Skip to main content

Research Repository

Advanced Search

Outputs (103)

A smart contract model for agent societies (2018)
Conference Proceeding
Tumminelli, M., & Battle, S. (2018). A smart contract model for agent societies. In UK-RAS Conference: ‘Robots Working For & Among Us’ Proceedings

This paper presents a solution to the exchange of services within an agent society. We explore an open delivery chain scenario in which autonomous drones offer and subcontract delivery services to each other. Such agents are able to self-organize acc... Read More about A smart contract model for agent societies.

Conversation analysis structured dialogue for multi-domain dialogue management (2018)
Presentation / Conference
Duran, N., & Battle, S. (2018, December). Conversation analysis structured dialogue for multi-domain dialogue management. Paper presented at The International Workshop on Dialogue, Explanation and Argumentation in Human-Agent Interaction (DEXAHAI), Southampton

Dialogue state tracking is a vital component of task-oriented dialogue systems. Often, dialogue states are constrained by their target domains entity's, slots and values. Adding new domains and knowledge may require laborious hand-crafting or retrain... Read More about Conversation analysis structured dialogue for multi-domain dialogue management.

Confidentiality and linked data (2018)
Book Chapter
Ritchie, F., & Smith, J. Confidentiality and linked data. In G. Roarson (Ed.), Privacy and Data Confidentiality Methods – a National Statistician’s Quality Review (1-34). Newport: Office for National Statistics

This chapter considers the confidentiality issues around linked data. It notes that the use and availability of secondary (adminstrative or social media) data, allied to powerful processing and machine learning techniques, in theory means that re-ide... Read More about Confidentiality and linked data.

Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system (2018)
Journal Article
Wang, T., Tang, M. B., Song, H., Cao, Y., & Khan, Z. (2019). Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system. Computer Networks, 149, 173-186. https://doi.org/10.1016/j.comnet.2018.11.034

© 2018 Elsevier B.V. In recent years, Intelligent and Connected Transportation Systems (ICTS) have become a practical and valuable alternative for wide variety of novel applications in road traffic safety. It can be utilized to guarantee road safety... Read More about Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system.

Liquid Marble Actuator for Microfluidic Logic Systems (2018)
Journal Article
Draper, T. C., Fullarton, C., Phillips, N., de Lacy Costello, B. P. J., & Adamatzky, A. (2018). Liquid Marble Actuator for Microfluidic Logic Systems. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-32540-w

© 2018, The Author(s). A mechanical flip-flop actuator has been developed that allows for the facile re-routing and distribution of liquid marbles (LMs) in digital microfluidic devices. Shaped loosely like a triangle, the actuating switch pivots fro... Read More about Liquid Marble Actuator for Microfluidic Logic Systems.

Time-aware distributed service recommendation with privacy-preservation (2018)
Journal Article
Xu, X., He, Q., Qi, L., Wang, R., Hu, C., & Li, S. (2019). Time-aware distributed service recommendation with privacy-preservation. Information Sciences, 480, 354-364. https://doi.org/10.1016/j.ins.2018.11.030

© 2018 As a promising way to extract insightful information from massive data, service recommendation has gained ever-increasing attentions in both academic and industrial areas. Recently, the Locality-Sensitive Hashing (LSH) technique is introduced... Read More about Time-aware distributed service recommendation with privacy-preservation.

Behavior rhythm: A new model for behavior visualization and its application in system security management (2018)
Journal Article
He, C., Liu, Z., Guan, X., Li, S., & Qin, T. (2018). Behavior rhythm: A new model for behavior visualization and its application in system security management. IEEE Access, 6, 73940-73951. https://doi.org/10.1109/ACCESS.2018.2882812

© 2018 IEEE. The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and mo... Read More about Behavior rhythm: A new model for behavior visualization and its application in system security management.

NotPetya: Cyber attack prevention through awareness via Gamification (2018)
Conference Proceeding
Lika, R. A., Murugiah, D., Brohi, S., & Ramasamy, D. A. (2018). NotPetya: Cyber attack prevention through awareness via Gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. https://doi.org/10.1109/ICSCEE.2018.8538431

NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue... Read More about NotPetya: Cyber attack prevention through awareness via Gamification.

Frequent itemset mining in big data with effective single scan algorithms (2018)
Journal Article
Djenouri, Y., Djenouri, D., Chun-Wei Lin, J., & Belhadi, A. (2018). Frequent itemset mining in big data with effective single scan algorithms. IEEE Access, 6, 68013-68026. https://doi.org/10.1109/ACCESS.2018.2880275

© 2013 IEEE. This paper considers frequent itemsets mining in transactional databases. It introduces a new accurate single scan approach for frequent itemset mining (SSFIM), a heuristic as an alternative approach (EA-SSFIM), as well as a parallel imp... Read More about Frequent itemset mining in big data with effective single scan algorithms.