Skip to main content

Research Repository

Advanced Search

All Outputs (85)

User-centered, evolutionary search in conceptual software design (2008)
Presentation / Conference
Simons, C., & Parmee, I. (2008, June). User-centered, evolutionary search in conceptual software design. Paper presented at IEEE Conference on Evolutionary Computation CEC '08 (IEEE World Conference on Computational Intelligence), Hong Kong

Although much evidence exists to suggest that conceptual software engineering design is a difficult task for software engineers to perform, current computationally intelligent tool support for software engineers is limited. While search-based appro... Read More about User-centered, evolutionary search in conceptual software design.

VANET's mobility models and overtaking: An overview (2008)
Conference Proceeding
Djenouri, D., Soualhi, W., & Nekka, E. (2008). VANET's mobility models and overtaking: An overview. In 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applicationshttps://doi.org/10.1109/ictta.2008.4530189

The most important feature of Vehicular Ad hoc Networks (VANETs) is the high mobility of nodes, which makes the mobility model one of the most important parameters that should be carefully selected when evaluating any protocol. To correctly and faith... Read More about VANET's mobility models and overtaking: An overview.

Verifying time, memory and communication bounds in systems of reasoning agents (2008)
Presentation / Conference
Alechina, N., Logan, B., Nga, N. H., & Rakib, A. (2008, May). Verifying time, memory and communication bounds in systems of reasoning agents. Paper presented at Proceedings of the Seventh International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal

We present a framework for verifying systems composed of heterogeneous reasoning agents, in which each agent may have differing knowledge and inferential capabilities, and where the resources each agent is prepared to commit to a goal (time, memory a... Read More about Verifying time, memory and communication bounds in systems of reasoning agents.

Selfish behavior on packet forwarding: An emergent security problem in MANET (2008)
Book Chapter
Djenouri, D., & Badache, N. (2008). Selfish behavior on packet forwarding: An emergent security problem in MANET. In Encyclopedia of Wireless and Mobile Communications. Taylor & Francis

The limitation in energy resources along with the multi-hop nature of mobile ad hoc networks cause a new vulnerability, that does not exist in traditional networks. To preserve its own battery, anode may behave selfishly and would not forward packets... Read More about Selfish behavior on packet forwarding: An emergent security problem in MANET.

Death; A minor annoyance or an invitation to play? (2008)
Presentation / Conference
Dixon, D. (2008, April). Death; A minor annoyance or an invitation to play?. Paper presented at Breaking the Magic Circle, University of Tampere

Games involve a lot of death, it’s hard to play games without encountering death in some format. But what does death mean in the context of games? This paper seeks to explore death firstly as a concept internally in games and also use various phenome... Read More about Death; A minor annoyance or an invitation to play?.

Evolving localizations in reaction-diffusion cellular automata (2008)
Journal Article
Adamatzky, A., Bull, L., Collet, P., & Sapin, E. (2008). Evolving localizations in reaction-diffusion cellular automata. International Journal of Modern Physics C, 19(04), 557-567. https://doi.org/10.1142/S0129183108012376

We consider hexagonal cellular automata with immediate cell neighbourhood and three cell-states. Every cell calculates its next state depending on the integral representation of states in its neighbourhood, i.e., how many neighbours are in each one s... Read More about Evolving localizations in reaction-diffusion cellular automata.

Verification of resource requirements of distributed reasoning agents (2008)
Presentation / Conference
Alechina, N., Logan, B., Nga, N. H., & Rakib, A. (2008, March). Verification of resource requirements of distributed reasoning agents. Paper presented at Sixth Workshop on Quantitative Aspects of Programming Languages (QAPL 2008), Budapest, Hungary

We present a framework for verifying systems composed of heterogeneous reasoning agents, in which each agent may have differing knowledge and inferential capabilities, and where the resources each agent is prepared to commit to a goal (time, memory a... Read More about Verification of resource requirements of distributed reasoning agents.

Towards unconventional computing through simulated evolution: Control of nonlinear media by a learning classifier system (2008)
Journal Article
Bull, L., Budd, A., Stone, C., Uroukov, I., Costello, B. D. L., & Adamatzky, A. (2008). Towards unconventional computing through simulated evolution: Control of nonlinear media by a learning classifier system. Artificial Life, 14(2), 203-222. https://doi.org/10.1162/artl.2008.14.2.203

We propose that the behavior of nonlinear media can be controlled automatically through evolutionary learning. By extension, forms of unconventional computing (viz., massively parallel nonlinear computers) can be realized by such an approach. In this... Read More about Towards unconventional computing through simulated evolution: Control of nonlinear media by a learning classifier system.

Memetic algorithms: The polynomial local search complexity theory perspective (2008)
Journal Article
Krasnogor, N., & Smith, J. (2008). Memetic algorithms: The polynomial local search complexity theory perspective. Journal of Mathematical Modelling and Algorithms, 7(1), 3-24. https://doi.org/10.1007/s10852-007-9070-9

In previous work (Krasnogor, http://www.cs.nott.ac.uk/~nxk/papers.html . In: Studies on the Theory and Design Space of Memetic Algorithms. Ph.D. thesis, University of the West of England, Bristol, UK, 2002; Krasnogor and Smith, IEEE Trans Evol Algori... Read More about Memetic algorithms: The polynomial local search complexity theory perspective.

Simulation of mobility models in vehicular ad hoc networks (2008)
Conference Proceeding
Djenouri, D., Nekka, E., & Soualhi, W. (2008). Simulation of mobility models in vehicular ad hoc networks. https://doi.org/10.4108/icst.ambisys2008.2838

Copyright ACM 2007. One of the emerging applications that belongs to ambient systems is to transparently and directly interconnect vehicles in roads, making an ad hoc network that enables a variety of applications through distritbuted softwares witho... Read More about Simulation of mobility models in vehicular ad hoc networks.

Random number generation by cellular automata with memory (2008)
Journal Article
Alonso-Sanz, R., & Bull, L. (2008). Random number generation by cellular automata with memory. International Journal of Modern Physics C, 19(02), 351-367. https://doi.org/10.1142/S012918310801211X

This paper considers an extension to the standard framework of cellular automata which implements memory capabilities by featuring cells by elementary rules of its last three states. A study is made of the potential value of elementary cellular autom... Read More about Random number generation by cellular automata with memory.

Multicast/broadcast network convergence in next generation mobile networks (2008)
Journal Article
Aguiar, R. L., Santos, J., Gomes, D., Sargento, S., Baker, N., Zafar, M., & Ikram, A. (2008). Multicast/broadcast network convergence in next generation mobile networks. Computer Networks, 52(1), 228-247. https://doi.org/10.1016/j.comnet.2007.09.002

The 3GPP Multimedia Broadcast Multicast Service (MBMS) aims to introduce group communications into the 3G networks. One of the current key challenges is how to evolve these incipient features towards the "beyond 3G vision" of a converged global netwo... Read More about Multicast/broadcast network convergence in next generation mobile networks.

Modelling healthcare processes using role activity diagramming (2008)
Journal Article
Abu Rub, F., Odeh, M., Beeson, I., Pheby, D., & Codlin, B. (2008). Modelling healthcare processes using role activity diagramming. International Journal of Modelling and Simulation, 28(2), https://doi.org/10.2316/Journal.205.2008.2.205-4546

This paper presents an investigation into the use of Role Activity Diagramming (RAD) to model complex processes in the healthcare sector, with reference to the process of Cancer Care and Registration in Jordan. We argue that RAD models are generally... Read More about Modelling healthcare processes using role activity diagramming.

Pre-processing optimisation applied to the classical integer programming model for statistical disclosure control (2008)
Conference Proceeding
Staggemeier, A., Serpell, M., Clark, A., & Smith, J. (2008). Pre-processing optimisation applied to the classical integer programming model for statistical disclosure control. . https://doi.org/10.1007/978-3-540-87471-3_3

A pre-processing optimisation is proposed that can be applied to the integer and mixed integer linear programming models that are used to solve the cell suppression problem in statistical disclosure control. In this paper we report our initial findin... Read More about Pre-processing optimisation applied to the classical integer programming model for statistical disclosure control.