Now showing items 1641-1660 of 2149

    • Towards a vision of an Internet of Cultural Things 

      MAC an AIRCHINNIGH, MICHEAL (2009)
      The Internet of Cultural Things (IoCT) is a phrase we use to denote all those cultural heritage artefacts which have been assigned their own unique IPv6 address and which are equipped with appropriate wireless ...
    • Estimating 3D Scene Flow from Multiple 2D Optical Flows 

      DAHYOT, ROZENN; MANZKE, MICHAEL; RUTTLE, JONATHAN LEONARD; DAHYOT, ROZENN; MANZKE, MICHAEL; RUTTLE, JONATHAN LEONARD (2009)
    • Towards a context-aware framework for pervasive computing authorization management 

      ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (2005)
      Pervasive computing environments have by definition three main inherent properties; extremely open and dynamic nature, suggesting large number of interactions among previously unknown entities, the ability to adapt ...
    • Twohop: Metric-based trust evaluation for peer-to-peer collaboration environments 

      ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (IEEE, 2008)
      Communications are increasingly relying on peer-to-peer models of interaction in which all participating entities have the same level of authority. Such models allow developed systems to overcome single points of failure, ...
    • Grouping abstraction and authority control in policy-based spectrum management 

      ARGYROUDIS, PATROKLOS; FEENEY, KEVIN; LEWIS, DAVID; NOLAN, KEITH EDWARD; O'SULLIVAN, DECLAN (IEEE, 2007)
      The management of dynamic spectrum access requires the coordination of administrative functions across multiple organizations, from regulators to secondary market operators and commons cooperatives. Policy-based management ...
    • Real-time Intrusion Detection for Ad hoc Networks 

      ARGYROUDIS, PATROKLOS; TEWARI, HITESH (IEEE, 2005)
      A mobile ad hoc network is a collection of nodes that are connected through a wireless medium and form rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such ...
    • PR3 Email Honeypot 

      ARGYROUDIS, PATROKLOS (2003)
      Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss ...
    • Influencing User Attention Using Real-Time Stylised Rendering 

      DINGLIANA, JOHN LALZOLIANA (2009)
      In this paper, we present a series of experiments that were conducted to determine how using adaptive levels of artistic abstraction within an interactive 3D scene can influence user gaze behaviour. We found that when ...
    • Dynamic Hypertext Generation for Reusing Open Corpus Content 

      LAWLESS, SEAMUS; STEICHEN, BEN; WADE, VINCENT PATRICK (ACM, 2009)
      Adaptive hypermedia systems traditionally focus on providing personalised learning services for formal or informal learners. The learning material is typically sourced from a proprietary set of closed corpus content. A ...
    • From Subjects to Concept Clouds - Why semantic mapping is necessary 

      THOMAS, HENDRIK (2008)
      To realize the vision of the semantic web it is essential to be able to exchange formal modeled knowledge between applications and humans without loss of meaning. In this paper, we focus on questions relating to meaning, ...
    • GTMalpha - Towards a Graphical Notation for Topic Maps 

      THOMAS, HENDRIK (LIV Series University of Leipzig, Germany, 2008)
      In the last years several drafts, recommendations and concepts for a graphical notation for Topic Maps have been published, but till today no graphical notation is generally approved and used in the Topic Maps community. ...
    • Evaluation of Ontology Mapping Representations 

      THOMAS, HENDRIK; BRENNAN, ROB; O'SULLIVAN, DECLAN (2009)
      A common approach to mitigate the effects of ontology heterogeneity is to discover and express the specific correspondences between different ontologies. An open research question is: how should such ontology mappings be ...
    • Sentiment in German language news and blogs, and the DAX 

      AHMAD, KHURSHID (Leipziger Beitrage zur Informatik, 2009)
      An analysis of a diachronically organised corpus of Germanlanguage newspaper articles and blog posts on economy and finance is presented using a prototype dictionary of affect in German. The changes in the frequency of ...
    • Correlating market movements with consumer confidence and sentiments: a longitudinal study 

      AHMAD, KHURSHID; KEARNEY, COLM; DALY, NICHOLAS; AHMAD, KHURSHID; KEARNEY, COLM (Leipzeiger Beitrage zur Informatik, 2009)
      An analysis of the return and volatility of major stock market indices (S&P 500, Nikkei, and ISEQ 20), consumer confidence surveys (Michigan, Irish and Japanese consumer confidence) and affect content of economic news about ...
    • Accelerated Entry Point Search Algorithm for Real Time Ray Tracing 

      COLLINS, STEVEN; MANZKE, MICHAEL; FOWLER, COLIN (2009)
      Traversing an acceleration data structure, such as the Bounding Volume Hierarchy or kD-tree, takes a significant amount of the total time to render a frame in real-time ray tracing. We present a two phase algorithm based ...
    • Error-resilience in multimedia applications over ad-hoc networks 

      DOYLE, LINDA; KOKARAM, ANIL CHRISTOPHER; O'MAHONY, DONAL EDWARD (IEEE, 2001)
    • On Using Profiles to Create Self-Organizing Peer-To-Peer Networks 

      HAAHR, MADS (IEEE, 2005)
      Searching and organization of peers are fundamental challenges in P2P networks. Unstructured networks, such as Gnutella, inefficiently use broadcast searches and random neighbors. Structured networks are similarly ...
    • Decentralized Clustering in Pure P2P Overlay Networks Using Schelling's Model 

      HAAHR, MADS; SINGH, ATUL; HAAHR, MADS; SINGH, ATUL (IEEE, 2007)
      Clustering involves arranging a P2P overlay network?s topology so that peers having certain characteristics are grouped together as neighbors. Clustering can be used to organize a P2P overlay network so that requests ...
    • A Peer-to-Peer Reference Architecture 

      HAAHR, MADS; SINGH, ATUL (IEEE, 2006)
      Peer-to-Peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralised manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to ...
    • A Framework for Developing Mobile, Context-aware Applications 

      CAHILL, VINNY (2004)
      The emergence of truly ubiquitous computing, enabled by the availability of mobile, heterogenous devices that supply context information, is currently hampered by the lack of programming support for the design and ...