Skip to main content

Research Repository

Advanced Search

Outputs (65)

Analysis traceability and provenance for HEP (2015)
Journal Article
Kovács, Z., McClatchey, R., Shamdasani, J., Branson, A., & Kovacs, Z. (2015). Analysis traceability and provenance for HEP. Journal of Physics: Conference Series, 664(3), https://doi.org/10.1088/1742-6596/664/3/032028

This paper presents the use of the CRISTAL software in the N4U project. CRISTAL was used to create a set of provenance aware analysis tools for the Neuroscience domain. This paper advocates that the approach taken in N4U to build the analysis suite i... Read More about Analysis traceability and provenance for HEP.

Slime mould foraging behaviour as optically coupled logical operations (2015)
Journal Article
Adamatzky, A., Mayne, R., Mayne, R., & Adamatzky, A. (2015). Slime mould foraging behaviour as optically coupled logical operations. International Journal of General Systems, 44(3), 305-313. https://doi.org/10.1080/03081079.2014.997528

© 2015 Taylor & Francis. Physarum polycephalum is a macroscopic plasmodial slime mould whose apparently 'intelligent' behaviour patterns may be interpreted as computation. We employ plasmodial phototactic responses to construct laboratory prototype... Read More about Slime mould foraging behaviour as optically coupled logical operations.

On the dynamics of cellular automata with memory (2015)
Journal Article
Martínez, G. J., Adamatzky, A., & Alonso-Sanz, R. (2015). On the dynamics of cellular automata with memory. Fundamenta Informaticae, 138(1-2), 1-16. https://doi.org/10.3233/FI-2015-1194

Elementary cellular automata (ECA) are linear arrays of finite-state machines (cells) which take binary states, and update their states simultaneously depending on states of their closest neighbours. We design and study ECA with memory (ECAM), where... Read More about On the dynamics of cellular automata with memory.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.

Towards computation of novel ideas from corpora of scientific text (2015)
Journal Article
Liu, H., Goulding, J., & Brailsford, T. (2015). Towards computation of novel ideas from corpora of scientific text. Lecture Notes in Artificial Intelligence, 9285, 541-556. https://doi.org/10.1007/978-3-319-23525-7_33

© Springer International Publishing Switzerland 2015. In this work we present a method for the computation of novel ‘ideas’ from corpora of scientific text. The system functions by first detecting concept noun-phrases within the titles and abstracts... Read More about Towards computation of novel ideas from corpora of scientific text.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation (2015)
Journal Article
Vlachidis, A., & Tudhope, D. (2015). Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation. Program, 49(2), 118-134

The paper presents the role and contribution of Natural Language Processing Techniques, in particular Negation Detection and Word Sense Disambiguation in the process of Semantic Annotation of Archaeological Grey Literature. Archaeological reports con... Read More about Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation.

Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability (2015)
Journal Article
Ghadafi, E. (2015). Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability. Lecture Notes in Artificial Intelligence, 8895, 327-347. https://doi.org/10.1007/978-3-319-16295-9_18

© Springer International Publishing Switzerland 2015. In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among n managers without requiring an... Read More about Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability.

A framework for describing multimedia circulation in a smartphone ecosystem (2015)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., & King, I. (2015). A framework for describing multimedia circulation in a smartphone ecosystem. IFIP Advances in Information and Communication Technology, 462, 251-267. https://doi.org/10.1007/978-3-319-24123-4_15

© IFIP International Federation for Information Processing 2015. Contemporary mobile devices allow almost unrestricted sharing of multimedia and other types of files. However, because smartphones and tablets can easily access the Internet and exchang... Read More about A framework for describing multimedia circulation in a smartphone ecosystem.

Messaging activity reconstruction with sentiment polarity identification (2015)
Journal Article
Andriotis, P., & Oikonomou, G. (2015). Messaging activity reconstruction with sentiment polarity identification. Lecture Notes in Artificial Intelligence, 9190, 475-486. https://doi.org/10.1007/978-3-319-20376-8_42

© Springer International Publishing Switzerland 2015. Sentiment Analysis aims to extract information related to the emotional state of the person that produced a text document and also describe the sentiment polarity of the short or long message. Thi... Read More about Messaging activity reconstruction with sentiment polarity identification.