Publication
Number of items: 108.
13 August 2016
  • Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns. (2016) Priori, Giseli de Sousa, Mauro Roisenberg, Chris Stopford, Evelyn Hesse, Neil Davey and Yi Sun
  • 1 January 2011
  • Robots that say 'no'. (2011) F. Förster, C.L. Nehaniv and J. Saunders
  • 2011
  • Concurrent non-deferred reference counting on the microgrid : first experiences. (2011) Stephan Herhut, C. Joslin, Sven-Bodo Scholz, R Poss and Clemens Grelck
  • Symbiotic expressions. (2011) R. Bernecky, S. Herhut and S. Scholz
  • The sense of security and a countermeasure for the false sense (transcript of discussion). (2011) J. Malcolm
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson
  • The metaplace security model (transcript of discussion). (2011) M. Roe
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • The metaplace security model. (2011) Michael Roe
  • Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011) T. Anthony, D. Polani and C.L. Nehaniv
  • Children interpretation of emotional body language displayed by a robot. (2011) A. Beck, Lola Cañamero, L. Damiano, G. Sommavilla, F. Tesser and P. Cosi
  • On Maltsev digraphs. (2011) Catarina Carvalho, L. Egri, M. Jackson and T. Niven
  • Implementation architecture and multithreaded runtime system of S-Net. (2011) Clemens Grelck and Frank Penczek
  • Origins of scaling in genetic code. (2011) O. Obst, D. Polani and M. Prokopenko
  • Effect of using varying negative examples in transcription factor binding site predictions. (2011) Faisal Rezwan, Yi Sun, N. Davey, Roderick Adams, A.G. Rust and M. Robinson
  • Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011) D.S. Syrdal, K. Dautenhahn, T. Nomura and H. Hirai
  • Hierarchical behaviours : getting the most bang for your bit. (2011) S. van Dijk, D. Polani and C.L. Nehaniv
  • 2010
  • Correcting Errors in Optical Data Transmission Using Neural Networks. (2010) S. Hunt, Yi. Sun, A. Shafarenko, R.G. Adams, N. Davey, B. Slater, R. Bhamber, S. Boscolo and S.K. Turitsyn
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • Developing play scenarios for tactile interaction with a humanoid robot : A case study exploration with children with autism. (2010) B. Robins and K. Dautenhahn
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010) A. Hiolle, Lola Cañamero, P. Andry, A. Blanchard and P. Gaussier
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson
  • 2009
  • Vintage bit cryptography. (Transcript of discussion). (2009) A. Shafarenko
  • The application of the flexilevel approach for the assessment of computer science undergraduates. (2009) Mariana Lilley and A. Pyper
  • The influence of social interaction on the perception of emotional expression : A case study with a robot head. (2009) John C. Murray, Lola Cañamero, Kim A. Bard, Marina Davila Ross and Kate Thorsteinsson
  • Numerical simulations of unsteady shock wave interactions using SAC and Fortran-90. (2009) D. Rolls, C. Joslin, A. Kudryavtsev, S. Scholz and A. Shafarenko
  • Connection Strategies in Associative Memory Models. (2009) W. Chen, R. Maex, R.G. Adams, L. Calcraft, Volker Steuber and N. Davey
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • Philosophical conceptions of information. (2009) L. Floridi
  • Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009) W.C. Ho and K. Dautenhahn
  • Attention Mechanisms in the CHREST Cognitive Architecture. (2009) P.C.R. Lane, F. Gobet and R.L. Smith
  • The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009) G. de Sousa, R.G. Adams, N. Davey, R. Maex and Volker Steuber
  • 2008
  • Towards a Narrative Mind: The Creation of Coherent Life Stories for Believable Virtual Agents. (2008) W.C. Ho and K. Dautenhahn
  • Adaptive Olfactory Encoding in Agents Controlled by Spiking Neural Networks. (2008) N. Oros, Volker Steuber, N. Davey, L. Canamero and R.G. Adams
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines. (2008) Yi. Sun, M. Robinson, R.G. Adams, A.G. Rust and N. Davey
  • 2007
  • I know what I did last summer: autobiographic memory in synthetic characters. (2007) J. Dias, W.C. Ho, T. Vogt, N. Beeckman, A. Paiva and E. Andre
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • Construction of an Internal Predictive Model by Event Anticipation. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • Grounding Action-Selection in Event-Based Anticipation. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • How Information and Embodiment Shape Intelligent Information Processing. (2007) D. Polani, O. Sporns and M. Lungarella
  • Constructing the Basic Umwelt of Artificial Agents: An Information-Theoretic Approach. (2007) P. Capdepuy, D. Polani and C.L. Nehaniv
  • Unbiased Branches: An Open Problem. (2007) A. Gellert, A. Florea, M. Vintan, C. Egan and L. Vintan
  • Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007) C. Lyon, C.L. Nehaniv, J. Baillie and S. Warren
  • Emergence of Genetic Coding: an Information-theoretic Model. (2007) M. Piraveenan, D. Polani and M. Prokopenko
  • Identifying binding sites in sequential genomic data. (2007) M. Robinson, C. Gonzalez Castellano, R.G. Adams, N. Davey and Yi. Sun
  • An Open Source Simulation Model of Software Development and Testing. (2007) S. Ur, E. Yom-Tov and P. Wernick
  • 2006
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006) M. Davis, K. Dautenhahn, C.L. Nehaniv and S.D. Powell
  • Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006) Attila Egri-Nagy and C.L. Nehaniv
  • Autobiographic knowledge for believable virtual characters. (2006) W.C. Ho and S. Watson
  • Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006) T. Jung and D. Polani
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Optimizing Potential Information Transfer with Self-referential Memory. (2006) M. Prokopenko, D. Polani and P. Wang
  • Understanding prediction limits through unbiased branches. (2006) L. Vintan, A. Gellert, A. Florea, M. Oancea and C. Egan
  • 2005
  • Where have all the protocols gone? (2005) B. Christianson
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • Algebraic hierarchical decomposition of finite state automata : comparison of implementations for Krohn-Rhodes Theory. (2005) Attila Egri-Nagy and C.L. Nehaniv
  • How to Do Philosophy Informationally. (2005) G.M. Greco, G. Paronitti, M. Turilli and L. Floridi
  • All Else Being Equal Be Empowered. (2005) A.S. Klyubin, D. Polani and C.L. Nehaniv
  • Discovering predictive variables when evolving cognitive models. (2005) P.C.R. Lane and F. Gobet
  • Self-replication, Evolvability and Asynchronicity in Stochastic Worlds. (2005) C.L. Nehaniv
  • On a Quantitative Measure for Modularity Based on Information Theory. (2005) D. Polani, P. Dauscher and T. Uthmann
  • Using Existing Website Ontologies to Assist Navigation and Exploration. (2005) G. Saward, M. Shah and T. Hall
  • 2004
  • Optimising a Neural Tree Using Subtree Retraining. (2004) W. Pensuwon, R.G. Adams and N. Davey
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • A computer adaptive test that facilitates the modification of previously entered responses : An empirical study. (2004) Mariana Lilley and T. Barker
  • Designing empathic agents : adults versus kids. (2004) L. Hall, Sarah Woods, K. Dautenhahn, D. Sobral, A. Paiva, D. Wolke and L. Newall
  • 2003
  • Preventing Bluff Agent Invasions in Honest Societies. (2003) R. Lowe and D. Polani
  • Evolving Embodied Genetic Regulatory Network-driven Control Systems. (2003) T. Quick, C.L. Nehaniv, K. Dautenhahn and G. Roberts
  • The Robot in the Swarm : An Investigation into Agent Embodiment within Virtual Robotic Swarms. (2003) A. Newton, C.L. Nehaniv and K. Dautenhahn
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003) Attila Egri-Nagy and C.L. Nehaniv
  • Comparing different control architectures for autobiographical agents in static virtual environments. (2003) W.C. Ho, K. Dautenhahn and C.L. Nehaniv
  • Measuring self-organization via observers. (2003) D. Polani
  • The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003) F.M. Richardson, N. Davey, L. Peters, D.J. Done and S. Anthony
  • Animated characters in bullying intervention. (2003) Sarah Woods, L. Hall, D. Sobral, K. Dautenhahn and D. Wolke
  • 2002
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • Cached Two-Level Adaptive Branch Predictors with Multiple Stages. (2002) C. Egan, G.B. Steven and L. Vintan
  • Interactional Structure Applied to the Identification and Generation of Visual Interactive Behavior: Robots that (Usually) Follow the Rules. (2002) B. Ogden, K. Dautenhahn and P. Stribling
  • 2001
  • Cognitive Dimensions of Notations: Design Tools for Cognitive Technology. (2001) A.F. Blackwell, C. Britton, A. Cox, T. Green, C. Gurr, G. Kadoda, M. Kutar, M.J. Loomes, C.L. Nehaniv, M. Petre, C. Roast, C. Roe, A. Wong and R.M. Young
  • Towards Computational Neural Systems through Developmental Evolution. (2001) A.G. Rust, R.G. Adams, S. George and H. Bolouri
  • The Cognitive Dimensions of an Artifact vis-a-vis Individual Human Users : Studies with Notations for the Temporal. (2001) M. Kutar, C.L. Nehaniv, C. Britton and S. Jones
  • Specifying Multiple Time Granularities in Interactive Systems. (2001) M. Kutar, C. Britton and C.L. Nehaniv
  • Fact and Artifact : Reification and Drift in the History and Growth of Interactive Software Systems. (2001) M.J. Loomes and C.L. Nehaniv
  • The Narrative Intelligence Hypothesis: In Search of the Transactional Format of Narratives in Humans and Other Social Animals. (2001) K. Dautenhahn
  • Interactional Structure Applied to the Identification and Interpretation of Visual Interactive Behaviour : Robots that (Usually) Follow the Rules. (2001) B. Ogden and K. Dautenhahn
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • An Information-Theoretic Approach for the Quantification of Relevance. (2001) D. Polani, T. Martinetz and J.T. Kim
  • Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001) P. Tino, I. Nabney and Yi. Sun
  • Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001) I. Werry, K. Dautenhahn, B. Ogden and W. Harwin
  • 2000
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Analysis of human motion using snakes and neural networks. (2000) Ken Tabb, S. George, N. Davey and R.G. Adams
  • 1999
  • The Second Person — Meaning and Metaphors. (1999) C.L. Nehaniv
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • The capacity and attractor basins of associative memory models. (1999) N. Davey and S. Hunt
  • Communication as an Emergent Metaphor for Neuronal Operation. (1999) S.J. Nasuto, K. Dautenhahn and J. M. Bishop
  • A modular attractor model of semantic access. (1999) W. Power, R. Frank, D.J. Done and N. Davey
  • On Bots and Bacteria: Ontology Independent Embodiment. (1999) T. Quick, K. Dautenhahn, C.L. Nehaniv and G. Roberts
  • 1998
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • 1997
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison