailand, August 2008, Proceedings, 95-106. https://doi.org/10.1007/978-3-540-85072-4
Specknets consist of hundreds of miniature devices, which are each capable of processing data and communicating wirelessly across short distances. Such networks, with their gr...

GLBM: A new QoS aware multicast scheme for wireless Mesh network

Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2010)
GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044
Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth genera...

Integrating and extending JCSP.

Conference Proceeding
Welch, P., Brown, N., Moores, J., Chalmers, K., & Sputh, B. (2007)
Integrating and extending JCSP. In A. McEwan, S. Schneider, W. Ifill, & P. Welch (Eds.), Communicating Process Architectures 2007, 349-370
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone's JCSP Network Edition and th...

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks

Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...