Now showing items 223-242 of 2087

    • Beyond the Role Model: Organisational modelling in policy based management systems 

      FEENEY, KEVIN (2003)
      In this paper, we discuss recent developments in the field of Policy Based Management (PBM) and Role Based Access Control (RBAC).We postulate that PBM tends towards a total description of an organisation?s operations. We ...
    • Bezier Curves for Camera Motion 

      Buckley, Colm (Trinity College Dublin, Department of Computer Science, 1994-12)
      This paper describes an attempt to address some of the deficiencies and infelicities associated with the use of piecewise Bezier segments when constructing a smooth path for a camera in a computer animation. In particular, ...
    • Binding- and Port-Agnostic Service Composition using a P2P SOA 

      MEIER, RENE (IBM T.J. Watson Research Center, 2005)
      The assumption of the availability of port information at design time of service compositions in Service-Oriented Architectures (SOAs) is not valid for an increasing number of hosts on the Internet that do not have a ...
    • Biometric retrieval of cryptographic keys 

      Ní Fhloinn, Eabhnat (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2006)
      The problem statement addressed in this thesis is the creation of the first biometric key retrieval scheme capable of protecting private keys used in all three types of public-key cryptosystems: those that rely on the ...
    • Bisimulations for Communicating Transactions (Extended Abstract) 

      HENNESSY, MATTHEW; KOUTAVAS, VASILEIOS; Spaccasassi, Carlo (Springer Berlin Heidelberg, 2014)
      We develop a theory of bisimulations for a simple language containing communicating transactions, obtained by dropping the isolation requirement of standard transactions. Such constructs have emerged as a useful programming ...
    • Blame-Based Noise Reduction: An Alternative Perspective on Noise Reduction for Lazy Learning 

      Pasquier, Francois-Xavier; Delany, Sarah Jane; Cunningham, Padraig (Trinity College Dublin, Department of Computer Science, 2005-02-22)
      In this paper we present a new perspective on noise reduction for nearest-neighbour classifiers. Classic noise reduction algorithms such as Repeated Edited Nearest Neighbour remove cases from the training set if they are ...
    • A Block-structured Optimization Approach for Data Sensing and Computing in Vehicle-assisted Edge Computing Networks 

      Pham, Viet (2024)
      With the rapid development of IoT applications and multi-access edge computing (MEC) technology, massive amounts of sensing data can be collected and transmitted to MEC servers for rapid processing. On the other hand, ...
    • Blockchain Backed DNSSEC 

      Tewari, Hitesh (Springer, Cham, 2018)
    • Blockchain Layer2 Based Mass E-Commerce 

      Zhao, Sijia (Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2023)
      Blockchain technology has become a new driving force for technological innovation and has the potential to revolutionize the e-commerce industry. Hundreds of millions of users, merchants and platforms can be connected to ...
    • BMCProtector: A Blockchain and Smart Contract Based Application for Music Copyright Protection 

      O'Mahony, Donal (2018)
      n this paper, we explore the design and construct a prototype implementation of an Ethereum application, BMCProtector, which is based on Blockchain and Smart Contract technology, to protect music copyright and ensure rights ...
    • Bottom-up visual attention for autonomous virtual human animation 

      Peters, Christopher (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2004)
      Animating autonomous virtual humans in a plausible manner is a difficult proposition. As social creatures, humans must be able to interact with each other from an early age and communication is often subject to many nuances. ...
    • Bottom-up visual attention for virtual human animation 

      PETERS, CHRISTOPHER; O'SULLIVAN, CAROL ANN (IEEE Computer Society, 2003)
      We present a system for the automatic generation of bottom-up visual attention behaviours in virtual humans. Bottom-up attention refers to the way in which the environment solicits one?s attention without regard ...
    • Bounding volume hierarchies for level-of-detail collision handling 

      Bradshaw, Gareth (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2002)
      Enforcing solidity of objects within simulations is a major computational overhead. Detecting interactions between bodies is a large part of this overhead. Many researchers have used hybrid collision detection algorithms ...
    • Breaking out for Bologna 2010 

      MAC an AIRCHINNIGH, MICHEAL (2010-04-07)
    • Brexit has us all on Edge 

      FLYNN, DANIEL ROGER (Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2019)
      In this piece of research, we examine the evolution of sentiment proxies, commonly used to account for investor behaviour in the financial economics literature. Advancements in computing techniques, such as sentiment ...
    • Bridge21 : a model for team based technology, mediated learning in and out of school context 

      Lawlor, John (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2017)
    • The Bridge21 model of technology-mediated, team-based, 21st century learning in post-primary classrooms in Ireland 

      CONNEELY, CLAIRE (Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2018)
      The classroom of the future is generally described in terms of the availability and use of the latest advances in technology as a central component, along with student-centred, skills-focussed pedagogies. A common pattern ...
    • Bridging Bonobo Components 

      Squalli Houssaini, Abdelmalek (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2001-09)
      To manage the increasing complexity of software, many modern and large applications make use of components. GNOME, the free desktop environment for UNIX like systems, has created its own component model, namely Bonobo. The ...
    • Bridging boundaries: CORBA in perspective. 

      CAHILL, VINNY (1997)
      pplications that cross the boundaries of different computing machines, operating systems, and programming languages are increasingly the norm. As a result, the need for what might be called ?bridging technologies? ...
    • Bridging secure WebCom and European DataGrid security for multiple VOs over multiple grids 

      COGHLAN, BRIAN ARTHUR; O'CALLAGHAN, DAVID (IEEE, 2004)
      Secure job submission across multiple virtual organisations becomes more important as Grids proliferate. WebCom-G will bring together the condensed graph model of computing and existing Grid software from the European ...