- UHRA Home
- Browsing by Author
Browsing by Author "Centre for Computer Science and Informatics Research"
Now showing items 101-120 of 1210
-
Big Data Scalability of BayesPhylogenies on Harvard’s Ozone 12k Cores.
Manjunathaiah, Manju; Meade, Andrew; Thavarajan, R; Protopapas, P; Dave, R (2019-02-23)Computational Phylogenetics is classed as a grand challenge data driven problem in the fourth paradigm of scientific discovery due to the exponential growth in genomic data, the computational challenge and the potential ... -
Binding bit patterns to real world entities
Christianson, B.; Malcolm, J. (1998)Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to ... -
Binding bit patterns to real world entities
Christianson, B.; Malcolm, J. (University of Hertfordshire, 1997)Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to ... -
Binding of Filamentous Actin to CaMKII as a Potential Mechanism for the Regulation of Bidirectional Synaptic Plasticity by betaCaMKII in Cerebellar Purkinje Cells
Matos Pinto, Thiago; Schilstra, Maria; Roque, Antonio; Steuber, Volker (2020-06-02)Calcium-calmodulin dependent protein kinase II (CaMKII) regulates many forms of synaptic plasticity, but little is known about its functional role during plasticity induction in the cerebellum. Experiments have indicated ... -
Bioinformatic Principles Underlying the Information Content of Transcription Factor Binding Sites
Polani, D.; Kim, J.T.; Martinetz, T. (2003)Empirically, it has been observed in several cases that the information content of transcription factor binding site sequences (Rsequence) approximately equals the information content of binding site positions (Rfrequency). ... -
Biologically plausible computational models for facial expression recognition
Shenoy, Aruna; Davey, N.; Frank, Raymond (2013-12-01)This paper discusses various biologically plausible computational models that recognize human facial expression and analyze them. Identifying facial expressions is a non trivial task for a human and is a key part of social ... -
BIOMICS Project : Biological and Mathematical Basis of Interaction Computing
Dini, Paolo; Nehaniv, C.L.; Egri-Nagy, Attila; Schilstra, M.; Schreckling, Daniel; Posegga, Joachim; Horvath, Gabor; Munro, Alastair J. (2012)The main idea that led us to propose this project is inspired by the observation that cell metabolic/regulatory systems are able to self-organise and/or construct order dynamically, through random interactions between their ... -
A biophysical model of synaptic delay learning and temporal pattern recognition in a cerebellar Purkinje cell
Steuber, Volker; Willshaw, D. (2004)It has been suggested that information in the brain is encoded in temporal spike patterns which are decoded by a combination of time delays and coincidence detection. Here, we show how a multi-compartmental model of a ... -
Bivariate Measure of Redundant Information
Harder, Malte; Salge, Christoph; Polani, D. (2013-01-23)We define a measure of redundant information based on projections in the space of probability distributions. Redundant information between random variables is information that is shared between those variables. But in ... -
Blended learning in the campus-based university : a case-study exploring the student experience of technology for enhancing learning
Jefferies, Amanda (Engineering Science Reference (IGI-Global), 2012-06) -
Bluetooth low energy for autonomous human-robot interaction
Scheunemann, Marcus M.; Dautenhahn, Kerstin (Institute of Electrical and Electronics Engineers (IEEE), 2017-03-06)This demonstration shows how inexpensive, off-the-shelf, and unobtrusive Bluetooth Low Energy (BLE) devices can be utilized for enabling robots to recognize touch gestures, to perceive proximity information, and to distinguish ... -
Boosting Ant Colony Optimization with Reptile Search Algorithm for Churn Prediction
Al-Shourbaji, Ibrahim; Helian, Na; Sun, Yi; Alshathri, Samah; Abd Elaziz, Mohamed (2022-03-23)The telecommunications industry is greatly concerned about customer churn due to dissatisfaction with service. This industry has started investing in the development of machine learning (ML) models for churn prediction to ... -
Bounded rationality and learning
Gobet, Fernand; Lane, Peter (Springer Nature, 2012) -
The boy-robot should bark! : Children's impressions of agent migration into diverse embodiments
Syrdal, D.S.; Koay, K.L.; Walters, M.L.; Dautenhahn, K. (2009)This paper presents results from a series of focused group discussions with a sample consisting of approximately 180 children during which views and opinions regarding agents migrating between different embodiments were ... -
Bridging Semantics with Ontologies
Chowdhurry, Tameem; Tubb, Christopher; Vidalis, Stilianos (2014)Semantic metadata enables contextual and relevant data to be identified for a particular entity. The use of ontologies creates a bridging mechanism, whereby semantic metadata can be referenced and validated to ensure that ... -
Bringing Land Law to Life: Lessons From the Development and Deployment of an Immersive “Virtual Town” in the Teaching of Land Law
Dunk, Thomas; Marunchak, Yulia (Taylor & Francis Group, 2022-10-14)This chapter sets out to explore the use of a virtual town in the teaching of Land Law. This 3D model of a small town was used to help illustrate legal issues, problems, and concepts in a highly visual manner. By employing ... -
Bruck-Reilly extensions of direct products of monoids and completely (0-)simple semigroups
Carvalho, Catarina (2009-08) -
BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks
Maw, Htoo; Xiao, Hannan; Christianson, Bruce; Malcolm, James (2016-05-03)Wireless sensor networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. An emerging application for WSNs involves their use in healthcare where they are ... -
Building an Ensemble for Software Defect Prediction Based on Diversity Selection
Petri, Jean; Bowes, David; Hall, Tracy; Christianson, Bruce; Baddoo, Nathan (ACM Press, 2016-09-09)Background: Ensemble techniques have gained attention in various scientific fields. Defect prediction researchers have investigated many state-of-the-art ensemble models and concluded that in many cases these outperform ... -
Burnt-in Text Recognition from Medical Imaging Modalities: Existing Machine Learning Practices
Osagie, Efosa; Ji, Wei; Helian, Na (2024-01-20)In recent times, medical imaging has become a significant component of clinical diagnosis and examinations to detect and evaluate various medical conditions. The interpretation of these medical examinations and the patient's ...