Publication
Number of items: 108.
None
  • Optimising a Neural Tree Using Subtree Retraining. (2004) W. Pensuwon, R.G. Adams and N. Davey
  • Preventing Bluff Agent Invasions in Honest Societies. (2003) R. Lowe and D. Polani
  • Concurrent non-deferred reference counting on the microgrid : first experiences. (2011) Stephan Herhut, C. Joslin, Sven-Bodo Scholz, R Poss and Clemens Grelck
  • Cognitive Dimensions of Notations: Design Tools for Cognitive Technology. (2001) A.F. Blackwell, C. Britton, A. Cox, T. Green, C. Gurr, G. Kadoda, M. Kutar, M.J. Loomes, C.L. Nehaniv, M. Petre, C. Roast, C. Roe, A. Wong and R.M. Young
  • Towards Computational Neural Systems through Developmental Evolution. (2001) A.G. Rust, R.G. Adams, S. George and H. Bolouri
  • I know what I did last summer: autobiographic memory in synthetic characters. (2007) J. Dias, W.C. Ho, T. Vogt, N. Beeckman, A. Paiva and E. Andre
  • Robots that say 'no'. (2011) F. Förster, C.L. Nehaniv and J. Saunders
  • Correcting Errors in Optical Data Transmission Using Neural Networks. (2010) S. Hunt, Yi. Sun, A. Shafarenko, R.G. Adams, N. Davey, B. Slater, R. Bhamber, S. Boscolo and S.K. Turitsyn
  • Vintage bit cryptography. (Transcript of discussion). (2009) A. Shafarenko
  • The application of the flexilevel approach for the assessment of computer science undergraduates. (2009) Mariana Lilley and A. Pyper
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • The influence of social interaction on the perception of emotional expression : A case study with a robot head. (2009) John C. Murray, Lola Cañamero, Kim A. Bard, Marina Davila Ross and Kate Thorsteinsson
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Where have all the protocols gone? (2005) B. Christianson
  • Evolving Embodied Genetic Regulatory Network-driven Control Systems. (2003) T. Quick, C.L. Nehaniv, K. Dautenhahn and G. Roberts
  • The Cognitive Dimensions of an Artifact vis-a-vis Individual Human Users : Studies with Notations for the Temporal. (2001) M. Kutar, C.L. Nehaniv, C. Britton and S. Jones
  • The Second Person — Meaning and Metaphors. (1999) C.L. Nehaniv
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • Symbiotic expressions. (2011) R. Bernecky, S. Herhut and S. Scholz
  • The sense of security and a countermeasure for the false sense (transcript of discussion). (2011) J. Malcolm
  • Construction of an Internal Predictive Model by Event Anticipation. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • The Robot in the Swarm : An Investigation into Agent Embodiment within Virtual Robotic Swarms. (2003) A. Newton, C.L. Nehaniv and K. Dautenhahn
  • Specifying Multiple Time Granularities in Interactive Systems. (2001) M. Kutar, C. Britton and C.L. Nehaniv
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Fact and Artifact : Reification and Drift in the History and Growth of Interactive Software Systems. (2001) M.J. Loomes and C.L. Nehaniv
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson
  • Grounding Action-Selection in Event-Based Anticipation. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • How Information and Embodiment Shape Intelligent Information Processing. (2007) D. Polani, O. Sporns and M. Lungarella
  • The Narrative Intelligence Hypothesis: In Search of the Transactional Format of Narratives in Humans and Other Social Animals. (2001) K. Dautenhahn
  • Interactional Structure Applied to the Identification and Interpretation of Visual Interactive Behaviour : Robots that (Usually) Follow the Rules. (2001) B. Ogden and K. Dautenhahn
  • A computer adaptive test that facilitates the modification of previously entered responses : An empirical study. (2004) Mariana Lilley and T. Barker
  • Numerical simulations of unsteady shock wave interactions using SAC and Fortran-90. (2009) D. Rolls, C. Joslin, A. Kudryavtsev, S. Scholz and A. Shafarenko
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • The metaplace security model (transcript of discussion). (2011) M. Roe
  • Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns. (2016) Priori, Giseli de Sousa, Mauro Roisenberg, Chris Stopford, Evelyn Hesse, Neil Davey and Yi Sun
  • Constructing the Basic Umwelt of Artificial Agents: An Information-Theoretic Approach. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • Developing play scenarios for tactile interaction with a humanoid robot : A case study exploration with children with autism. (2010) B. Robins and K. Dautenhahn
  • The metaplace security model. (2011) Michael Roe
  • Public
  • Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011) T. Anthony, D. Polani and C.L. Nehaniv
  • Children interpretation of emotional body language displayed by a robot. (2011) A. Beck, Lola Cañamero, L. Damiano, G. Sommavilla, F. Tesser and P. Cosi
  • Connection Strategies in Associative Memory Models. (2009) W. Chen, R. Maex, R.G. Adams, L. Calcraft, Volker Steuber and N. Davey
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The capacity and attractor basins of associative memory models. (1999) N. Davey and S. Hunt
  • TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006) M. Davis, K. Dautenhahn, C.L. Nehaniv and S.D. Powell
  • Cached Two-Level Adaptive Branch Predictors with Multiple Stages. (2002) C. Egan, G.B. Steven and L. Vintan
  • Algebraic hierarchical decomposition of finite state automata : comparison of implementations for Krohn-Rhodes Theory. (2005) Attila Egri-Nagy and C.L. Nehaniv
  • Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003) Attila Egri-Nagy and C.L. Nehaniv
  • Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006) Attila Egri-Nagy and C.L. Nehaniv
  • Philosophical conceptions of information. (2009) L. Floridi
  • Unbiased Branches: An Open Problem. (2007) A. Gellert, A. Florea, M. Vintan, C. Egan and L. Vintan
  • How to Do Philosophy Informationally. (2005) G.M. Greco, G. Paronitti, M. Turilli and L. Floridi
  • Implementation architecture and multithreaded runtime system of S-Net. (2011) Clemens Grelck and Frank Penczek
  • Designing empathic agents : adults versus kids. (2004) L. Hall, Sarah Woods, K. Dautenhahn, D. Sobral, A. Paiva, D. Wolke and L. Newall
  • Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010) A. Hiolle, Lola Cañamero, P. Andry, A. Blanchard and P. Gaussier
  • Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009) W.C. Ho and K. Dautenhahn
  • Towards a Narrative Mind: The Creation of Coherent Life Stories for Believable Virtual Agents. (2008) W.C. Ho and K. Dautenhahn
  • Comparing different control architectures for autobiographical agents in static virtual environments. (2003) W.C. Ho, K. Dautenhahn and C.L. Nehaniv
  • Autobiographic knowledge for believable virtual characters. (2006) W.C. Ho and S. Watson
  • Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006) T. Jung and D. Polani
  • All Else Being Equal Be Empowered. (2005) A.S. Klyubin, D. Polani and C.L. Nehaniv
  • Discovering predictive variables when evolving cognitive models. (2005) P.C.R. Lane and F. Gobet
  • Attention Mechanisms in the CHREST Cognitive Architecture. (2009) P.C.R. Lane, F. Gobet and R.L. Smith
  • Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007) C. Lyon, C.L. Nehaniv, J. Baillie and S. Warren
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Communication as an Emergent Metaphor for Neuronal Operation. (1999) S.J. Nasuto, K. Dautenhahn and J. M. Bishop
  • Self-replication, Evolvability and Asynchronicity in Stochastic Worlds. (2005) C.L. Nehaniv
  • Origins of scaling in genetic code. (2011) O. Obst, D. Polani and M. Prokopenko
  • Interactional Structure Applied to the Identification and Generation of Visual Interactive Behavior: Robots that (Usually) Follow the Rules. (2002) B. Ogden, K. Dautenhahn and P. Stribling
  • Adaptive Olfactory Encoding in Agents Controlled by Spiking Neural Networks. (2008) N. Oros, Volker Steuber, N. Davey, L. Canamero and R.G. Adams
  • Emergence of Genetic Coding: an Information-theoretic Model. (2007) M. Piraveenan, D. Polani and M. Prokopenko
  • Measuring self-organization via observers. (2003) D. Polani
  • On a Quantitative Measure for Modularity Based on Information Theory. (2005) D. Polani, P. Dauscher and T. Uthmann
  • An Information-Theoretic Approach for the Quantification of Relevance. (2001) D. Polani, T. Martinetz and J.T. Kim
  • A modular attractor model of semantic access. (1999) W. Power, R. Frank, D.J. Done and N. Davey
  • Optimizing Potential Information Transfer with Self-referential Memory. (2006) M. Prokopenko, D. Polani and P. Wang
  • On Bots and Bacteria: Ontology Independent Embodiment. (1999) T. Quick, K. Dautenhahn, C.L. Nehaniv and G. Roberts
  • The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003) F.M. Richardson, N. Davey, L. Peters, D.J. Done and S. Anthony
  • Identifying binding sites in sequential genomic data. (2007) M. Robinson, C. Gonzalez Castellano, R.G. Adams, N. Davey and Yi. Sun
  • Using Existing Website Ontologies to Assist Navigation and Exploration. (2005) G. Saward, M. Shah and T. Hall
  • Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines. (2008) Yi. Sun, M. Robinson, R.G. Adams, A.G. Rust and N. Davey
  • Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011) D.S. Syrdal, K. Dautenhahn, T. Nomura and H. Hirai
  • Analysis of human motion using snakes and neural networks. (2000) Ken Tabb, S. George, N. Davey and R.G. Adams
  • Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001) P. Tino, I. Nabney and Yi. Sun
  • An Open Source Simulation Model of Software Development and Testing. (2007) S. Ur, E. Yom-Tov and P. Wernick
  • Understanding prediction limits through unbiased branches. (2006) L. Vintan, A. Gellert, A. Florea, M. Oancea and C. Egan
  • Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001) I. Werry, K. Dautenhahn, B. Ogden and W. Harwin
  • Animated characters in bullying intervention. (2003) Sarah Woods, L. Hall, D. Sobral, K. Dautenhahn and D. Wolke
  • The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009) G. de Sousa, R.G. Adams, N. Davey, R. Maex and Volker Steuber
  • Hierarchical behaviours : getting the most bang for your bit. (2011) S. van Dijk, D. Polani and C.L. Nehaniv
  • Restricted
  • On Maltsev digraphs. (2011) Catarina Carvalho, L. Egri, M. Jackson and T. Niven
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Effect of using varying negative examples in transcription factor binding site predictions. (2011) Faisal Rezwan, Yi Sun, N. Davey, Roderick Adams, A.G. Rust and M. Robinson
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson