Now showing items 659-678 of 1381

    • Is Your Application Gender Biased? 

      Ribeiro Lopes, Milena; Vogel, Carl (2019)
      The process of design is underpinned by a solid methodology that comprises stages of research, creation and validation of the ideas in order to ensure that a product or a service will meet the users’ needs. However, in the ...
    • Isosurface Extraction on the CELL Processor 

      O'CONOR, KEITH; O'SULLIVAN, CAROL; COLLINS, STEVEN (2006)
      In this paper we describe a parallel method of extracting isosurfaces from large volumetric datasets, adapted for implementation on the Cell Broadband Engine (CBE). The CBE is a new multicore microprocessor architecture ...
    • Issues in Internetworking Wireless Data Networks for Mobile Computing 

      HAAHR, MADS (IEEE, 1995)
      There are many issues specijk to the area of mobile computing which need to be addressed This paper will discuss the particular issues of mobile hosts, network management and security.
    • Issues Relating to Trust in Care Agents for the Elderly 

      Spillane, Brendan; Gilmartin, Emer; Saam, Christian; Wade, Vincent (ACM, 2019-08-22)
      There is increasing academic interest in and commercial development of care agents to assist with the care of the elderly in the home. This paper defines some of the under-explored questions and issues relating to trust. ...
    • It's your choice - on the design and implementation of a flexible metalevel architecture 

      CAHILL, VINNY (IEEE Computer Society, 1996)
      Traditional configurable operating systems typically provide a fixed and limited set of functionality. We propose a metalevel architecture, where application-defined objects can choose from a rich selection of possible ...
    • Jack B. Yeats AR and other Art Music 

      Haahr, Mads; Mc Donnell, Maura (National Concert Hall, Ireland, 2022)
    • Joint Dynamic Bandwidth and Queue Management for Upstream SLA-Oriented QoS in Multi-Tenant, Multi-Service PONs 

      Ruffini, Marco (2020)
      We devise a PON upstream scheduler that jointly manages intra-ONT and inter-ONT capacity across VNOs. This provides balancing between throughput and delay, providing SLA-oriented QoS supporting low latency 5G applications ...
    • ?Just-in-time? generation of datasets by considering structured representations of given consent for GDPR compliance 

      Debruyne, Christophe; Lewis, David; O'Sullivan, Declan (2020)
      Data processing is increasingly becoming the subject of various policies and regulations, such as the European General Data Protection Regulation (GDPR) that came into effect in May 2018. One important aspect of GDPR is ...
    • A k-anonymous approach to privacy preserving collaborative filtering 

      PATSAKIS, KONSTANTINOS (2015)
      This article proposes a new technique for Privacy Preserving Collaborative Filtering (PPCF) based on microaggregation, which provides accurate recommendations estimated from perturbed data whilst guaranteeing user k-anonymity. ...
    • Kaffemik: a distributed JVM on a single address space 

      CAHILL, VINNY; WEBER, STEFAN (2001)
      Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
    • Kaffemik: Supporting a distributed JVM on a single address space architecture. 

      CAHILL, VINNY; WEBER, STEFAN (2001)
      Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
    • Keyimages ontologized for the Cultural Masses 

      MAC an AIRCHINNIGH, MICHEAL (University of Sofia, 2011)
      Humans name things. Naming is essential for pointing to recognizable images, sounds, and emotions. In every culture throughout history certain stereotypical images have emerged to indicate grounded truths for the people. ...
    • Keys don't grow in threes 

      FARRELL, STEPHEN (IEEE, 2009)
      Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
    • Knowledge Based Networking 

      KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN; JONES, DOMINIC HUGH; SONG, GUO (IGI Global, 2009)
      Knowledge-Based Networking, which is built on-top of Content-based Networking (CBN), involves the forwarding of events across a network of brokers based on subscription filters applied to some semantics of the data and ...
    • Knowledge Delivery Mechanism for Autonomic Overlay Network Management 

      O'Sullivan, Declan; Lewis, David (IEEE, 2009)
      The complexity of current computing networks and the required fluidity of their operation requires autonomy to be central to the design and implementation of a managed overlay network. This paper presents a system in which ...
    • Knowledge-based Networking 

      O'SULLIVAN, DECLAN; LEWIS, DAVID; KEENEY, JOHN; JONES, DOMINIC HUGH (2008)
    • Knowledge-based Semantic Clustering 

      KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN (2008)
      Users of the web are increasingly interested in tracking the appearance of new postings rather than locating existing knowledge. Coupled with this is the emergence of the Web 2.0 movement (where everyone effectively ...
    • Kosmoscope: A Seismic Observatory 

      HAAHR, MADS; Redfern, Tim (ACM, 2009)
      Earth tremors are a constant, intrinsic part of our planet's nature and a visceral experience when first encountered. Kosmoscope, a telematic art installation by Tim Redfern, marries two venerable technologies, the ...