Publication
Number of items: 62.
Public
  • Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011) T. Anthony, D. Polani and C.L. Nehaniv
  • Children interpretation of emotional body language displayed by a robot. (2011) A. Beck, Lola Cañamero, L. Damiano, G. Sommavilla, F. Tesser and P. Cosi
  • Connection Strategies in Associative Memory Models. (2009) W. Chen, R. Maex, R.G. Adams, L. Calcraft, Volker Steuber and N. Davey
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The capacity and attractor basins of associative memory models. (1999) N. Davey and S. Hunt
  • TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006) M. Davis, K. Dautenhahn, C.L. Nehaniv and S.D. Powell
  • Cached Two-Level Adaptive Branch Predictors with Multiple Stages. (2002) C. Egan, G.B. Steven and L. Vintan
  • Algebraic hierarchical decomposition of finite state automata : comparison of implementations for Krohn-Rhodes Theory. (2005) Attila Egri-Nagy and C.L. Nehaniv
  • Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003) Attila Egri-Nagy and C.L. Nehaniv
  • Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006) Attila Egri-Nagy and C.L. Nehaniv
  • Philosophical conceptions of information. (2009) L. Floridi
  • Unbiased Branches: An Open Problem. (2007) A. Gellert, A. Florea, M. Vintan, C. Egan and L. Vintan
  • How to Do Philosophy Informationally. (2005) G.M. Greco, G. Paronitti, M. Turilli and L. Floridi
  • Implementation architecture and multithreaded runtime system of S-Net. (2011) Clemens Grelck and Frank Penczek
  • Designing empathic agents : adults versus kids. (2004) L. Hall, Sarah Woods, K. Dautenhahn, D. Sobral, A. Paiva, D. Wolke and L. Newall
  • Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010) A. Hiolle, Lola Cañamero, P. Andry, A. Blanchard and P. Gaussier
  • Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009) W.C. Ho and K. Dautenhahn
  • Towards a Narrative Mind: The Creation of Coherent Life Stories for Believable Virtual Agents. (2008) W.C. Ho and K. Dautenhahn
  • Comparing different control architectures for autobiographical agents in static virtual environments. (2003) W.C. Ho, K. Dautenhahn and C.L. Nehaniv
  • Autobiographic knowledge for believable virtual characters. (2006) W.C. Ho and S. Watson
  • Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006) T. Jung and D. Polani
  • All Else Being Equal Be Empowered. (2005) A.S. Klyubin, D. Polani and C.L. Nehaniv
  • Discovering predictive variables when evolving cognitive models. (2005) P.C.R. Lane and F. Gobet
  • Attention Mechanisms in the CHREST Cognitive Architecture. (2009) P.C.R. Lane, F. Gobet and R.L. Smith
  • Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007) C. Lyon, C.L. Nehaniv, J. Baillie and S. Warren
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Communication as an Emergent Metaphor for Neuronal Operation. (1999) S.J. Nasuto, K. Dautenhahn and J. M. Bishop
  • Self-replication, Evolvability and Asynchronicity in Stochastic Worlds. (2005) C.L. Nehaniv
  • Origins of scaling in genetic code. (2011) O. Obst, D. Polani and M. Prokopenko
  • Interactional Structure Applied to the Identification and Generation of Visual Interactive Behavior: Robots that (Usually) Follow the Rules. (2002) B. Ogden, K. Dautenhahn and P. Stribling
  • Adaptive Olfactory Encoding in Agents Controlled by Spiking Neural Networks. (2008) N. Oros, Volker Steuber, N. Davey, L. Canamero and R.G. Adams
  • Emergence of Genetic Coding: an Information-theoretic Model. (2007) M. Piraveenan, D. Polani and M. Prokopenko
  • Measuring self-organization via observers. (2003) D. Polani
  • On a Quantitative Measure for Modularity Based on Information Theory. (2005) D. Polani, P. Dauscher and T. Uthmann
  • An Information-Theoretic Approach for the Quantification of Relevance. (2001) D. Polani, T. Martinetz and J.T. Kim
  • A modular attractor model of semantic access. (1999) W. Power, R. Frank, D.J. Done and N. Davey
  • Optimizing Potential Information Transfer with Self-referential Memory. (2006) M. Prokopenko, D. Polani and P. Wang
  • On Bots and Bacteria: Ontology Independent Embodiment. (1999) T. Quick, K. Dautenhahn, C.L. Nehaniv and G. Roberts
  • The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003) F.M. Richardson, N. Davey, L. Peters, D.J. Done and S. Anthony
  • Identifying binding sites in sequential genomic data. (2007) M. Robinson, C. Gonzalez Castellano, R.G. Adams, N. Davey and Yi. Sun
  • Using Existing Website Ontologies to Assist Navigation and Exploration. (2005) G. Saward, M. Shah and T. Hall
  • Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines. (2008) Yi. Sun, M. Robinson, R.G. Adams, A.G. Rust and N. Davey
  • Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011) D.S. Syrdal, K. Dautenhahn, T. Nomura and H. Hirai
  • Analysis of human motion using snakes and neural networks. (2000) Ken Tabb, S. George, N. Davey and R.G. Adams
  • Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001) P. Tino, I. Nabney and Yi. Sun
  • An Open Source Simulation Model of Software Development and Testing. (2007) S. Ur, E. Yom-Tov and P. Wernick
  • Understanding prediction limits through unbiased branches. (2006) L. Vintan, A. Gellert, A. Florea, M. Oancea and C. Egan
  • Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001) I. Werry, K. Dautenhahn, B. Ogden and W. Harwin
  • Animated characters in bullying intervention. (2003) Sarah Woods, L. Hall, D. Sobral, K. Dautenhahn and D. Wolke
  • The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009) G. de Sousa, R.G. Adams, N. Davey, R. Maex and Volker Steuber
  • Hierarchical behaviours : getting the most bang for your bit. (2011) S. van Dijk, D. Polani and C.L. Nehaniv
  • Restricted
  • On Maltsev digraphs. (2011) Catarina Carvalho, L. Egri, M. Jackson and T. Niven
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Effect of using varying negative examples in transcription factor binding site predictions. (2011) Faisal Rezwan, Yi Sun, N. Davey, Roderick Adams, A.G. Rust and M. Robinson
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson