7 results

Controlling a simulated Khepera with an XCS classifier system with memory.

Conference Proceeding
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003)
Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...

Exploiting the analogy between the immune system and sparse distributed memory.

Journal Article
Hart, E., & Ross, P. (2002)
Exploiting the analogy between the immune system and sparse distributed memory. Genetic Programming and Evolvable Machines, 4(4), 333-358. doi:10.1023/a:1026191011609
The relationship between immunological memory and a class of associative memories known as sparse distributed memories (SDM) is well known. This paper proposes a new model for...

Reliving VE day with activated schemata.

Conference Proceeding
Turner, P., Turner, S., & Tzovaras, D. (2004)
Reliving VE day with activated schemata. In Proc. 8th International Workshop on Presence, 33-38
This paper reports some preliminary work on the IntoMyWorld candidate Presence II project. One of the key components of IntoMyWorld is a mixed reality ‘album’ of important eve...

Algorithm selection using deep learning without feature extraction

Conference Proceeding
Alissa, M., Sim, K., & Hart, E. (2019)
Algorithm selection using deep learning without feature extraction. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion. , (198-206). https://doi.org/10.1145/3321707.3321845
We propose a novel technique for algorithm-selection which adopts a deep-learning approach, specifically a Recurrent-Neural Network with Long-Short-Term-Memory (RNN-LSTM). In ...

Pictures at the ATM: Exploring the usability of multiple graphical passwords.

Conference Proceeding
Moncur, W., & LePlâtre, G. (2007)
Pictures at the ATM: Exploring the usability of multiple graphical passwords. https://doi.org/10.1145/1240624.1240758
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (...

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS).

Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010)
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...

The psychology of face construction: Giving evolution a helping hand

Journal Article
Frowd, C. D., Pitchford, M., Bruce, V., Jackson, S., Hepton, G., Greenall, M., …Hancock, P. J. B. (2011)
The psychology of face construction: Giving evolution a helping hand. Applied Cognitive Psychology, 25(2), 195-203. https://doi.org/10.1002/acp.1662
Face construction by selecting individual facial features rarely produces recognisable images. We have been developing a system called EvoFIT that works by the repeated select...

Date


Date


Date


Date