Now showing items 161-180 of 280

    • Ad-hoc Internet Connectivity 

      Curran, Eoin; Dowling, Jim (Trinity College Dublin, Department of Computer Science, 2003-05-28)
      For a large class of wireless networks connectivity to fixed services such as the internet will be essential. However, since nodes in a wireless network are mobile, their point of connectivity to a fixed network may be ...
    • Risk Probability Estimating Based on Clustering 

      Chen, Yong; Jensen, Christian D.; Gray, Elizabeth; Seigneur, Jean-Marc (Trinity College Dublin, Department of Computer Science, 2003-05-21)
      Ubiquitous computing environments are highly dynamic, with new unforeseen circumstances and constantly changing environments, which introduces new risks that cannot be assessed through traditional means of risk analysis. ...
    • Trust Propagation in Small Worlds 

      Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong; Jensen, Christian D. (Trinity College Dublin, Department of Computer Science, 2003-04-30)
      The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ...
    • Partial Outsourcing: A New Paradigm for Access Control 

      Abendroth, Joerg; Jensen, Christian D. (Trinity College Dublin, Department of Computer Science, 2003-04-28)
      Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a system ...
    • A Unified Security Framework for Networked Applications 

      Abendroth, Joerg; Jensen, Christian D. (Trinity College Dublin, Department of Computer Science, 2003-04-23)
      Various security models have been proposed for different types of applications and numerous types of execution environments. These models are typically reinforced by adding code to the application, which authenticates ...
    • An Evaluation of the Usefulness of Case-Based Explanation 

      Cunningham, Padraig; Doyle, Donal; Loughrey, John (Trinity College Dublin, Department of Computer Science, 2003)
      One of the perceived benefits of Case-Based Reasoning (CBR) is the potential to use retrieved cases to explain predictions. Surprisingly, this aspect of CBR has not been much researched. There has been some early work on ...
    • Case-Based Plan Recognition in Computer Games 

      Fagan, Michael; Cunningham, Padraig (Trinity College Dublin, Department of Computer Science, 2003)
      In this paper we explore the use of case-based plan recognition to predict a player?s actions in a computer game. The game we work with is the classic Space Invaders game and we show that case-based plan recognition ...
    • Discovering genome expression patterns with self-organizing neural networks 

      Azuaje, Francisco (Trinity College Dublin, Department of Computer Science, 2002)
      Self-organizing neural networks represent a family of useful clusteringbased classification methods in several application domains. One such technique is the Kohonen Self-Organizing Feature Map ...
    • Simulation Frameworks for the Teaching and Learning of Distributed Algorithms 

      O'Donnell, Fionnuala (University of Dublin, Trinity College. Department of Computer Science, 2006-02)
      Teaching and learning about distributed algorithms is difficult. This is because distributed algorithms are made up of multiple independent elements, each with their own state and control, who interact through the exchange ...
    • SOAP in a mobile Environment 

      Dolan, Liam (Trinity College Dublin. Department of Computer Science, 2004-09)
      Recent years has seen a dramatic rise in the number of mobile devices in use. These devices include PDAs, mobile phones and embedded devices such as those found in cars for satellite tracking. As the use of these devices ...
    • Automated Web Service Composition 

      Murtagh, Donal (Trinity College Dublin. Department of Computer Science, 2004-09)
      Web content has traditionally been dominated by documents intended for human interpretation. However, the recent advent of Web Services has played a key role in evolving the Web from a mere document repository to a provider ...
    • SourceWeave.Net: Cross Language Source Code Weaving 

      Jackson, Andrew (Trinity College Dublin. Department of Computer Science, 2003-09)
      A well modularised software system reduces complexity and supports change. Separating concerns as a means of achieving good modularisation, is therefore one of the primary principles in software engineering. In general, ...
    • Clock Synchronization for Multi-hop Ad hoc Networks 

      O'Connor, Neil (Trinity College Dublin. Department of Computer Science, 2003-09)
      Clock syncronization is one of the basic requirements of a distributed real-time systems. The greater the precision achievable by the clock synchronization algorithm used, the harder the real-time guarantees that can be ...
    • CASSANDRA : A Collaborative Anti Spam System Allowing Node Decentralised Research Algorithms 

      Gray, Alan (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2003-09)
      Email has become a critical tool in many people's lives, both professionally and personally. It is easily accessible, inexpensive, fast, versatile and is far-reaching both in terms of the number and spectrum of people to ...
    • Personalised E-Learning Through Learning Style Aware Adaptive Systems 

      Canavan, John (Trinity College Dublin. Department of Computer Science, 2004-09)
      There are many factors than can influence the extent of learning. These would include factors such as the student's learning style and motivation for learning. In a learning environment, each individual student will have ...
    • Direction Based Routing for Mobile Ad Hoc Networks 

      Nedos, Andronikos (Trinity College Dublin. Department of Computer Science, 2001-09)
      A Mobile Ad Hoc Network is comprised of nodes with wireless interfaces that are able to move arbitrarily, changing the network topology as they do so. Designing a routing protocol for such a network, where connections can ...
    • A Policy Creation and Enforcement Environment for an IP Network 

      McDonagh, Mark (Trinity College Dublin. Department of Computer Science, 2001-09)
      There is an increasing number of applications designed to run on the Internet whose Quality of Service (QoS) requirement is higher than the current offering from the IP network that being best effort. There has been a call ...
    • Planning for Migration to a Next Generation Network 

      Hovland, Eirik (Trinity College Dublin. Department of Computer Science, 2001-09)
      This thesis describes the development of a software planning tool to be used in the migration process from a Public Switched Telephone Network to a Next Generation Network. The tool calculates the benefits obtained by ...
    • Proactive Persistent Agents - Using Situational Intelligence to Create Support Characters in Character-Centric Computer Games 

      Mac Namee, Brian (University of Dublin, Trinity College. Department of Computer Science, 2004-01)
      Throughout the 1990's computer game development was dominated by the improvement of game graphics. However, graphical excellence is now the norm rather than the exception, and so other technologies are coming to the fore ...
    • Peer-to-Peer Applications in Ad Hoc Wireless Networks 

      Liu, Haixia (Trinity College Dublin. Department of Computer Science, 2002-09)
      With the rapid development of wireless technology, more and more people are equipped with mobile devices, which allow them to communicate and share resources with each other. The combination of mobility and wireless ...