Browsing Computer Science (Scholarly Publications) by Title
Now showing items 1307-1326 of 1381
-
Using Pseudo Feedback to Improve Cross-Lingual Ontology Mapping
(Springer, 2011)Translation techniques are often employed by cross-lingual ontology mapping (CLOM) approaches to turn a cross-lingual mapping problem into a monolingual mapping problem which can then be solved by state of the art monolingual ... -
Using Psychometric Approaches in the Modeling of Abstract Cognitive Skills for Personalization, Lifelong User Modelling Workshop
(2009)?Learning to learn? is the informal phrase often used to describe the acquisition of abstract cognitive skills such as metacognition and social cognition. Current personalization approaches within Adaptive Learning Systems ... -
Using sensor networks for pedestrian detection
(2008)Pedestrian safety is a major concern in road transportation as pedestrian/vehicle accidents account for the second largest cause of traffic-related injuries and fatalities worldwide. Considerable work has examined the use ... -
Using Specification Models for RunTime Adaptations
(2009)For a myriad of reasons, modern applications face constant change to their requirements and working environment, requiring them to adapt accordingly. Increasingly, such adaptation is even required dur- ing runtime. In ... -
Using stigmergy to co-ordinate pervasive computing environments.
(IEEE Computer Society, 2004)Pervasive computing environments have proven difficult to develop in a form that supports the integration and organisation of devices and applications in a spontaneous and transparent manner. This is partly due to the ... -
Using the ODRL Profile for Access Control for Solid Pod Resource Governance
(2022)This demo shows an ODRL editor where RDF policies can be defined and enforced to grant access to personal data stored in Solid Pods. Policies are represented using OAC, the ODRL profile for Access Control, which allows ... -
Using trust for secure collaboration in uncertain environments
(2003)The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide ... -
Using Wordnet hierarchies to pinpoint differences in related texts
(2003)We present a means of comparing texts to highlight their informational differences. The system builds a Directed Acyclic Graph representation of the combined WordNet hypernym hierarchies of the nouns. Comparison of ... -
Using XML to network distributed analytical instruments: back to the future?
(Healthcare Informatics Society of Ireland, Cumann Riomheolais Slainte, 1999)There has been a paradigm shift in medical informatics standards in recent years from the message-oriented approach to a more distributed systems approach. However, despite all the early promise of distributed applications, ... -
UTCP: compositional semantics for shared-variable concurrency
(Springer, 2017) -
Utilising Semantic Web Ontologies To Publish Experimental Workflows
(2017)Reproducibility in experiments is necessary to verify claims and to reuse prior work in experiments that advance research. However, the traditional model of publication validates research claims through peer-review ... -
Utilizing context in adaptive information services for pervasive computing environments
(2004)Ubiquitous and pervasive computing environments have the potential to provide rich sources of information about a user and their surroundings. Such context information may form a ba-sis upon which Adaptive Information ... -
Utilizing Social Networks for User Model Priming: User Attitudes
(2013)Research on user modeling based on social network information has shown that some user characteristics can be accurately inferred from users? digital traces. This kind of information can be used to inform user models ... -
UTP Semantics for Shared-State, Concurrent, Context-Sensitive Process Models
(IEEE Computer Society, 2016) -
UTP2: Higher-Order Equational Reasoning by Pointing
(2014)We describe a prototype theorem prover, U.(TP)2, developed to match the style of hand-written proof work in the Unifying Theories of Programming semantical framework. This is based on alphabetised predicates in a 2nd-order ... -
UTPCalc - A calculator for UTP Predicates
(Springer International Publishing, 2017) -
Validating Interlinks between Linked Data Datasets with the SUMMR Methodology
(Springer Verlag, 2016) -
VAMP – a vision based sensor network for health care hygiene
(Springer, Berlin, Heidelberg, 2008)Adequate hand-washing has been shown to be a critical activity in preventing the transmission of infections such as MRSA in health-care environments. Hand-washing guidelines published by various health-care related ... -
VGDD: A virtual grid based data dissemination scheme for wireless sensor networks with mobile sink
(2015)Wireless sensor network (WSN) is considered as the enabling technology to bridge the gap between the physical and digital world. Some of the applications environments of WSN require a mobile sink to operate in the sensor ...