Browsing Computer Science by Title
Now showing items 1355-1374 of 2087
-
PAM-AID - A study in human-machine cooperative behaviour
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2001)The research described in this thesis attempts to address the needs of a growing number of people with both a visual impairment and a mobility impairment. These people tend to live a very inactive lifestyle, often confined ... -
A Parallel Implementation of the Electric Field Integral Equation for an Arbitrary Terrain Profile
(2014)In this paper a parallel implementation of the Electric Field Integral Equation is introduced. By this means, the otherwise slow computation time of signal coverage over terrain can be cut to an arbitrarily small figure ... -
Parasitic routing : using social network analysis for routing in disconnecting delay-tolerant MANETs
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2007)Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. As a consequence, a full end-to-end path between nodes may not exist at any given ... -
Partial Outsourcing: A New Paradigm for Access Control
(Trinity College Dublin, Department of Computer Science, 2003-04-28)Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a system ... -
Partition Anticipation for Wireless Local Area Networks
(Trinity College Dublin. Department of Computer Science, 2002-09)Wireless networks introduce new possibilities for computer networking. They also bring some new problems, while enhancing some already established ones. One new problem is a network's increased sensitivity to its environment, ... -
Partitioning POMDPs for multiple input types, and their application to dialogue managers
(Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2018)This research looks at the POMDP models used for dialogue management within Spoken Dialogue Systems (SDS). In particular, it examines the difficulty of handling multimodal inputs. It proposes a generalisation of the ... -
Password policy purgatory
(IEEE, 2008)IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing ... -
Patient-centred clinical validation using autonomous socialising knowledge agents
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2008) -
Patient-Centred Laboratory Validation Using Software Agents
(2008)Guidelines are self-contained documents which healthcare professionals reference to obtain knowledge about a specific condition or process. They interface with these documents and apply known facts about specific patients ... -
Peer assisted multicast streaming on-demand applications
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2016)On-demand multimedia streaming applications allow users to select and view content at a time of their choosing and to control the playback of this content. This level of control typically requires that each user receives ... -
Peer-to-Peer Applications in Ad Hoc Wireless Networks
(Trinity College Dublin. Department of Computer Science, 2002-09)With the rapid development of wireless technology, more and more people are equipped with mobile devices, which allow them to communicate and share resources with each other. The combination of mobility and wireless ... -
A Peer-to-Peer Architecture for Collaborative Spam Filtering
(Trinity College Dublin. Department of Computer Science, 2002-09)Over the last twenty years, the importance of electronic mail has risen to a point where it is now a critical medium for many companies and individuals. This fact has led to the emergence of a new method of invasive ... -
A Peer-to-Peer Reference Architecture
(IEEE, 2006)Peer-to-Peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralised manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to ... -
Perception of Bias: The Impact of User Characteristics, Website Design and Technical Features
(2017)Bias, whether real or perceived by the user, is inherent in news media. In this paper, we demonstrate that user characteristics, the design and common technical features of news websites impact users’ perception of bias. ... -
Perception of Bias: The Impact of User Characteristics, Website Design and Technical Features
(ACM, 2017)Bias, whether real or perceived by the user, is inherent in news media. In this paper, we demonstrate that user characteristics, the design and common technical features of news websites impact users' perception of bias. ... -
A perceptual approach to trimming unstructured lumigraphs
(2007)We present a novel perceptual method to reduce the visual redundancy of unstructured lumigraphs, an image based representation designed for interactive rendering. We combine features of the unstructured lumigraph algorithm ...