Research explorer tool

Date


People

Output Type

Download Available

305 results

Visualization of Online Datasets

Conference Proceeding
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA). , (239-246
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we im...

Understanding Environmental Influence in an Open-Ended Evolutionary Algorithm

Conference Proceeding
Steyven, A., Hart, E., & Paechter, B. (2016)
Understanding Environmental Influence in an Open-Ended Evolutionary Algorithm. In Parallel Problem Solving from Nature – PPSN XIV; Lecture Notes in Computer Science. , (921-931). https://doi.org/10.1007/978-3-319-45823-6_86
It is well known that in open-ended evolution, the nature of the environment plays in key role in directing evolution. However, in Evolutionary Robotics, it is often unclear e...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Towards reusable and reconfigurable models for the WWW

Conference Proceeding
Brown, E., & Buchanan, W. (2002)
Towards reusable and reconfigurable models for the WWW. In Proceedings 26th Annual International Computer Software and Applications. , (814-815). https://doi.org/10.1109/cmpsac.2002.1045106
Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW dev...

Novel information sharing syntax for data sharing between police and community partners, using role-based security.

Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

On the life-long learning capabilities of a NELLI*: a hyper-heuristic optimisation system.

Conference Proceeding
Hart, E., & Sim, K. (2014)
On the life-long learning capabilities of a NELLI*: a hyper-heuristic optimisation system. In Proceedings of PPSN, 13th International Conference on Parallel problem Solving from Nature, (282-291). https://doi.org/10.1007/978-3-319-10762-2_28
Real-world applications of optimisation techniques place more importance on finding approaches that result in acceptable quality solutions in a short time-frame and can provid...

Peer-to-peer networks for scalable grid landscapes in social agent simulations.

Conference Proceeding
Craenen, B. G. W., & Paechter, B. (2005)
Peer-to-peer networks for scalable grid landscapes in social agent simulations. In Proceedings of the Artificial Intelligence and Social Behaviour Convention (AISB) 2005, 64-71
Recently, peer-to-peer networks have been proposed as the underlying architecture of large scale distributed social agent simulations. A number of problems arise when grid lan...

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011)
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),, 351-355. doi:10.1109/compsacw.2011.65
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context informat...

Learning to solve bin packing problems with an immune inspired hyper-heuristic.

Conference Proceeding
Sim, K., Hart, E., & Paechter, B. (2013)
Learning to solve bin packing problems with an immune inspired hyper-heuristic. In P. Liò, O. Miglino, G. Nicosia, S. Nolfi, & M. Pavone (Eds.), Advances in Artificial Life, ECAL 2013, 856-863. https://doi.org/10.7551/978-0-262-31709-2-ch126
Motivated by the natural immune system's ability to defend the body by generating and maintaining a repertoire of antibodies that collectively cover the potential pathogen spa...

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2003)
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. In Proceedings. 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. , (200-206). https://doi.org/10.1109/ECBS.2003.1194800
Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile system...