Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 2005
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are... more Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algorithm in general, when applied to anomaly detection. A straightforward self detector classification principle is proposed and its classification performance is compared to a real-valued negative selection algorithm and to a one-class support vector machine. Earlier work suggests that realvalue negative selection requires a single class to learn from. The investigations presented in this paper reveal, however, that when applied to anomaly detection, the real-valued negative selection and self detector classification techniques require positive and negative examples to achieve a high classification accuracy. Whereas, one-class SVMs only require examples from a single class.
Proceedings of IEEE Frontiers in Education Conference - FIE '93, 1993
... The institutions are Clemson (CU), Florida A&M/Florida State (FAMUIFSU), Georgia Institut... more ... The institutions are Clemson (CU), Florida A&M/Florida State (FAMUIFSU), Georgia Institute of Technology (GT), Noah Carolina A&T State University (NCA&T), Noah Carolina State University (NCSU), University of Florida 0, University of North Carolina at . ... JB O'Neal PH Mohr ...
In this paper a SOA inspired context-aware platform for enabling context-aware Telecom services i... more In this paper a SOA inspired context-aware platform for enabling context-aware Telecom services is presented. The SOA related components are highlighted and the platform's integration into a Telecom provider's service architecture is described—pointing out challenges in terms of protocols and semantic interoperability. An example application bridging the gap between data collected through a user's mobile phone and a web based portal in order to provide a Virtual Location Application through our platform is presented.
The immune system exhibits properties such as learning, distributivity continual adaptation, cont... more The immune system exhibits properties such as learning, distributivity continual adaptation, context dependent response and memory during the lifetime of a host. This paper argues that such properties are essential for the creation of future context-aware and ubiquitous systems where the need for such properties is becoming increasingly clear. To that end, we present an immune inspired system, which draws heavily on the immune network metaphor to create a metastable context-aware memory system that could be delivered in small hand-held devices.
The CIMAD project,“Common Infrastructure/Context Influenced Mobile Acquisition and Delivery of cu... more The CIMAD project,“Common Infrastructure/Context Influenced Mobile Acquisition and Delivery of cultural heritage data", is presented. CIMAD is a framework concerned with the development of cultural heritage “services” designed and implemented within the EU Network of Excellence EPOCH–Excellence in Processing Open Cultural Heritage. CIMAD aims to address a wide range of context-aware and multi-channel services in the cultural heritage domain, ie data acquisition, content delivery, monitoring, and management. The ...
This paper shows how MobiComp [1]-a context management infrastructure conceived by the University... more This paper shows how MobiComp [1]-a context management infrastructure conceived by the University of Kent and further developed within the framework of EPOCH-can be deployed to support visitors and management of museums, sites and landscapes by integrating heterogeneous technologies within the same operational environment. The Infrastructure is currently being demonstrated at the Interactive Salon, an exhibition of new technology for Cultural Heritage held at the StadsMuseum in Stockholm, within the ...
Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 2005
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are... more Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algorithm in general, when applied to anomaly detection. A straightforward self detector classification principle is proposed and its classification performance is compared to a real-valued negative selection algorithm and to a one-class support vector machine. Earlier work suggests that realvalue negative selection requires a single class to learn from. The investigations presented in this paper reveal, however, that when applied to anomaly detection, the real-valued negative selection and self detector classification techniques require positive and negative examples to achieve a high classification accuracy. Whereas, one-class SVMs only require examples from a single class.
Proceedings of IEEE Frontiers in Education Conference - FIE '93, 1993
... The institutions are Clemson (CU), Florida A&M/Florida State (FAMUIFSU), Georgia Institut... more ... The institutions are Clemson (CU), Florida A&M/Florida State (FAMUIFSU), Georgia Institute of Technology (GT), Noah Carolina A&T State University (NCA&T), Noah Carolina State University (NCSU), University of Florida 0, University of North Carolina at . ... JB O'Neal PH Mohr ...
In this paper a SOA inspired context-aware platform for enabling context-aware Telecom services i... more In this paper a SOA inspired context-aware platform for enabling context-aware Telecom services is presented. The SOA related components are highlighted and the platform's integration into a Telecom provider's service architecture is described—pointing out challenges in terms of protocols and semantic interoperability. An example application bridging the gap between data collected through a user's mobile phone and a web based portal in order to provide a Virtual Location Application through our platform is presented.
The immune system exhibits properties such as learning, distributivity continual adaptation, cont... more The immune system exhibits properties such as learning, distributivity continual adaptation, context dependent response and memory during the lifetime of a host. This paper argues that such properties are essential for the creation of future context-aware and ubiquitous systems where the need for such properties is becoming increasingly clear. To that end, we present an immune inspired system, which draws heavily on the immune network metaphor to create a metastable context-aware memory system that could be delivered in small hand-held devices.
The CIMAD project,“Common Infrastructure/Context Influenced Mobile Acquisition and Delivery of cu... more The CIMAD project,“Common Infrastructure/Context Influenced Mobile Acquisition and Delivery of cultural heritage data", is presented. CIMAD is a framework concerned with the development of cultural heritage “services” designed and implemented within the EU Network of Excellence EPOCH–Excellence in Processing Open Cultural Heritage. CIMAD aims to address a wide range of context-aware and multi-channel services in the cultural heritage domain, ie data acquisition, content delivery, monitoring, and management. The ...
This paper shows how MobiComp [1]-a context management infrastructure conceived by the University... more This paper shows how MobiComp [1]-a context management infrastructure conceived by the University of Kent and further developed within the framework of EPOCH-can be deployed to support visitors and management of museums, sites and landscapes by integrating heterogeneous technologies within the same operational environment. The Infrastructure is currently being demonstrated at the Interactive Salon, an exhibition of new technology for Cultural Heritage held at the StadsMuseum in Stockholm, within the ...
Uploads
Papers by Philipp Mohr