Computer Science: Recent submissions
Now showing items 1121-1140 of 2149
-
Anonymous FreeSpeech
(2014)In public and private discourse, some may be heard to express disquiet about the supposed dangers of anonymity. Anonymous suggestion boxes may be classed with anonymous accusation of crime with the accusation forming the ... -
Acceleration of cryptographic
(Trinity College Dublin. School of Computer Science and Statistics. Computer Science, Dublin, 2010)Graphics processing units (GPUs) can act as an attractive alternative to CPUs for general purpose computation in certain scenarios. Traditionally, the GPU has been developed to offload graphics processing from the CPU. In ... -
Using stigmergy to build pervasive computing environments
(Trinity College Dublin. School of Computer Science and Statistics. Computer Science, Dublin, 2005)Pervasive computing looks beyond the age of the personal computer to a time when everyday devices will be embedded with technology and connectivity. The goal of pervasive computing is to make such devices available throughout ... -
PPPJ Special Issue - Foreword
(2009) -
A Feature Model of Actor, Agent, Functional, Object, and Procedural Programming Languages
(2015)The number of programming languages is large [1] and steadily increasing [2]. However, little structured information and empirical evidence is available to help software engineers assess the suitability of a language for ... -
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems
(Springer Berlin Heidelberg, 2012) -
Generalizing ITS as an Interoperable Annotation Technique for Global Intelligent Content
(2013)This paper considers how the interoperable content annotation techniques developed to address the needs of localization processing chains could be applied to a broader class of content processing. We extract the content ... -
A Convex-Space Discretization of a Building, Designed for Indoor Resource Optimisation using Ray-Tracing Techniques
(2014)The purpose of this work is to provide a fast multipoint ray-tracing algorithm when the location of many transmitters is not fixed. When optimising the location of multiple transmitters numerically using an optimization ... -
An Indoor Resource Optimisation using Ray-Tracing Techniques and Signal-To-Interference Object Function to Obtain Best Capacity
(2014)The purpose of this work is to produce a method that calculates the best locations of a multiple transmitters in an indoor environment whilst meeting the required user capacity. The method uses a non-standard building ... -
N-gram Distributions in Texts as Proxy for Textual Fingerprints
(IOS Press, 2007)Recent experiments using mainly character unigram distributions in authorship attribution tasks are discussed. Results so far indicate efficacy in similarity judgements seemingly good enough for `balance of probabilities' ... -
Customized Services over Virtual Wireless Networks: The Path towards Networks without Borders
(2013)We propose a new architecture to enable wireless networks to meet th e challenges of ever - increasing demand for high data rate services and ubiquitous connectivity, heterogeneity of access technologies, and spectrum ... -
Untitled
(2000)The increase in mobile communications traffic has led to heightened interest in the use of deterministic propagation methods together with digital building and terrain databases for propagation prediction in urban areas. ... -
Social Grid Agents
(IGI Global, 2010)Computational and Data Grids: Principles, Applications and Design offers critical perspectives on theoretical frameworks, methodologies, implementations, and cutting edge research in grid computing, bridging the gap between ... -
The HELIO project
(2010) -
Fast numerical calculation of UHF propagation over two dimensional dielectric irregular terrain using an integral equation method
(1997)In this paper we describe a new high speed method for the calculation of UHF propagation over irregular terrain which is considered to be a homogeneous dielectric. The method, given that it is rigorous and includes both ...