Publication
Number of items: 62.
Article
Impoverished empowerment : `meaningful' action sequence generation through bandwidth limitation. (2011)
T. Anthony,
D. Polani
and
C.L. Nehaniv
Children interpretation of emotional body language displayed by a robot. (2011)
A. Beck,
Lola Cañamero,
L. Damiano,
G. Sommavilla,
F. Tesser
and
P. Cosi
On Maltsev digraphs. (2011)
Catarina Carvalho,
L. Egri,
M. Jackson
and
T. Niven
Connection Strategies in Associative Memory Models. (2009)
W. Chen,
R. Maex,
R.G. Adams,
L. Calcraft,
Volker Steuber
and
N. Davey
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
Why isn't trust transitive? (1997)
B. Christianson
and
W.S. Harbison
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Secure Sessions from Weak Secrets. (2005)
B. Christianson,
M. Roe
and
D. Wheeler
Vintage Bit Cryptography. (2009)
B. Christianson
and
A. Shafarenko
Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002)
B. Christianson
and
D. Wheeler
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
The capacity and attractor basins of associative memory models. (1999)
N. Davey
and
S. Hunt
TouchStory: Towards an Interactive Learning Environment for Helping Children with Autism to Understand Narrative. (2006)
M. Davis,
K. Dautenhahn,
C.L. Nehaniv
and
S.D. Powell
Cached Two-Level Adaptive Branch Predictors with Multiple Stages. (2002)
C. Egan,
G.B. Steven
and
L. Vintan
Algebraic hierarchical decomposition of finite state automata : comparison of implementations for Krohn-Rhodes Theory. (2005)
Attila Egri-Nagy
and
C.L. Nehaniv
Evolvability of the gentotype-phenotype relation in populations of self-replicating digital organisms in a Tierra-like system. (2003)
Attila Egri-Nagy
and
C.L. Nehaniv
Making sense of the sensory data - coordinate systems by hierarchical decomposition. (2006)
Attila Egri-Nagy
and
C.L. Nehaniv
Philosophical conceptions of information. (2009)
L. Floridi
Unbiased Branches: An Open Problem. (2007)
A. Gellert,
A. Florea,
M. Vintan,
C. Egan
and
L. Vintan
How to Do Philosophy Informationally. (2005)
G.M. Greco,
G. Paronitti,
M. Turilli
and
L. Floridi
Implementation architecture and multithreaded runtime system of S-Net. (2011)
Clemens Grelck
and
Frank Penczek
Designing empathic agents : adults versus kids. (2004)
L. Hall,
Sarah Woods,
K. Dautenhahn,
D. Sobral,
A. Paiva,
D. Wolke
and
L. Newall
Using the interaction rhythm as a natural reinforcement signal for social robots: a matter of belief. (2010)
A. Hiolle,
Lola Cañamero,
P. Andry,
A. Blanchard
and
P. Gaussier
Designing an Educational Game Facilitating Children’s Understanding of the Development of Social Relationships Using IVAs with Social Group Dynamics. (2009)
W.C. Ho
and
K. Dautenhahn
Towards a Narrative Mind: The Creation of Coherent Life Stories for Believable Virtual Agents. (2008)
W.C. Ho
and
K. Dautenhahn
Comparing different control architectures for autobiographical agents in static virtual environments. (2003)
W.C. Ho,
K. Dautenhahn
and
C.L. Nehaniv
Autobiographic knowledge for believable virtual characters. (2006)
W.C. Ho
and
S. Watson
Sequential Learning with LS-SVM for Large-Scale Data Sets. (2006)
T. Jung
and
D. Polani
All Else Being Equal Be Empowered. (2005)
A.S. Klyubin,
D. Polani
and
C.L. Nehaniv
Discovering predictive variables when evolving cognitive models. (2005)
P.C.R. Lane
and
F. Gobet
Attention Mechanisms in the CHREST Cognitive Architecture. (2009)
P.C.R. Lane,
F. Gobet
and
R.L. Smith
Homophony and Disambiguation Through Sequential Processes in the Evolution of Language. (2007)
C. Lyon,
C.L. Nehaniv,
J. Baillie
and
S. Warren
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
Communication as an Emergent Metaphor for Neuronal Operation. (1999)
S.J. Nasuto,
K. Dautenhahn
and
J. M. Bishop
Self-replication, Evolvability and Asynchronicity in Stochastic Worlds. (2005)
C.L. Nehaniv
Origins of scaling in genetic code. (2011)
O. Obst,
D. Polani
and
M. Prokopenko
Interactional Structure Applied to the Identification and Generation of Visual Interactive Behavior: Robots that (Usually) Follow the Rules. (2002)
B. Ogden,
K. Dautenhahn
and
P. Stribling
Adaptive Olfactory Encoding in Agents Controlled by Spiking Neural Networks. (2008)
N. Oros,
Volker Steuber,
N. Davey,
L. Canamero
and
R.G. Adams
Emergence of Genetic Coding: an Information-theoretic Model. (2007)
M. Piraveenan,
D. Polani
and
M. Prokopenko
Measuring self-organization via observers. (2003)
D. Polani
On a Quantitative Measure for Modularity Based on Information Theory. (2005)
D. Polani,
P. Dauscher
and
T. Uthmann
An Information-Theoretic Approach for the Quantification of Relevance. (2001)
D. Polani,
T. Martinetz
and
J.T. Kim
A modular attractor model of semantic access. (1999)
W. Power,
R. Frank,
D.J. Done
and
N. Davey
Optimizing Potential Information Transfer with Self-referential Memory. (2006)
M. Prokopenko,
D. Polani
and
P. Wang
On Bots and Bacteria: Ontology Independent Embodiment. (1999)
T. Quick,
K. Dautenhahn,
C.L. Nehaniv
and
G. Roberts
Effect of using varying negative examples in transcription factor binding site predictions. (2011)
Faisal Rezwan,
Yi Sun,
N. Davey,
Roderick Adams,
A.G. Rust
and
M. Robinson
The influence of prior knowledge and related experience on generalisation performance in connectionist networks. (2003)
F.M. Richardson,
N. Davey,
L. Peters,
D.J. Done
and
S. Anthony
Identifying binding sites in sequential genomic data. (2007)
M. Robinson,
C. Gonzalez Castellano,
R.G. Adams,
N. Davey
and
Yi. Sun
Using Existing Website Ontologies to Assist Navigation and Exploration. (2005)
G. Saward,
M. Shah
and
T. Hall
Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008)
A. Shenoy,
T.M. Gale,
N. Davey,
B. Christianson
and
R. Frank
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson
Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines. (2008)
Yi. Sun,
M. Robinson,
R.G. Adams,
A.G. Rust
and
N. Davey
Examining the Frankenstein Syndrome : An open-ended cross-cultural survey. (2011)
D.S. Syrdal,
K. Dautenhahn,
T. Nomura
and
H. Hirai
Analysis of human motion using snakes and neural networks. (2000)
Ken Tabb,
S. George,
N. Davey
and
R.G. Adams
Using directional curvatures to visualize folding patterns of the GTM projection manifolds. (2001)
P. Tino,
I. Nabney
and
Yi. Sun
An Open Source Simulation Model of Software Development and Testing. (2007)
S. Ur,
E. Yom-Tov
and
P. Wernick
Understanding prediction limits through unbiased branches. (2006)
L. Vintan,
A. Gellert,
A. Florea,
M. Oancea
and
C. Egan
Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy. (2001)
I. Werry,
K. Dautenhahn,
B. Ogden
and
W. Harwin
Animated characters in bullying intervention. (2003)
Sarah Woods,
L. Hall,
D. Sobral,
K. Dautenhahn
and
D. Wolke
The Effect of Different Forms of Synaptic Plasticity on Pattern Recognition in the Cerebellar Cortex. (2009)
G. de Sousa,
R.G. Adams,
N. Davey,
R. Maex
and
Volker Steuber
Hierarchical behaviours : getting the most bang for your bit. (2011)
S. van Dijk,
D. Polani
and
C.L. Nehaniv