Richard Overill | King's College London (original) (raw)
Papers by Richard Overill
Journal of the …, Jan 1, 1981
the total (unpolarized) emission intensities of the 0 + j (x", y", and 2") transitions according ... more the total (unpolarized) emission intensities of the 0 + j (x", y", and 2") transitions according to eq A17, where poi is the transition frequency.
… 2003. CEC'03. The 2003 Congress …, Jan 1, 2003
The retail sector often does not possess sufficient knowledge about potential or actual frauds. T... more The retail sector often does not possess sufficient knowledge about potential or actual frauds. This requires the retail sector to employ an anomaly detection approach to fraud detection. To detect anomalies in retail transactions, the fraud detection system introduced in this work implements various salient features of the human immune system. This novel artificial immune system, called CIFD (Computer Immune system for Fraud Detection), adopts both negative selection and positive selection to generate artificial immune cells. CIFD also employs an analogy of the self-Major Histocompatability Complex (MHC) molecules when antigen data is presented to the system. These novel mechanisms are expected to improve the scalability of CIFD, which is designed to process gigabytes or more of transaction data per day. In addition, CIFD incorporates other prominent features of the HIS such as clonal selection and memory cells, which allow CIFD to behave adaptively as transaction patterns change.
Chemical physics letters, Jan 1, 1984
Parallel Computing, Jan 1, 1996
We consider the implications of Amdahl's Law for a heterogeneous system of computers each of whic... more We consider the implications of Amdahl's Law for a heterogeneous system of computers each of which is a homogeneous parallel processor. We introduce a parallelism profile function to describe the level of parallelism achieved in different fragments of the computation and demonstrate that, for some choices of this function, the performance of a heterogeneous system significantly exceeds that of each of the component homogeneous systems.
… of the Royal …, Jan 1, 1992
Page 1. Downloaded from rspa.royalsocietypublishing.org on March 25, 2010 PROCEEDINGS THE ROYAL A... more Page 1. Downloaded from rspa.royalsocietypublishing.org on March 25, 2010 PROCEEDINGS THE ROYAL A of SOCIETY Гк MATHEMATICAL, PHYSICAL & ENGINEERING SCIENCES Computational Studies of the Electroweak ...
J. Chem. Soc., Chem. Commun., Jan 1, 1982
Page 1. 476 J. CHEM. SOC., CHEM. COMMUN., 1982 The Uracil-Fluoride Interaction : Ab hitio Calcula... more Page 1. 476 J. CHEM. SOC., CHEM. COMMUN., 1982 The Uracil-Fluoride Interaction : Ab hitio Calculations including Solvation John Emsley,a Deborah J. Jones,a and Richard E. Overillb a Department of Chemistry, KingS College ...
Computing & Control Engineering Journal, Jan 1, 2001
Some of the accounts of information warfare carried by the media have been exaggerated or inaccur... more Some of the accounts of information warfare carried by the media have been exaggerated or inaccurate, but this must not deflect us from addressing the crucial issues of defining, developing and deploying critical infrastructure protection policies and strategies.
Chemical Physics Letters, Jan 1, 1979
-is w&er than that in [F-IL_P] -. akbougb the former sfill ranks as a rcry strong hydrogen bond_
Information Warfare Seminar, London, Jan 1, 1997
Proceedings of the 1st International Workshop on …, Jan 1, 1998
Journal of Molecular …, Jan 1, 1987
Defence Systems International, Jan 1, 1997
Journal of Financial Crime, Jan 1, 1998
Page 1. Journal of Financial Crime Vol. 6 No. 2 Computer Crime Trends in Computer Crime Richa... more Page 1. Journal of Financial Crime Vol. 6 No. 2 Computer Crime Trends in Computer Crime Richard E. Overill INTRODUCTION In this article the historical development of com-puter crime is traced and analysed. Some ...
Journal of Financial Crime, Jan 1, 1998
Journal of Financial …, Jan 1, 1998
Parallel computing, Jan 1, 1994
ABSTRACT The algebraic complexity of three parallel algorithms for the evaluation of power series... more ABSTRACT The algebraic complexity of three parallel algorithms for the evaluation of power series is related to their observed performance in practical implementations on five parallel processors: the Amdahl VP1200, Convex C38 and Cray Y-MP vector uniprocessors, and the AMT DAP-610C/32 and TMC CM-200 processor arrays.
Journal of Financial Crime, Jan 1, 1999
Page 1. Journal of Financial Crime Vol. 6 No. 4 Computer Crime BRIEFINGS COMPUTER CRIME Denia... more Page 1. Journal of Financial Crime Vol. 6 No. 4 Computer Crime BRIEFINGS COMPUTER CRIME Denial of Service Attacks: Threats and Methodologies Richard E. Overill SCOPE AND DEFINITIONS The provision of any service requires the utilisation of resources. ...
Journal of Logic and Computation, Jan 1, 2004
Page 1. Book Reviews 325 included are those which appear very frequently in the text itself (eg b... more Page 1. Book Reviews 325 included are those which appear very frequently in the text itself (eg byte) or which have strong historical links with the Internet (eg UNIX). This is a justifiable and pragmatic criterion with which I would not quibble. ...
Computers and the Humanities, Jan 1, 1993
Page 1. On the Combinatorial Complexity of Fuzzy Pattern Matching in Music Analysis Richard E. Ov... more Page 1. On the Combinatorial Complexity of Fuzzy Pattern Matching in Music Analysis Richard E. Overill Algorithm Design Group, Department of Computer Science, King's College London, Strand, London WC2R 2LS, UK e-mail: R.Overilt@uk.ac.kcl.cc.oak ...
Journal of the …, Jan 1, 1981
the total (unpolarized) emission intensities of the 0 + j (x", y", and 2") transitions according ... more the total (unpolarized) emission intensities of the 0 + j (x", y", and 2") transitions according to eq A17, where poi is the transition frequency.
… 2003. CEC'03. The 2003 Congress …, Jan 1, 2003
The retail sector often does not possess sufficient knowledge about potential or actual frauds. T... more The retail sector often does not possess sufficient knowledge about potential or actual frauds. This requires the retail sector to employ an anomaly detection approach to fraud detection. To detect anomalies in retail transactions, the fraud detection system introduced in this work implements various salient features of the human immune system. This novel artificial immune system, called CIFD (Computer Immune system for Fraud Detection), adopts both negative selection and positive selection to generate artificial immune cells. CIFD also employs an analogy of the self-Major Histocompatability Complex (MHC) molecules when antigen data is presented to the system. These novel mechanisms are expected to improve the scalability of CIFD, which is designed to process gigabytes or more of transaction data per day. In addition, CIFD incorporates other prominent features of the HIS such as clonal selection and memory cells, which allow CIFD to behave adaptively as transaction patterns change.
Chemical physics letters, Jan 1, 1984
Parallel Computing, Jan 1, 1996
We consider the implications of Amdahl's Law for a heterogeneous system of computers each of whic... more We consider the implications of Amdahl's Law for a heterogeneous system of computers each of which is a homogeneous parallel processor. We introduce a parallelism profile function to describe the level of parallelism achieved in different fragments of the computation and demonstrate that, for some choices of this function, the performance of a heterogeneous system significantly exceeds that of each of the component homogeneous systems.
… of the Royal …, Jan 1, 1992
Page 1. Downloaded from rspa.royalsocietypublishing.org on March 25, 2010 PROCEEDINGS THE ROYAL A... more Page 1. Downloaded from rspa.royalsocietypublishing.org on March 25, 2010 PROCEEDINGS THE ROYAL A of SOCIETY Гк MATHEMATICAL, PHYSICAL & ENGINEERING SCIENCES Computational Studies of the Electroweak ...
J. Chem. Soc., Chem. Commun., Jan 1, 1982
Page 1. 476 J. CHEM. SOC., CHEM. COMMUN., 1982 The Uracil-Fluoride Interaction : Ab hitio Calcula... more Page 1. 476 J. CHEM. SOC., CHEM. COMMUN., 1982 The Uracil-Fluoride Interaction : Ab hitio Calculations including Solvation John Emsley,a Deborah J. Jones,a and Richard E. Overillb a Department of Chemistry, KingS College ...
Computing & Control Engineering Journal, Jan 1, 2001
Some of the accounts of information warfare carried by the media have been exaggerated or inaccur... more Some of the accounts of information warfare carried by the media have been exaggerated or inaccurate, but this must not deflect us from addressing the crucial issues of defining, developing and deploying critical infrastructure protection policies and strategies.
Chemical Physics Letters, Jan 1, 1979
-is w&er than that in [F-IL_P] -. akbougb the former sfill ranks as a rcry strong hydrogen bond_
Information Warfare Seminar, London, Jan 1, 1997
Proceedings of the 1st International Workshop on …, Jan 1, 1998
Journal of Molecular …, Jan 1, 1987
Defence Systems International, Jan 1, 1997
Journal of Financial Crime, Jan 1, 1998
Page 1. Journal of Financial Crime Vol. 6 No. 2 Computer Crime Trends in Computer Crime Richa... more Page 1. Journal of Financial Crime Vol. 6 No. 2 Computer Crime Trends in Computer Crime Richard E. Overill INTRODUCTION In this article the historical development of com-puter crime is traced and analysed. Some ...
Journal of Financial Crime, Jan 1, 1998
Journal of Financial …, Jan 1, 1998
Parallel computing, Jan 1, 1994
ABSTRACT The algebraic complexity of three parallel algorithms for the evaluation of power series... more ABSTRACT The algebraic complexity of three parallel algorithms for the evaluation of power series is related to their observed performance in practical implementations on five parallel processors: the Amdahl VP1200, Convex C38 and Cray Y-MP vector uniprocessors, and the AMT DAP-610C/32 and TMC CM-200 processor arrays.
Journal of Financial Crime, Jan 1, 1999
Page 1. Journal of Financial Crime Vol. 6 No. 4 Computer Crime BRIEFINGS COMPUTER CRIME Denia... more Page 1. Journal of Financial Crime Vol. 6 No. 4 Computer Crime BRIEFINGS COMPUTER CRIME Denial of Service Attacks: Threats and Methodologies Richard E. Overill SCOPE AND DEFINITIONS The provision of any service requires the utilisation of resources. ...
Journal of Logic and Computation, Jan 1, 2004
Page 1. Book Reviews 325 included are those which appear very frequently in the text itself (eg b... more Page 1. Book Reviews 325 included are those which appear very frequently in the text itself (eg byte) or which have strong historical links with the Internet (eg UNIX). This is a justifiable and pragmatic criterion with which I would not quibble. ...
Computers and the Humanities, Jan 1, 1993
Page 1. On the Combinatorial Complexity of Fuzzy Pattern Matching in Music Analysis Richard E. Ov... more Page 1. On the Combinatorial Complexity of Fuzzy Pattern Matching in Music Analysis Richard E. Overill Algorithm Design Group, Department of Computer Science, King's College London, Strand, London WC2R 2LS, UK e-mail: R.Overilt@uk.ac.kcl.cc.oak ...