Browsing Computer Science by Title
Now showing items 1596-1615 of 2087
-
Security Boundaries
(2008)Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ... -
Security considerations in a network management environment
(IEEE, 1994)Considers the security aspects of communication between two management processes operating in different management domains; identifies two major risks: the security of information exchanged during the management association, ... -
Security considerations in space and delay tolerant networks
(2006)This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and ... -
Seeing is Believing: Body Motion Dominates in Multisensory Conversations
(2010)In many scenes with human characters, interacting groups are an important factor for maintaining a sense of realism. However, little is known about what makes these characters appear realistic. In this paper, we investigate ... -
Self-Adaptation to Interlingual Machine Mediated Communication
(Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2021)One of Claude Shannon s greatest contributions to computer science is considered to be the Information Theory. Put simply, what is the minimum amount of information (data) required to obtain an acceptable outcome. Computer ... -
Self-adapting context definition
(2007)Many approaches to context-aware computing have focused on providing means for developers to define application contexts. In these approaches, correct application behavior depends on the developer defining the right contexts. ... -
Self-managed decentralised systems using K-Components and collaborative reinforcement learning
(ACM, 2004)Components in a decentralised system are faced with uncertainty as how to best adapt to a changing environment to maintain or optimise system performance. How can individual components learn to adapt to recover from faults ... -
Self-Organising Algorithms for Residential Demand Response
(IEEE, 2014)Residential Demand Response has shown promising results in smart grid applications. It can be achieved manually or autonomously. The variety of algorithms applied to achieve autonomous Demand Response have lacked a ... -
Self-organizing resource location and discovery
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2005)Networked applications were originally centered around backbone interhost communication. Over time, communications moved to a client-server model, where inter-host communication was used mainly for routing purposes. As ... -
Self-organizing topology adaptation in peer-to-peer networks
(Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2007)The peers in a Peer-to-Peer (P2P) system arrange themselves in a virtual network called the overlay network. The overlay network sits above the underlying physical network and is used to search for resources and peers, ... -
A Self-regulating Spatio-Temporal Filter for Volumetric Video Point Clouds
(Springer International Publishing, 2020,, 2020)The following work presents a self-regulating filter that is capable of performing accurate upsampling of dynamic point cloud data sequences captured using wide-baseline multi-view camera setups. This is achieved by using ... -
Self-supervised Light Field View Synthesis Using Cycle Consistency
(2020)High angular resolution is advantageous for practical applications of light fields. In order to enhance the angular resolution of light fields, view synthesis methods can be utilized to generate dense intermediate views ... -
The Semantic Combining for Exploration of Environmental and Disease Data Dashboard for Clinician Researchers
(CEUR Workshop Proceedings, 2020)While Semantic Web technologies facilitate the integration of heterogeneous data sources through the Resource Description Frame-work (RDF) and ontologies, they present an obstacle for non-technical researchers who want to ... -
Semantic Crowd Re-targeting: Implementation for Real-time Applications and User Evaluations
(2021)Crowd simulation is the act of simulating and controlling the dynamic movement of large groups of virtual characters. Crowd simulation is traditionally a complex and time-consuming process, requiring extensive manual effort ... -
Semantic Data Ingestion for Big Data Value-Driven Intelligent Analytics
(IEEE, 2018)In this position paper we describe a conceptualmodel for intelligent Big Data analytics based on both semanticand machine learning AI techniques (called AI ensembles). Theseprocesses are linked to business outcomes ... -
A Semantic Data Value Vocabulary Supporting Data Value Assessment and Measurement Integration
(SciTePress, 2018)In this paper we define the Data Value Vocabulary (DaVe) that allows for the comprehensive representation of data value. This vocabulary enables users to extend it using data value dimensions as required in the context at ... -
A Semantic framework for deterministic functional input/output
(University of Dublin, Trinity College. School of Computer Science and Statistics, 2006-03)This dissertation presents a pure functional language called Curio. This language is unusual in possessing a rigorous yet general semantics for I/O which permits both formal proofs and a fine-tuned approach to concurrency. ... -
Semantic interoperability for an autonomic knowledge delivery service
(Springer, 2005)The development and deployment of interconnected networks is being increasingly limited by their complexity and the concomitant cost of managing the operational network. Autonomic Communication aims to reduce this cost, by ...