- UHRA Home
- Browsing by Author
Browsing by Author "Centre for Computer Science and Informatics Research"
Now showing items 221-240 of 1210
-
The Correspondence Problem in Social Learning:--What Does it Mean for Behaviors to Match Anyway
Nehaniv, C.L.; Dautenhahn, K. (2002) -
The Cost and Benefits of Coordination Programming: Two Case Studies in Concurrent Collection and S-Net
Zaichenkov, Pavel; Gijsbers, Bert; Grelck, Clemens; Tveretina, Olga; Shafarenko, Alex (2016-09-21)This is an evaluation study of the expressiveness provided and the performance delivered by the coordination language S-NET in comparison to Intel’s Concurrent Collections (CnC). An S-NET application is a network of black-box ... -
Coverage Probability of Cell-Free Massive MIMO Systems
Papazafeiropoulos, A. K.; Kourtessis, P.; Renzo, M. DI; Chatzinotas, S.; Senior, J. M. (Institute of Electrical and Electronics Engineers (IEEE), 2020-12-04)Despite that ongoing and future networks become denser and increasingly irregular, prior works in the area of cell-free (CF) massive multiple-input-multiple-output (mMIMO) systems relied on the strong assumption of uniformly ... -
Coverage Probability of STAR-RIS assisted Massive MIMO systems with Correlation and Phase Errors
Papazafeiropoulos, Anastasios; Abdullah, Zaid; Kourtessis, Pandelis; Kisseleff, Steven; Krikidis, Ioannis (2022-06-01)In this letter, we investigate a simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisting a massive multiple-input multiple-output (mMIMO) system. In particular, we derive a closed-form ... -
Creating multimedia learning applications in a further education environment
Barker, T.; Jones, S.; Britton, C.; Messer, D.J. (University of Hertfordshire, 1997)This report describes the development of a large multimedia learning application within a Further Education environment. It looks primarily at the underlying processes used in the design, implementation and evaluation. The ... -
Creating, documenting and sharing network models
Crook, Sharon M.; Bednar, James A.; Berger, Sandra; Cannon, Robert; Davison, Andrew P.; Djurfeldt, Mikael; Eppler, Jochen; Kriener, Birgit; Furber, Steve; Graham, Bruce; Plesser, Hans E.; Schwabe, Lars; Smith, Leslie; Steuber, Volker; van Albada, Sacha (2012-12)As computational neuroscience matures, many simulation environments are available that are useful for neuronal network modeling. However, methods for successfully documenting models for publication and for exchanging models ... -
The creation of task-based differentiated learning materials for students with learning difficulties and/or disabilities
Barker, T.; Jones, S.; Britton, C. (University of Hertfordshire, 1997)Horizon is a European funded project whose aim is to increase employment opportunities for students with disabilities or learning difficulties. A working cafe/ restaurant (Cafe Horizon) has been established in East London, ... -
Critical Infrastructure Cybersecurity : A Review of Recent Threats and Violations
Abouzakhar, Nasser (2013-07-12)Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increase in the online services and operations for various industries has led to an increase in different security ... -
Cross-criticality Interfaces for Cyber-physical Systems
Maurer, Simon; Kirner, Raimund (2015-06)Cyber-physical systems (CPS) are typically sys- tems with services of mixed criticality. For different criticali- ties of systems, different progress models and communication types have been developed, depending whether ... -
Cross-platform verification framework for embedded systems
Wenzel, Ingomar; Kirner, Raimund; Rieder, Bernhard; Puschner, Peter (Springer Nature, 2007-09)Many innovations in the automotive sector involve complex electronics and embedded software systems. Testing techniques are one of the key methodologies for detecting faults in such embedded systems.In this paper, a novel ... -
CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms
Saini, Anish; Tsokanos, Athanasios; Kirner, Raimund (2023-07-30)In a cryptosystem, a cipher's security is directly dependent on a key-schedule or key-scheduling algorithm (KSA) or that is used for both encryption and decryption. The random-number-based KSA adds another layer of security ... -
CSP duality and trees of bounded pathwidth
Carvalho, Catarina; Dalmau, Víctor; Krokhin, Andrei (2010)We study non-uniform constraint satisfaction problems definable in monadic Datalog stratified by the use of non-linearity. We show how such problems can be described in terms of homomorphism dualities involving trees of ... -
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things
Adewuyi, Anuoluwapo A.; Cheng, Hui; Shi, Qi; Cao, Jiannong; MacDermott, Áine; Wang, Xingwei (2019-06-01)Security through trust presents a viable solution for threat management in the Internet of Things (IoT). Currently, a well-defined trust management framework for collaborative applications on the IoT platform does not ... -
Customer Churn Prediction in Telecom Sector: A Survey and way a head
AlShourbaji, Ibrahim; Helian, Na; Sun, Yi; Alhameed, Mohammed (2021-01-01)The telecommunication (telecom)industry is a highly technological domain has rapidly developed over the previous decades as a result of the commercial success in mobile communication and the internet. Due to the strong ... -
DConfusion: A technique to allow cross study performance evaluation of fault prediction studies.
Bowes, David; Hall, Tracy; Gray, David (2014-04)There are many hundreds of fault prediction models published in the literature. The predictive performance of these models is often reported using a variety of different measures. Most performance measures are not directly ... -
De-motivators Of Software Process Improvement : An Analysis Of Practitioners' Views
Baddoo, N.; Hall, T. (2003)We present a study of software practitioners’ de-motivators for software process improvement (SPI). The aim of this study is to understand the nature of the issues that de-motivate software practitioners for SPI, so that ... -
A Decentralized Agent-Based Platform for Automated Trade and its Simulation
Kutschinski, E.; Polani, D.; Uthmann, T. (Society for Computational Economics, 2000) -
Decoding of Purkinje cell pauses by deep cerebellar nucleus neurons
Luthman, Johannes; Adams, Roderick; Davey, N.; Maex, Reinoud; Steuber, Volker (BioMed Central (BMC), 2009)The recognition of parallel fibre (PF) input patterns by Purkinje cells has been suggested to underlie cerebellar learning [1,2]. A candidate mechanism for the recognition of PF patterns is the long-term depression (LTD) ... -
Decoding the amplitude and slope of continuous signals into spikes with a spiking point neuron model
Miko, Rebecca; Scheunemann, Marcus; Steuber, Volker; Schmuker, Michael (BioRxiv, 2024-05-20)In this study, we harness the signal processing potential of neurons, utilizing the Izhikevich point neuron model to efficiently decode the slope or amplitude of fluctuating continuous input signals. Using biophysically ... -
Decoupled Sampling-Based Motion Planning for Multiple Autonomous Marine Vehicles
Catenacci Volpi, Nicola; Smith, Simón C.; Pascoal, António; Simetti, Enrico; Turetta, Alessio; Alibani, Michael; Polani, Daniel (2018-10-26)There is increasing interest in the deployment and operation of multiple autonomous marine vehicles (AMVs) for a number of challenging scientific and commercial operational mission scenarios. Some of the missions, such as ...