Computer Science (Scholarly Publications): Recent submissions
Now showing items 921-940 of 1420
-
An Aspect-Oriented, Model-Driven Approach to Functional Hardware Verification
(2011)The cost of correcting errors in the design of an embedded system?s hardware components can be higher than for its software components, making it important to test as early as possible. Testing hardware components before ... -
A practical solution for achieving language compatibility in scripting language compilers
(2012)Although scripting languages have become very popular, even mature scripting language implementations remain interpreted. Several compilers and reimplementations have been attempted, generally focusing on performance. Based ... -
Developing an electronic health record (EHR) for methadone treatment recording and decision support
(2011)Background: In this paper, we give an overview of methadone treatment in Ireland and outline the rationale for designing an electronic health record (EHR) with extensibility, interoperability and decision support ... -
Assessing Support Requirements for Multidisciplinary Team Meetings
(IEEE, 2010)This paper profiles multidisciplinary team activity (MDT) in a typical teaching hospital setting and reports on a survey conducted among the teams to establish the information needs and constraints which affect their ... -
What makes a great mobile digital art exhibition
(Hacettepe University Department of Information Management, 2011)Passive reception and consumption of art is a given, in our times. Artists produce. Spectators consume. At the nexus stands the curator who chooses the produce and the exhibitor who provides the space for consumers. This ... -
Federated homes: Secure sharing of home services
(IEEE, 2011)This paper presents an architecture which allows consumers to securely share the services available in their home networks with remote third parties. It is implemented as a software service which can be installed on a ... -
Opportunistic Detection of Relative Mobility in Wireless Sensor Networks
(IEEE, 2010)In highly mobile ad hoc networks the neighbourhood status evolves rapidly. Routing tables which are populated with an ?out of date? view of the neighbourhood produce an overhead in the routing process which can affect ... -
Patient-Centred Laboratory Validation Using Software Agents
(2008)Guidelines are self-contained documents which healthcare professionals reference to obtain knowledge about a specific condition or process. They interface with these documents and apply known facts about specific patients ... -
Software Agents Representing Medical Guidelines.
(2008)Guidelines are self-contained documents which healthcare professionals reference to obtain specific disease or medical condition knowledge for a particular population cohort. They view these documents and apply known ... -
Dynamically Adjusting Digital Educational Games Towards Learning Objectives
(2010)Personalization techniques offer the possibility to tailor each learner?s experience of a Digital Educational Game (DEG) to their specific needs. Such personalizations can adapt the challenge and difficulty of the DEG ... -
Towards Non-expert Users Monitoring Networks and Services through Semantically Enhanced Visualizations
(2010)Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources. This presents a significant challenge as ... -
Extending a Knowledge-based Network to support Temporal Event Reasoning
(IEEE, 2010)While the polling or request/response paradigm adopted by many network and systems management approaches form the backbone of modern monitoring and management systems, the most important and interesting events, faults, ... -
Automatic Segmentation and Inpainting of Specular Highlights for Endoscopic Imaging
(2010)Minimally invasive medical procedures have become increasingly common in today's healthcare practice. Images taken during such procedures largely show tissues of human organs, such as the mucosa of the gastrointestinal ... -
Leaky or Guessable Session Identifiers
(IEEE, 2011)Many Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in ... -
Face Reality: Investigating the Uncanny Valley for virtual faces
(2010)The Uncanny Valley (UV) has become a standard term for the theory that near-photorealistic virtual humans often appear unintentionally erie or creepy. This UV theory was ?rst hypothesized by robotics professor Masahiro ... -
An Interactive Context Simulator for Rapid Evaluation of Smart Building Applications using Virtual Reality
(2011)This paper describes the SimCon (Simulated Context) Generator which combines data on the state of a Virtual Reality building with the SimCon Model to generate interactive location context for the rapid evaluation of Smart ... -
Automatic Metadata Extraction from Multilingual Enterprise Content
(2010)Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization/personalized information delivery is ... -
DCU-TCD@LogCLEF 2010: Re-ranking Document Collections and Query Performance Estimation
(2010-09-23)Abstract. This paper describes the collaborative participation of Dublin City University and Trinity College Dublin in LogCLEF 2010. Two sets of experiments were conducted. First, different aspects of the TEL query logs ... -
Leveraging Domain Expertise to Support Complex, Personalized and Semantically Meaningful Queries Across Separate Data Sources
(IEEE, 2010)Abstract?Almost all information domains have witnessed an exponential increase in the amount of structured data available. However, there is still a lack of support for ordinary users to create complex queries spanning ... -
Towards a UTP-style framework to deal with probabilities
(TCD-CS Technical Reports, 2011)We present an encoding of the semantics of the probabilistic guarded command language (pGCL) in the Unifying Theories of Programming (UTP) framework. Our contribution is a UTP encoding that captures pGCL programs as ...