Date


Output Type

Download Available

74 results

Selection methods and diversity preservation in many-objective evolutionary algorithms

Journal Article
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2018)
Selection methods and diversity preservation in many-objective evolutionary algorithms. Data Technologies and Applications, https://doi.org/10.1108/dta-01-2018-0009
Purpose – One of the main components of multi-objective, and therefore, many-objective evolutionary algorithms is the selection mechanism. It is responsible for performing two...

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

Teallach: a model-based user interface development environment for object databases

Journal Article
Griffiths, T., Barclay, P. J., Paton, N. W., McKirdy, J., Kennedy, J., Gray, P., …Pinherio da Silva, P. (2001)
Teallach: a model-based user interface development environment for object databases. Interacting with Computers, 14(1), 31-68. https://doi.org/10.1016/s0953-5438%2801%2900042-x
Model-based user interface development environments show promise for improving the productivity of user-interface developers and possibly for improving the quality of develope...

Supporting design through the strategic use of shape grammars

Journal Article
Edmonds, E., Smyth, M., & Edmonds, E. A. (2000)
Supporting design through the strategic use of shape grammars. Knowledge-Based Systems, 13(6), (385-393). ISSN 0950-7051
This paper is concerned with the early processes of design, particularly in the context of spatial arrangements. We are interested in the strategies that a designer uses in or...

Implementing a wireless network of PDAs in a hospital setting

Journal Article
Turner, P., Milne, G., Kubitscheck, M., Penman, I., & Turner, S. (2005)
Implementing a wireless network of PDAs in a hospital setting. Personal and Ubiquitous Computing, 9, 209-217. https://doi.org/10.1007/s00779-004-0322-7
This paper discusses the introduction of a wireless network of personal digital assistants into a specialist unit of a hospital in Edinburgh. All of the technology has been us...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Remediation of asyntactic sentence comprehension using a multimedia microworld.

Journal Article
Beveridge, M. A., & Crerar, A. (2002)
Remediation of asyntactic sentence comprehension using a multimedia microworld. Brain and Language, 82, 243-295. https://doi.org/10.1016/S0093-934X%2802%2900015-9
We report the evaluation of a new automated protocol for the treatment of asyntactic comprehension. This is a follow-up study to the “Microworld for Aphasia” work of Crerar, E...

Evolutionary scheduling: a review.

Journal Article
Hart, E., Ross, P., & Corne, D. (2005)
Evolutionary scheduling: a review. Genetic Programming and Evolvable Machines, 6, 191-220. https://doi.org/10.1007/s10710-005-7580-7
Early and seminal work which applied evolutionary computing methods to scheduling problems from 1985 onwards laid a strong and exciting foundation for the work which has been ...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...

The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University

Journal Article
Binyamin, S. S., Rutter, M. J., & Smith, S. (2018)
The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University. International journal of information and education technology (IJIET), 8(10), 693-699. https://doi.org/10.18178/ijiet.2018.8.10.1124
Technology acceptance model (TAM) has been a standout amongst the most well-known models in understanding the users’ acceptance of technologies. This study develops a model to...