- UHRA Home
- Browsing by Author
Browsing by Author "Centre for Computer Science and Informatics Research"
Now showing items 141-160 of 1210
-
Channel estimation for wireless communications using space-time block coding techniques
Yang, J.; Sun, Y.; Senior, J.M.; Pem, N. (Institute of Electrical and Electronics Engineers (IEEE), 2003)This paper presents a method of estimating channel parameters in wireless communications using space-time block coding (STBC). After reviewing the concept of STBC, the system model of radio communication with STBC is ... -
Characterising the performance of balanced memory networks
Metaxas, A.; Maex, Reinoud; Adams, R.G.; Steuber, Volker; Davey, N. (2013)Poster presented at CNS 2013 -
Chirp control of an electroabsorption modulator to be used for regeneration and wavelength conversion at 40 gbit/s in all-optical networking
Jamro, M.Y.; Senior, J.M. (2005)Chirp control to produce low or negative values of chirp at the output of an electroabsorption modulator ( EAM) is an important mechanism for reducing the signal degradation due to chromatic dispersion in high- speed ... -
Chirp in a wavelength converter based on a symmetrical-MZI employing SOAs
Jamro, M.Y.; Senior, J.M.; Leeson, M.S.; Murtaza, G. (2002-08-15)A wavelength converter based on cross-phase modulation using semiconductor optical amplifiers (SOAs) in a symmetrical MZI is modelled. Since the model of the SOAs considers both amplitude and wavelength-dependent parameters ... -
CHREST implementation : Java-based implementation of the CHREST cognitive architecture
Science & Technology Research Institute; School of Computer Science; Centre for Computer Science and Informatics Research; Lane, Peter (2012)The Chrest Shell is a graphical application and library for running a variety of Chrest models and experiments. Currently, the shell supports a limited range of domain-types, but more functionality is available using the ... -
Chunking mechanisms and learning
Gobet, Fernand; Lane, Peter (Springer Nature, 2012) -
Chunking mechanisms in human learning
Gobet, F.; Lane, P.C.R.; Croker, S.; Cheng, P. C-H.; Jones, G.; Oliver, I.; Pine, J.M. (2001) -
'Chunks, schemata and retrieval structures: Past and current computational models
Gobet, Fernand; Lane, Peter; Lloyd-Kelly, Martyn (2015-11-24)A recurring question in psychology and cognitive science concerns the expression of theories that are internally consistent and testable. Natural language is unsatisfactory, as theoretical concepts and mechanisms are not ... -
Classification of Personal Data Used by Personalised Robot Companions Based on Concern of Exposure
Riches, Lewis; Koay, Kheng; Holthaus, Patrick (Springer Nature, 2023-02-02)We present a paper looking at the accidental exposure of personal data by personalised companion robots in human-robot interaction. Due to the need for personal data, personalisation brings inherent risk of accidental ... -
A Classification of Threats to Remote Online Examinations
Ullah, Abrar; Xiao, Hannan; Barker, Trevor (Institute of Electrical and Electronics Engineers (IEEE), 2016-11-17)Summative online examinations is a high stake process which faces many security threats. The lack of face-toface interaction, monitoring or invigilation motivates many threats, which includes intrusion by hackers and ... -
Classification of WCET analysis techniques
Kirner, Raimund; Puschner, P. (Institute of Electrical and Electronics Engineers (IEEE), 2005)Worst-case execution time (WCET) analysis has become an active research area over the last decade. Various techniques have been developed to improve the WCET calculation methods for numerous features of the hardware. In ... -
Close encounters : spatial distances between people and a robot of mechanistic appearance
Walters, M.L.; Dautenhahn, K.; Koay, K.L.; Kaouri, C.; Te Boekhorst, R.; Nehaniv, C.L.; Werry, I.; Lee, D. (2005) -
Cloud Security : A Review of Recent Threats and Solution Models
Ugorji, Betrand; Abouzakhar, Nasser; Sapsford, John (Academic Conferences Ltd., 2013-10-18)The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the ... -
A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
Xiao, Hannan; Alshehri, Awatif; Christianson, Bruce (Institute of Electrical and Electronics Engineers (IEEE), 2017-02-09)Radio Frequency Identification (RFID) has becomea widespread technology to automatically identify objects and withthe development of cloud computing, cloud-based RFID systemsattract more research these days. Several ... -
Code analysis for temporal predictability
Gustafsson, J.; Lisper, B.; Kirner, Raimund; Puschner, P. (2006-03)The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be computable. We conceived a programming strategy ... -
Coding Scheme for Negative Utterances
Foerster, Frank (2018-07-31)This document contains an abbreviated version of a coding scheme employed for the pragmatic 2-coder analysis of negation types and their felicity. It was used for the coding of negative utterances originating from human-robot ... -
The collection, analysis and exploitation of footballer attributes: A systematic review
Wakelam, Ed; Steuber, Volker; Wakelam, James (2022-03-11)There is growing on-going research into how footballer attributes, collected prior to, during and post-match, may address the demands of clubs, media pundits and gaming developers. Focusing upon individual player performance ... -
Colorless FDMA-PON with flexible bandwidth allocation and colorless, low-speed ONUs [invited]
Schindler, P. C.; Schmogrow, R.; Dreschmann, M.; Meyer, J.; Tomkos, Ioannis; Prat, J.; Krimmel, H-G.; Pfeiffer, T.; Kourtessis, Pandelis; Ludwig, A.; Karnick, D.; Hillerkuss, D.; Becker, J.; Koos, C.; Freude, W.; Leuthold, J. (2013-10)We demonstrate a remotely seeded flexible passive optical network (PON) with multiple low-speed subscribers but only a single optical line terminal transceiver operating at a data rate of 31.25 Gbits/s. The scheme is based ... -
Coloured Velvet is Too Gaudy: The 1861 Reforms to the Academical Costume of the University of London
Christianson, Bruce (2022-10-08)The University of London’s original system of academic dress was adopted by the Senate in 1844, and made extensive use of velvet on both gowns and hoods. In 1861 London adopted a radically new system, which eliminated the ... -
The combined effect of homeostatic structural and inhibitory synaptic plasticity during the repair of balanced networks following deafferentation
Sinha, Ankur; Metzner, Christoph; Adams, Roderick; Davey, Neil; Schmuker, Michael; Steuber, Volker (2018-10-29)Although a number of previous experimental and theoretical studies have investigated network reorganisation following deafferentation down to the level of synaptic elements [4], the mechanisms that are involved in this ...