Skip to main content

Research Repository

Advanced Search

Outputs (35)

Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system (2018)
Journal Article

© 2018 Elsevier B.V. In recent years, Intelligent and Connected Transportation Systems (ICTS) have become a practical and valuable alternative for wide variety of novel applications in road traffic safety. It can be utilized to guarantee road safety... Read More about Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system.

Mapping wildlife species distribution with social media: Augmenting text classification with species names (2018)
Presentation / Conference Contribution

© Shelan S. Jeawak, Christopher B. Jones, and Steven Schockaert. Social media has considerable potential as a source of passive citizen science observations of the natural environment, including wildlife monitoring. Here we compare and combine two ma... Read More about Mapping wildlife species distribution with social media: Augmenting text classification with species names.

Outside the block syndicate: Translating Faust's algebra of blocks to the arrows framework (2018)
Presentation / Conference Contribution

Folklore has it that Faust’s algebra of blocks can be represented in Hughes’ algebra of Arrows. In this paper we formalise this understanding, showing that blocks can indeed be encoded with Causal Commutative Arrows.
Whilst an interesting finding in... Read More about Outside the block syndicate: Translating Faust's algebra of blocks to the arrows framework.

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks (2018)
Journal Article

Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to... Read More about From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.