Now showing items 991-1010 of 2087

    • Interactive manycore photon mapping 

      Fabianowski, Bartosz (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2011)
    • Interheap GC 

      Dardis, Simon (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2015)
      Garbage collection is the automation of memory management for computer programs. It is an important feature of both the Java and .NET environments, and it is a key component of the runtime system for many high level language ...
    • Interlinking Heterogeneous Data for Smart Energy Systems 

      O'Sullivan, Declan (Arxiv.org; Cornell University, 2019)
      Smart energy systems in general, and solar energy analysis in particular, have recently gained increasing interest. This is mainly due to stronger focus on smart energy saving solutions and recent developments in photovoltaic ...
    • Internationalization Tag Set (ITS) Version 2.0 

      LEWIS, DAVID; European Union Framework Programme 7 (FP7); 287815 (2013)
      The technology described in this document ?Internationalization Tag Set (ITS) 2.0? enhances the foundation to integrate automated processing of human language into core Web technologies. ITS 2.0 bears many commonalities ...
    • An Internet Protocol Testing Framework 

      Cashman, John (Trinity College Dublin. Department of Computer Science, 1998-09)
      As the Internet expands and proliferates it gives rise to new technologies that require supporting Internet protocols. Some recent examples include HTTP, POP, IMAP and IIOP. Internet applications are generally based on ...
    • Internet Voting Using Zcash 

      Tewari, Hitesh; Tarasov, Pavel (2017)
      Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure systems with some fundamental security and anonymity principles. Numerous ...
    • Internet Worm Detection as part of a Distributed Network Inspection System 

      Linehan, Eamonn (Trinity College Dublin. Department of Computer Science, 2004-09)
      The most widely publicized, and arguably most damaging, types of malicious traffic on the Internet today include worms, spam, viruses and denial of service attacks. Internet worms self propagate across networks exploiting ...
    • Intrinsic and extrinsic component evaluation in interactive multilingual speech applications 

      Schneider, Anne H. (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2012)
      Due to the steady progress in technology, together with the rapid increase of powerful mobile devices, the use of voice interfaces and other speech enabled technologies has invaded our every day lives. Today people talk ...
    • Introducing ADELE: A personalized intelligent companion 

      Wade, Vincent; Spillane, Brendan (2017)
      This paper introduces ADELE, a Personalized Intelligent Companion designed to engage with users through spoken dialog to help them explore topics of interest. The system will maintain a user model of information consumption ...
    • Introducing Difficulty-Levels in Pronunciation Learning 

      Cabral, Joao; Zahra, Amalia; Carson-Berndsen, Julie; Kane, Mark (International Speech Communication Association (ISCA), 2011)
      This paper presents a method to introduce the notion of a student selected difficulty level for the task of pronunciation learning of a second language. Three difficulty levels, novice, acceptable and native, are ...
    • Introducing security aspects with model transformation 

      FOX, JORGE; Jurjens, Jan (IEEE Computer Society, 2005)
      Aspect Oriented Programming and subsequently Aspect Oriented Software Development have received great attention recently and constitutes an interesting field of research in computer science. The goal of this paper is ...
    • Introduction to Immersive Video Technologies 

      Alain, Martin; Zerman, Emin (Elsevier, 2022)
      Immersive imaging technologies have become a topic of great interest in recent years due to the convergence of maturing research from different fields and broad aspects of signal and image processing, including but not ...
    • Intuitive human centric governance of pervasive computing environments 

      O'Donnell, Anthony (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2007)
      Pervasive computing proposes that in the future, human beings will be immersed in a technology rich environment, where computing power will be embedded in devices all around us. This thesis examines how such technology ...
    • Intuitive Human Governance of Autonomic Pervasive Computing Environments 

      LEWIS, DAVID; WADE, VINCENT PATRICK (IEEE, 2005)
      This paper proposes an intuitive configuration tool for autonomic pervasive computing systems. Specifically the paper presents a system for the inference of user task intentions from a variety of sensed information and ...
    • Investigating Conditional Data Value Under GDPR 

      O'Sullivan, Declan; Lewis, David; PANDIT, HARSHVARDHAN JITENDRA; Petkov, Plamen (Science Direct, 2018)
      The calculation of data value is based on the assumption of continued presence of information. When the data in consideration concerns personal information, laws such as the European General Data Protection Regulation ...
    • Investigating Entity Linking in Early English Legal Documents 

      Lawless, Seamus (2018)
      In this paper we investigate the accuracy and overall suitability of a variety of Entity Linking systems for the task of disambiguating entities in 17 th century depositions obtained during the 1641 Irish Rebellion. The ...
    • Investigating fine temporal dynamics of prosodic and lexical accommodation 

      BONIN, FRANCESCA; CAMPBELL, NICK; DE LOOZE, CELINE; VOGEL, CARL (INTERSPEECH, 2013)
      Conversational interaction is a dynamic activity in which participants engage in the construction of meaning and in establishing and maintaining social relationships. Lexical and prosodic accommodation have been observed ...