Can justice be fair when it is blind? How social network structures can promote or prevent the evolution of despotism
Perret, C., Powers, S. T., Pitt, J., & Hart, E. (2018)
Can justice be fair when it is blind? How social network structures can promote or prevent the evolution of despotism. In T. Ikegami, N. Virgo, O. Witkowski, M. Oka, R. Suzuki, & H. Iizuka (Eds.), Proceedings of the 2018 Conference on Artificial Lifehttps://doi.org/10.1162/isal_a_00058
Hierarchy is an efficient way for a group to organize, but often goes along with inequality that benefits leaders. To control despotic behaviour, followers can assess leaders'...
Using a task classification in the visualisation design process for task understanding and abstraction: an empirical study
Kerracher, N., Kennedy, J., & Chalmers, K. (2018)
Using a task classification in the visualisation design process for task understanding and abstraction: an empirical study. In J. Johansson, F. Sadlo, & T. Schreck (Eds.), Proceedings of the 2018 Eurographics Conference on Visualization (EuroVis 2018) - Short Papers, 79-83. https://doi.org/10.2312/eurovisshort.20181082
Task classifications are widely purported to be useful in the design process, with various suggestions having been made for their use at the different stages. However, little ...
Appliance Recognition Based on Continuous Quadratic Programming
Liu, X., & Liu, Q. (2018)
Appliance Recognition Based on Continuous Quadratic Programming. In Proceedings of 4th International Conference on Cloud Computing and Security (ICCCS 2018), (63-72). https://doi.org/10.1007/978-3-030-00018-9_6
The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical ene...
A Self-organizing LSTM-Based Approach to PM2.5 Forecast
Liu, X., Liu, Q., Zou, Y., & Wang, G. (2018)
A Self-organizing LSTM-Based Approach to PM2.5 Forecast. In Proceedings of the 4th International Conference on Cloud Computing and Security (ICCCS 2018), (683-693). https://doi.org/10.1007/978-3-030-00015-8_59
Nanjing has been listed as the one of the worst performers across China with respect to the high level of haze-fog, which impacts people's health greatly. For the severe condi...
On the Synthesis of Perturbative Heuristics for Multiple Combinatorial Optimisation Domains
Stone, C., Hart, E., & Paechter, B. (2018)
On the Synthesis of Perturbative Heuristics for Multiple Combinatorial Optimisation Domains. In Parallel Problem Solving from Nature – PPSN XV 15th International Conference, Coimbra, Portugal, September 8–12, 2018, Proceedings, Part Ihttps://doi.org/10.1007/978-3-319-99253-2_14
Hyper-heuristic frameworks, although intended to be cross-domain at the highest level, rely on a set of domain-specific low-level heuristics at lower levels. For some domains,...
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018)
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...
Detection of Algorithmically Generated Malicious Domain
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...
Privacy Parameter Variation using RAPPOR on a Malware Dataset
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), 8. doi:10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...
2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms
Lapok, P., Lawson, A., & Paechter, B. (2018)
2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms. In H. Rodrigues, J. Herskovits, C. Mota Soares, A. Araújo, J. Guedes, J. Folgado, …J. Madeira (Eds.), EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization, 926-937. doi:10.1007/978-3-319-97773-7_80
In this paper, we investigate the ability of genetic representation methods to describe two-dimensional outline shapes, in order to use them in a generative design system. A s...