Research explorer tool

Date


Download Available

42 results

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...

On balancing network traffic in path-based multicast communication

Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2006)
On balancing network traffic in path-based multicast communication. Future Generation Computer Systems, 22(7), 805-811. doi:10.1016/j.future.2006.02.009
This paper presents a new multicast path-based algorithm, referred to here as the Qualified Groups (QG for short), which can achieve a high degree of parallelism and low commu...

Mobile agents and processes using communicating process architectures.

Conference Proceeding
Kerridge, J., Haschke, J., & Chalmers, K. (2007)
Mobile agents and processes using communicating process architectures. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 397-410. doi:10.3233/978-1-58603-907-3-397
The mobile agent concept has been developed over a number of years and is widely accepted as one way of solving problems that require the achievement of a goal that cannot be ...

Representation in the (Artificial) Immune System

Journal Article
McEwan, C., & Hart, E. (2009)
Representation in the (Artificial) Immune System. Journal of Mathematical Modelling and Algorithms, 8, 125-149. https://doi.org/10.1007/s10852-009-9104-6
Much of contemporary research in Artificial Immune Systems (AIS) has partitioned into either algorithmic machine learning and optimisation, or, modelling biologically plausibl...

Dendritic cell trafficking: from Immunology to Engineering.

Conference Proceeding
Hart, E., & Davoudani, D. (2009)
Dendritic cell trafficking: from Immunology to Engineering. In Artificial Immune Systems. , (11-13). https://doi.org/10.1007/978-3-642-03246-2_4
The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that oper...

Computing the State of Specknets: an immune-inspired approach.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2009)
Computing the State of Specknets: an immune-inspired approach. In Performance Evaluation of Computer and Telecommunication Systems, 2008. SPECTS 2008. International Symposium on, 52-59
Speckled Computing is an emerging technology based on the deployment of thousands of minute semiconductor grains in dense, wireless networks known as Specknets. Specknets coll...

Structure versus function: a topological perspective on immune networks

Journal Article
Hart, E., Bersini, H., & Santos, F. (2009)
Structure versus function: a topological perspective on immune networks. Natural Computing, https://doi.org/10.1007/s11047-009-9138-8
Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex...

Workplace soundscape mapping: a trial of Macaulay and Crerar’s method

Conference Proceeding
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2006)
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method. In Proceedings of the 12th International Conference on Auditory Display (ICAD2006)
This paper describes a trial of Macaulay and Crerar’s method of mapping a workplace soundscape to assess its fitness as a basis for an extended soundscape mapping method. Twel...

Computing the State of Specknets: further analysis of an innate immune-inspired model.

Conference Proceeding
Davoudani, D., Hart, E., & Paechter, B. (2008)
Computing the State of Specknets: further analysis of an innate immune-inspired model. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial Immune Systems, 7th International Conference, ICARIS 2008, Phuket, Thailand, August 2008, Proceedings, 95-106. https://doi.org/10.1007/978-3-540-85072-4
Specknets consist of hundreds of miniature devices, which are each capable of processing data and communicating wirelessly across short distances. Such networks, with their gr...

Tackling the abstraction problem for reverse engineering in a system re-engineering approach.

Conference Proceeding
Yang, H., Liu, X., & Zedan, H. (1998)
Tackling the abstraction problem for reverse engineering in a system re-engineering approach. In the proceedings of the IEEE Conference on Software Maintenance (ICSM'98), 284. https://doi.org/10.1109/ICSM.1998.738520
It is widely accepted that reverse engineering has three components: restructuring, comprehension and production of formal specification. In this paper, we advocate that the t...