Date


School

Download Available

23 results

Evaluation of a genetic representation for outline shapes

Conference Proceeding
Lapok, P., Lawson, A., & Paechter, B. (2017)
Evaluation of a genetic representation for outline shapes. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1419-1422). https://doi.org/10.1145/3067695.3082501
This work in progress focuses on the evaluation of a genetic representation for outline shapes for planar mechanical levers which addresses the first stage of the complex real...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing.

Presentation / Conference
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August)
Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event, School of Computing, University of Glasgow
This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the me...

DACAR platform for eHealth services cloud.

Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...

Controlling a simulated Khepera with an XCS classifier system with memory.

Conference Proceeding
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003)
Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...

Requirements for getting a robot to grow-up

Conference Proceeding
Ross, P., Hart, E., Lawson, A., Webb, A., Prem, E., Poelz, P., & Morgavi, G. (2003)
Requirements for getting a robot to grow-up. In W. Banzhaf, T. Christaller, P. Dittrich, J. T. Kim, & J. Ziegler (Eds.), Advances in Artificial Life 7th European Conference, ECAL 2003, Dortmund, Germany, September 14-17, 2003. Proceedings. , (847-856). https://doi.org/10.1007/978-3-540-39432-7_91
Much of current robot research is about learning tasks in which the task to be achieved is pre-specified, a suitable technology for the task is chosen and the learning process...

Risk analysis for criminal context in information sharing policies.

Presentation / Conference
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August)
Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event, School of Computing, University of Glasgow
This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, whi...

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns

Conference Proceeding
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018)
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...