Publication
Number of items: 108.
None
Optimising a Neural Tree Using Subtree Retraining. (2004)
W. Pensuwon,
R.G. Adams
and
N. Davey
Preventing Bluff Agent Invasions in Honest Societies. (2003)
R. Lowe
and
D. Polani
Concurrent non-deferred reference counting on the microgrid : first experiences. (2011)
Stephan Herhut,
C. Joslin,
Sven-Bodo Scholz,
R Poss
and
Clemens Grelck
Cognitive Dimensions of Notations: Design Tools for Cognitive Technology. (2001)
A.F. Blackwell,
C. Britton,
A. Cox,
T. Green,
C. Gurr,
G. Kadoda,
M. Kutar,
M.J. Loomes,
C.L. Nehaniv,
M. Petre,
C. Roast,
C. Roe,
A. Wong
and
R.M. Young
Towards Computational Neural Systems through Developmental Evolution. (2001)
A.G. Rust,
R.G. Adams,
S. George
and
H. Bolouri
I know what I did last summer: autobiographic memory in synthetic characters. (2007)
J. Dias,
W.C. Ho,
T. Vogt,
N. Beeckman,
A. Paiva
and
E. Andre
Robots that say 'no'. (2011)
F. Förster,
C.L. Nehaniv
and
J. Saunders
Correcting Errors in Optical Data Transmission Using Neural Networks. (2010)
S. Hunt,
Yi. Sun,
A. Shafarenko,
R.G. Adams,
N. Davey,
B. Slater,
R. Bhamber,
S. Boscolo
and
S.K. Turitsyn
Vintage bit cryptography. (Transcript of discussion). (2009)
A. Shafarenko
The application of the flexilevel approach for the assessment of computer science undergraduates. (2009)
Mariana Lilley
and
A. Pyper
The system likes you : (transcript of discussion). (2007)
B. Christianson
The influence of social interaction on the perception of emotional expression : A case study with a robot head. (2009)
John C. Murray,
Lola Cañamero,
Kim A. Bard,
Marina Davila Ross
and
Kate Thorsteinsson
“Fair” Authentication in Pervasive Computing. (2006)
B. Christianson,
J. Li
and
M. Loomes
Where have all the protocols gone? (2005)
B. Christianson
Evolving Embodied Genetic Regulatory Network-driven Control Systems. (2003)
T. Quick,
C.L. Nehaniv,
K. Dautenhahn
and
G. Roberts
The Cognitive Dimensions of an Artifact vis-a-vis Individual Human Users : Studies with Notations for the Temporal. (2001)
M. Kutar,
C.L. Nehaniv,
C. Britton
and
S. Jones
The Second Person — Meaning and Metaphors. (1999)
C.L. Nehaniv
Concluding discussion - When does confidentiality harm security? (2002)
B. Christianson,
T Aura,
D Wheeler,
W Harbison,
V Gligor,
L Paulson,
M Blaze
and
J Ioannidis
Symbiotic expressions. (2011)
R. Bernecky,
S. Herhut
and
S. Scholz
The sense of security and a countermeasure for the false sense (transcript of discussion). (2011)
J. Malcolm
Construction of an Internal Predictive Model by Event Anticipation. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
The Robot in the Swarm : An Investigation into Agent Embodiment within Virtual Robotic Swarms. (2003)
A. Newton,
C.L. Nehaniv
and
K. Dautenhahn
Specifying Multiple Time Granularities in Interactive Systems. (2001)
M. Kutar,
C. Britton
and
C.L. Nehaniv
Formal Systems, Not Methods. (2004)
M. Loomes,
B. Christianson
and
N. Davey
Anonymous Context Based Role Activation Mechanism. (2005)
P. Das Chowdhury,
B. Christianson
and
J. Malcolm
Fact and Artifact : Reification and Drift in the History and Growth of Interactive Software Systems. (2001)
M.J. Loomes
and
C.L. Nehaniv
Auditable Anonymous Delegation. (2005)
B. Christianson,
P. Das Chowdhury
and
J. Malcolm
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003)
B. Christianson
and
J.F. Snook
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Pictures Can’t Lie under Oath. (2000)
B. Christianson,
J. Malcolm
and
B. Robinson
Security protocol deployment risk : (transcript of discussion). (2011)
B. Christianson
Grounding Action-Selection in Event-Based Anticipation. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
How Information and Embodiment Shape Intelligent Information Processing. (2007)
D. Polani,
O. Sporns
and
M. Lungarella
The Narrative Intelligence Hypothesis: In Search of the Transactional Format of Narratives in Humans and Other Social Animals. (2001)
K. Dautenhahn
Interactional Structure Applied to the Identification and Interpretation of Visual Interactive Behaviour : Robots that (Usually) Follow the Rules. (2001)
B. Ogden
and
K. Dautenhahn
A computer adaptive test that facilitates the modification of previously entered responses : An empirical study. (2004)
Mariana Lilley
and
T. Barker
Numerical simulations of unsteady shock wave interactions using SAC and Fortran-90. (2009)
D. Rolls,
C. Joslin,
A. Kudryavtsev,
S. Scholz
and
A. Shafarenko
When is a protocol broken? (Transcript of discussion). (2010)
B. Christianson
The metaplace security model (transcript of discussion). (2011)
M. Roe
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns. (2016)
Priori,
Giseli de Sousa,
Mauro Roisenberg,
Chris Stopford,
Evelyn Hesse,
Neil Davey
and
Yi Sun
Constructing the Basic Umwelt of Artificial Agents: An Information-Theoretic Approach. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
Delegation and not-so smart cards. (1999)
B. Christianson
and
J. Malcolm
Remodelling the attacker : (transcript of discussion). (2011)
B. Christianson
Developing play scenarios for tactile interaction with a humanoid robot : A case study exploration with children with autism. (2010)
B. Robins
and
K. Dautenhahn
The metaplace security model. (2011)
Michael Roe
Public
Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011)
T. Anthony,
D. Polani
and
C.L. Nehaniv
Children interpretation of emotional body language displayed by a robot. (2011)
A. Beck,
Lola Cañamero,
L. Damiano,
G. Sommavilla,
F. Tesser
and
P. Cosi
Connection Strategies in Associative Memory Models. (2009)
W. Chen,
R. Maex,
R.G. Adams,
L. Calcraft,
Volker Steuber
and
N. Davey
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
Why isn't trust transitive? (1997)
B. Christianson
and
W.S. Harbison
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Secure Sessions from Weak Secrets. (2005)
B. Christianson,
M. Roe
and
D. Wheeler
Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002)
B. Christianson
and
D. Wheeler
The capacity and attractor basins of associative memory models. (1999)
N. Davey
and
S. Hunt
TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006)
M. Davis,
K. Dautenhahn,
C.L. Nehaniv
and
S.D. Powell
Cached Two-Level Adaptive Branch Predictors with Multiple Stages. (2002)
C. Egan,
G.B. Steven
and
L. Vintan
Algebraic hierarchical decomposition of finite state automata : comparison of implementations for Krohn-Rhodes Theory. (2005)
Attila Egri-Nagy
and
C.L. Nehaniv
Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003)
Attila Egri-Nagy
and
C.L. Nehaniv
Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006)
Attila Egri-Nagy
and
C.L. Nehaniv
Philosophical conceptions of information. (2009)
L. Floridi
Unbiased Branches: An Open Problem. (2007)
A. Gellert,
A. Florea,
M. Vintan,
C. Egan
and
L. Vintan
How to Do Philosophy Informationally. (2005)
G.M. Greco,
G. Paronitti,
M. Turilli
and
L. Floridi
Implementation architecture and multithreaded runtime system of S-Net. (2011)
Clemens Grelck
and
Frank Penczek
Designing empathic agents : adults versus kids. (2004)
L. Hall,
Sarah Woods,
K. Dautenhahn,
D. Sobral,
A. Paiva,
D. Wolke
and
L. Newall
Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010)
A. Hiolle,
Lola Cañamero,
P. Andry,
A. Blanchard
and
P. Gaussier
Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009)
W.C. Ho
and
K. Dautenhahn
Towards a Narrative Mind: The Creation of Coherent Life Stories for Believable Virtual Agents. (2008)
W.C. Ho
and
K. Dautenhahn
Comparing different control architectures for autobiographical agents in static virtual environments. (2003)
W.C. Ho,
K. Dautenhahn
and
C.L. Nehaniv
Autobiographic knowledge for believable virtual characters. (2006)
W.C. Ho
and
S. Watson
Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006)
T. Jung
and
D. Polani
All Else Being Equal Be Empowered. (2005)
A.S. Klyubin,
D. Polani
and
C.L. Nehaniv
Discovering predictive variables when evolving cognitive models. (2005)
P.C.R. Lane
and
F. Gobet
Attention Mechanisms in the CHREST Cognitive Architecture. (2009)
P.C.R. Lane,
F. Gobet
and
R.L. Smith
Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007)
C. Lyon,
C.L. Nehaniv,
J. Baillie
and
S. Warren
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
Communication as an Emergent Metaphor for Neuronal Operation. (1999)
S.J. Nasuto,
K. Dautenhahn
and
J. M. Bishop
Self-replication, Evolvability and Asynchronicity in Stochastic Worlds. (2005)
C.L. Nehaniv
Origins of scaling in genetic code. (2011)
O. Obst,
D. Polani
and
M. Prokopenko
Interactional Structure Applied to the Identification and Generation of Visual Interactive Behavior: Robots that (Usually) Follow the Rules. (2002)
B. Ogden,
K. Dautenhahn
and
P. Stribling
Adaptive Olfactory Encoding in Agents Controlled by Spiking Neural Networks. (2008)
N. Oros,
Volker Steuber,
N. Davey,
L. Canamero
and
R.G. Adams
Emergence of Genetic Coding: an Information-theoretic Model. (2007)
M. Piraveenan,
D. Polani
and
M. Prokopenko
Measuring self-organization via observers. (2003)
D. Polani
On a Quantitative Measure for Modularity Based on Information Theory. (2005)
D. Polani,
P. Dauscher
and
T. Uthmann
An Information-Theoretic Approach for the Quantification of Relevance. (2001)
D. Polani,
T. Martinetz
and
J.T. Kim
A modular attractor model of semantic access. (1999)
W. Power,
R. Frank,
D.J. Done
and
N. Davey
Optimizing Potential Information Transfer with Self-referential Memory. (2006)
M. Prokopenko,
D. Polani
and
P. Wang
On Bots and Bacteria: Ontology Independent Embodiment. (1999)
T. Quick,
K. Dautenhahn,
C.L. Nehaniv
and
G. Roberts
The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003)
F.M. Richardson,
N. Davey,
L. Peters,
D.J. Done
and
S. Anthony
Identifying binding sites in sequential genomic data. (2007)
M. Robinson,
C. Gonzalez Castellano,
R.G. Adams,
N. Davey
and
Yi. Sun
Using Existing Website Ontologies to Assist Navigation and Exploration. (2005)
G. Saward,
M. Shah
and
T. Hall
Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines. (2008)
Yi. Sun,
M. Robinson,
R.G. Adams,
A.G. Rust
and
N. Davey
Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011)
D.S. Syrdal,
K. Dautenhahn,
T. Nomura
and
H. Hirai
Analysis of human motion using snakes and neural networks. (2000)
Ken Tabb,
S. George,
N. Davey
and
R.G. Adams
Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001)
P. Tino,
I. Nabney
and
Yi. Sun
An Open Source Simulation Model of Software Development and Testing. (2007)
S. Ur,
E. Yom-Tov
and
P. Wernick
Understanding prediction limits through unbiased branches. (2006)
L. Vintan,
A. Gellert,
A. Florea,
M. Oancea
and
C. Egan
Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001)
I. Werry,
K. Dautenhahn,
B. Ogden
and
W. Harwin
Animated characters in bullying intervention. (2003)
Sarah Woods,
L. Hall,
D. Sobral,
K. Dautenhahn
and
D. Wolke
The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009)
G. de Sousa,
R.G. Adams,
N. Davey,
R. Maex
and
Volker Steuber
Hierarchical behaviours : getting the most bang for your bit. (2011)
S. van Dijk,
D. Polani
and
C.L. Nehaniv
Restricted
On Maltsev digraphs. (2011)
Catarina Carvalho,
L. Egri,
M. Jackson
and
T. Niven
Vintage Bit Cryptography. (2009)
B. Christianson
and
A. Shafarenko
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
Effect of using varying negative examples in transcription factor binding site predictions. (2011)
Faisal Rezwan,
Yi Sun,
N. Davey,
Roderick Adams,
A.G. Rust
and
M. Robinson
Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008)
A. Shenoy,
T.M. Gale,
N. Davey,
B. Christianson
and
R. Frank
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson