Date


Output Type

Download Available

19 results

A critique of JCSP networking.

Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2008)
A critique of JCSP networking. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 271-291. doi:10.3233/978-1-58603-907-3-271
We present a critical investigation of the current implementation of JCSP Networking, examining in detail the structure and behavior of the current architecture. Information i...

Dendritic cell trafficking: from Immunology to Engineering.

Conference Proceeding
Hart, E., & Davoudani, D. (2009)
Dendritic cell trafficking: from Immunology to Engineering. In Artificial Immune Systems. , (11-13). https://doi.org/10.1007/978-3-642-03246-2_4
The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that oper...

Everyday listening to auditory displays: lessons from acoustic ecology.

Conference Proceeding
Droumeva, M., & McGregor, I. (2012)
Everyday listening to auditory displays: lessons from acoustic ecology. In Proceedings of The 18th International Conference on Auditory Display (ICAD2012)
In order to design auditory displays that function well within the cultural, informational and acoustic ecology of everyday situations designers as well as researchers in psyc...

Tackling the abstraction problem for reverse engineering in a system re-engineering approach.

Conference Proceeding
Yang, H., Liu, X., & Zedan, H. (1998)
Tackling the abstraction problem for reverse engineering in a system re-engineering approach. In the proceedings of the IEEE Conference on Software Maintenance (ICSM'98), 284. https://doi.org/10.1109/ICSM.1998.738520
It is widely accepted that reverse engineering has three components: restructuring, comprehension and production of formal specification. In this paper, we advocate that the t...

Mobile agents and processes using communicating process architectures.

Conference Proceeding
Kerridge, J., Haschke, J., & Chalmers, K. (2007)
Mobile agents and processes using communicating process architectures. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 397-410. doi:10.3233/978-1-58603-907-3-397
The mobile agent concept has been developed over a number of years and is widely accepted as one way of solving problems that require the achievement of a goal that cannot be ...

Speed and scale up software re-engineering with abstraction patterns and rules.

Conference Proceeding
Liu, X., Yang, H., Zedan, H., & Cau, A. (2000)
Speed and scale up software re-engineering with abstraction patterns and rules. In International Symposium on Principles of Software Evolution, 2000. Proceedings, 90. https://doi.org/10.1109/ISPSE.2000.913226
Software reengineering is an essential part of software evolution. Two important issues faced by software reengineering techniques are the time involved and the ability to cop...

Workplace soundscape mapping: a trial of Macaulay and Crerar’s method

Conference Proceeding
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2006)
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method. In Proceedings of the 12th International Conference on Auditory Display (ICAD2006)
This paper describes a trial of Macaulay and Crerar’s method of mapping a workplace soundscape to assess its fitness as a basis for an extended soundscape mapping method. Twel...

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks

Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...

Integrating and extending JCSP.

Conference Proceeding
Welch, P., Brown, N., Moores, J., Chalmers, K., & Sputh, B. (2007)
Integrating and extending JCSP. In A. McEwan, S. Schneider, W. Ifill, & P. Welch (Eds.), Communicating Process Architectures 2007, 349-370
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone's JCSP Network Edition and th...

Computing the State of Specknets: an immune-inspired approach.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2009)
Computing the State of Specknets: an immune-inspired approach. In Performance Evaluation of Computer and Telecommunication Systems, 2008. SPECTS 2008. International Symposium on, 52-59
Speckled Computing is an emerging technology based on the deployment of thousands of minute semiconductor grains in dense, wireless networks known as Specknets. Specknets coll...