Publication
Number of items: 108.
2011
Concurrent non-deferred reference counting on the microgrid : first experiences. (2011)
Stephan Herhut,
C. Joslin,
Sven-Bodo Scholz,
R Poss
and
Clemens Grelck
Symbiotic expressions. (2011)
R. Bernecky,
S. Herhut
and
S. Scholz
The sense of security and a countermeasure for the false sense (transcript of discussion). (2011)
J. Malcolm
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Security protocol deployment risk : (transcript of discussion). (2011)
B. Christianson
The metaplace security model (transcript of discussion). (2011)
M. Roe
Remodelling the attacker : (transcript of discussion). (2011)
B. Christianson
The metaplace security model. (2011)
Michael Roe
Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011)
T. Anthony,
D. Polani
and
C.L. Nehaniv
Children interpretation of emotional body language displayed by a robot. (2011)
A. Beck,
Lola Cañamero,
L. Damiano,
G. Sommavilla,
F. Tesser
and
P. Cosi
On Maltsev digraphs. (2011)
Catarina Carvalho,
L. Egri,
M. Jackson
and
T. Niven
Implementation architecture and multithreaded runtime system of S-Net. (2011)
Clemens Grelck
and
Frank Penczek
Origins of scaling in genetic code. (2011)
O. Obst,
D. Polani
and
M. Prokopenko
Effect of using varying negative examples in transcription factor binding site predictions. (2011)
Faisal Rezwan,
Yi Sun,
N. Davey,
Roderick Adams,
A.G. Rust
and
M. Robinson
Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011)
D.S. Syrdal,
K. Dautenhahn,
T. Nomura
and
H. Hirai
Hierarchical behaviours : getting the most bang for your bit. (2011)
S. van Dijk,
D. Polani
and
C.L. Nehaniv
2010
Correcting Errors in Optical Data Transmission Using Neural Networks. (2010)
S. Hunt,
Yi. Sun,
A. Shafarenko,
R.G. Adams,
N. Davey,
B. Slater,
R. Bhamber,
S. Boscolo
and
S.K. Turitsyn
When is a protocol broken? (Transcript of discussion). (2010)
B. Christianson
Developing play scenarios for tactile interaction with a humanoid robot : A case study exploration with children with autism. (2010)
B. Robins
and
K. Dautenhahn
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010)
A. Hiolle,
Lola Cañamero,
P. Andry,
A. Blanchard
and
P. Gaussier
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson
2009
Vintage bit cryptography. (Transcript of discussion). (2009)
A. Shafarenko
The application of the flexilevel approach for the assessment of computer science undergraduates. (2009)
Mariana Lilley
and
A. Pyper
The influence of social interaction on the perception of emotional expression : A case study with a robot head. (2009)
John C. Murray,
Lola Cañamero,
Kim A. Bard,
Marina Davila Ross
and
Kate Thorsteinsson
Numerical simulations of unsteady shock wave interactions using SAC and Fortran-90. (2009)
D. Rolls,
C. Joslin,
A. Kudryavtsev,
S. Scholz
and
A. Shafarenko
Connection Strategies in Associative Memory Models. (2009)
W. Chen,
R. Maex,
R.G. Adams,
L. Calcraft,
Volker Steuber
and
N. Davey
Vintage Bit Cryptography. (2009)
B. Christianson
and
A. Shafarenko
Philosophical conceptions of information. (2009)
L. Floridi
Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009)
W.C. Ho
and
K. Dautenhahn
Attention Mechanisms in the CHREST Cognitive Architecture. (2009)
P.C.R. Lane,
F. Gobet
and
R.L. Smith
The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009)
G. de Sousa,
R.G. Adams,
N. Davey,
R. Maex
and
Volker Steuber
2007
I know what I did last summer: autobiographic memory in synthetic characters. (2007)
J. Dias,
W.C. Ho,
T. Vogt,
N. Beeckman,
A. Paiva
and
E. Andre
The system likes you : (transcript of discussion). (2007)
B. Christianson
Construction of an Internal Predictive Model by Event Anticipation. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
Grounding Action-Selection in Event-Based Anticipation. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
How Information and Embodiment Shape Intelligent Information Processing. (2007)
D. Polani,
O. Sporns
and
M. Lungarella
Constructing the Basic Umwelt of Artificial Agents: An Information-Theoretic Approach. (2007)
P. Capdepuy,
D. Polani
and
C.L. Nehaniv
Unbiased Branches: An Open Problem. (2007)
A. Gellert,
A. Florea,
M. Vintan,
C. Egan
and
L. Vintan
Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007)
C. Lyon,
C.L. Nehaniv,
J. Baillie
and
S. Warren
Emergence of Genetic Coding: an Information-theoretic Model. (2007)
M. Piraveenan,
D. Polani
and
M. Prokopenko
Identifying binding sites in sequential genomic data. (2007)
M. Robinson,
C. Gonzalez Castellano,
R.G. Adams,
N. Davey
and
Yi. Sun
An Open Source Simulation Model of Software Development and Testing. (2007)
S. Ur,
E. Yom-Tov
and
P. Wernick
2006
“Fair” Authentication in Pervasive Computing. (2006)
B. Christianson,
J. Li
and
M. Loomes
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006)
M. Davis,
K. Dautenhahn,
C.L. Nehaniv
and
S.D. Powell
Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006)
Attila Egri-Nagy
and
C.L. Nehaniv
Autobiographic knowledge for believable virtual characters. (2006)
W.C. Ho
and
S. Watson
Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006)
T. Jung
and
D. Polani
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
Optimizing Potential Information Transfer with Self-referential Memory. (2006)
M. Prokopenko,
D. Polani
and
P. Wang
Understanding prediction limits through unbiased branches. (2006)
L. Vintan,
A. Gellert,
A. Florea,
M. Oancea
and
C. Egan
2003
Preventing Bluff Agent Invasions in Honest Societies. (2003)
R. Lowe
and
D. Polani
Evolving Embodied Genetic Regulatory Network-driven Control Systems. (2003)
T. Quick,
C.L. Nehaniv,
K. Dautenhahn
and
G. Roberts
The Robot in the Swarm : An Investigation into Agent Embodiment within Virtual Robotic Swarms. (2003)
A. Newton,
C.L. Nehaniv
and
K. Dautenhahn
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003)
B. Christianson
and
J.F. Snook
Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003)
Attila Egri-Nagy
and
C.L. Nehaniv
Comparing different control architectures for autobiographical agents in static virtual environments. (2003)
W.C. Ho,
K. Dautenhahn
and
C.L. Nehaniv
Measuring self-organization via observers. (2003)
D. Polani
The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003)
F.M. Richardson,
N. Davey,
L. Peters,
D.J. Done
and
S. Anthony
Animated characters in bullying intervention. (2003)
Sarah Woods,
L. Hall,
D. Sobral,
K. Dautenhahn
and
D. Wolke
2001
Cognitive Dimensions of Notations: Design Tools for Cognitive Technology. (2001)
A.F. Blackwell,
C. Britton,
A. Cox,
T. Green,
C. Gurr,
G. Kadoda,
M. Kutar,
M.J. Loomes,
C.L. Nehaniv,
M. Petre,
C. Roast,
C. Roe,
A. Wong
and
R.M. Young
Towards Computational Neural Systems through Developmental Evolution. (2001)
A.G. Rust,
R.G. Adams,
S. George
and
H. Bolouri
The Cognitive Dimensions of an Artifact vis-a-vis Individual Human Users : Studies with Notations for the Temporal. (2001)
M. Kutar,
C.L. Nehaniv,
C. Britton
and
S. Jones
Specifying Multiple Time Granularities in Interactive Systems. (2001)
M. Kutar,
C. Britton
and
C.L. Nehaniv
Fact and Artifact : Reification and Drift in the History and Growth of Interactive Software Systems. (2001)
M.J. Loomes
and
C.L. Nehaniv
The Narrative Intelligence Hypothesis: In Search of the Transactional Format of Narratives in Humans and Other Social Animals. (2001)
K. Dautenhahn
Interactional Structure Applied to the Identification and Interpretation of Visual Interactive Behaviour : Robots that (Usually) Follow the Rules. (2001)
B. Ogden
and
K. Dautenhahn
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
An Information-Theoretic Approach for the Quantification of Relevance. (2001)
D. Polani,
T. Martinetz
and
J.T. Kim
Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001)
P. Tino,
I. Nabney
and
Yi. Sun
Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001)
I. Werry,
K. Dautenhahn,
B. Ogden
and
W. Harwin