Browsing Computer Science by Title
Now showing items 1576-1595 of 2087
-
Saffron: A Data Value Assessment Tool for Quantifying the Value of Data Assets
(2019)Data has become an indispensable commodity and it is the basis for many products and services. It has become increasingly important to understand the value of this data in order to be able to exploit it and reap the full ... -
Saliency determination for computer graphics : an experimental approach
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2006)In the computer graphics realm complex objects are abundant, but often need to be simplified in order to be displayed interactively. As the human visual system is far from flawless, advantage can be taken of its weaknesses ... -
The Sam Loyd 15-Puzzle
(Trinity College Dublin, Department of Computer Science, 2001-06)This report presents an approach to solve Sam Loyd?s famous 15-puzzle. The 15 or sliding puzzle is traditionally represented as a 4 * 4 board with tiles numbered from 1 to 15 arranged in numerical order from top left to ... -
SAMoD: Shared Autonomous Mobility-on-Demand using Decentralized Reinforcement Learning
(2018)Shared mobility-on-demand systems can improve the efficiency of urban mobility through reduced vehicle ownership and parking demand. However, some issues in their implementations remain open, most notably the issue of ... -
Sample identification and tracking in biobanks
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2010)Biobanks or bio-repositories facilitate the storage and maintenance of biological samples and data to support discovery of biomarkers, therapeutic targets, and the underlying causes of diseases. Such discoveries require ... -
SAMPLE: An On-Demand Probabilistic Routing Protocol for Ad-hoc Networks
(Trinity College Dublin, Department of Computer Science, 2004-01-21)Existing on-demand ad hoc routing protocols assume an idealised wireless network in which all links in the network are either on or off and where all functioning links are equally good. Such a model interprets the fraction ... -
Saoithín: A Theorem Prover for UTP
(Springer, 2010)Saoithín is a theorem prover developed to support the Unifying Theories of Programming (UTP) framework. Its primary design goal was to support the higher-order logic, alphabets, equational reasoning and “programs as ... -
Savant: An Accounting and Accountability Framework for Information Centric Networks
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2016)Content Provider i.e. entities that own or are licensed to sell and distribute content e.g., HBO, Netflix, Amazon Prime, which use the IP-based Internet model for content distribution, consume a large percentage of network ... -
Scalability Issues in Cluster Web Servers
(Trinity College Dublin. Department of Computer Science, 2002-09)In this dissertation a Web cluster architecture is designed, implemented and evaluated. We believe that the use of COTS hardware and integrated front end and back end software better scalability and flexibility can be ... -
Scalable Privacy
(ACM, 2017) -
Scientific publication: policy on open access (European Research Advisory Board Final Report)
(EURAB, 2006)EURAB was invited by the Commission to examine the issue of scientific publication with particular reference to policy recommendations regarding open access for Framework Programme 7 (FP7). A clear policy at European ... -
Scrutability of Intelligent Personal Assistants
(Association for Computing Machinery, 2022)Intelligent personal assistants (IPAs) have become widely available, yet they remain primarily used for discrete, straightforward tasks. By contrast, both user studies and literature reviews indicate that IPAs of the future ... -
An SDN architecture for under water search and surveillance
(IEEE, 2017) -
A SDN-Controlled Underwater MAC and Routing Testbed
(IEEE, 2016) -
Search Strategies for Ensemble Feature Selection in Medical Diagnostics
(Trinity College Dublin, Department of Computer Science, 2003)The goal of this paper is to propose, evaluate, and compare four search strategies for ensemble feature selection, and to consider their application to medical diagnostics, with a focus on the problem of the classification ... -
Secure group communications in emergency ad hoc networks
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2006)Ad Hoc networks are an ideal way to form interactions between mobile wireless nodes of emergency services from different domains (i.e. organizations or countries). However, due to the frequent topological and membership ... -
Secure pay-per-view testbed
(IEEE, 1995)Trials of video on demand and pay-per-view systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace their distribution networks. Video streams ... -
Secure routing for mobile ad-hoc networks
(IEEE, 2005)In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing ...