Computer Science: Recent submissions
Now showing items 1641-1660 of 2149
-
Towards a vision of an Internet of Cultural Things
(2009)The Internet of Cultural Things (IoCT) is a phrase we use to denote all those cultural heritage artefacts which have been assigned their own unique IPv6 address and which are equipped with appropriate wireless ... -
Towards a context-aware framework for pervasive computing authorization management
(2005)Pervasive computing environments have by definition three main inherent properties; extremely open and dynamic nature, suggesting large number of interactions among previously unknown entities, the ability to adapt ... -
Twohop: Metric-based trust evaluation for peer-to-peer collaboration environments
(IEEE, 2008)Communications are increasingly relying on peer-to-peer models of interaction in which all participating entities have the same level of authority. Such models allow developed systems to overcome single points of failure, ... -
Grouping abstraction and authority control in policy-based spectrum management
(IEEE, 2007)The management of dynamic spectrum access requires the coordination of administrative functions across multiple organizations, from regulators to secondary market operators and commons cooperatives. Policy-based management ... -
Real-time Intrusion Detection for Ad hoc Networks
(IEEE, 2005)A mobile ad hoc network is a collection of nodes that are connected through a wireless medium and form rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such ... -
PR3 Email Honeypot
(2003)Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss ... -
Influencing User Attention Using Real-Time Stylised Rendering
(2009)In this paper, we present a series of experiments that were conducted to determine how using adaptive levels of artistic abstraction within an interactive 3D scene can influence user gaze behaviour. We found that when ... -
Dynamic Hypertext Generation for Reusing Open Corpus Content
(ACM, 2009)Adaptive hypermedia systems traditionally focus on providing personalised learning services for formal or informal learners. The learning material is typically sourced from a proprietary set of closed corpus content. A ... -
From Subjects to Concept Clouds - Why semantic mapping is necessary
(2008)To realize the vision of the semantic web it is essential to be able to exchange formal modeled knowledge between applications and humans without loss of meaning. In this paper, we focus on questions relating to meaning, ... -
GTMalpha - Towards a Graphical Notation for Topic Maps
(LIV Series University of Leipzig, Germany, 2008)In the last years several drafts, recommendations and concepts for a graphical notation for Topic Maps have been published, but till today no graphical notation is generally approved and used in the Topic Maps community. ... -
Evaluation of Ontology Mapping Representations
(2009)A common approach to mitigate the effects of ontology heterogeneity is to discover and express the specific correspondences between different ontologies. An open research question is: how should such ontology mappings be ... -
Sentiment in German language news and blogs, and the DAX
(Leipziger Beitrage zur Informatik, 2009)An analysis of a diachronically organised corpus of Germanlanguage newspaper articles and blog posts on economy and finance is presented using a prototype dictionary of affect in German. The changes in the frequency of ... -
Correlating market movements with consumer confidence and sentiments: a longitudinal study
(Leipzeiger Beitrage zur Informatik, 2009)An analysis of the return and volatility of major stock market indices (S&P 500, Nikkei, and ISEQ 20), consumer confidence surveys (Michigan, Irish and Japanese consumer confidence) and affect content of economic news about ... -
Accelerated Entry Point Search Algorithm for Real Time Ray Tracing
(2009)Traversing an acceleration data structure, such as the Bounding Volume Hierarchy or kD-tree, takes a significant amount of the total time to render a frame in real-time ray tracing. We present a two phase algorithm based ... -
On Using Profiles to Create Self-Organizing Peer-To-Peer Networks
(IEEE, 2005)Searching and organization of peers are fundamental challenges in P2P networks. Unstructured networks, such as Gnutella, inefficiently use broadcast searches and random neighbors. Structured networks are similarly ... -
Decentralized Clustering in Pure P2P Overlay Networks Using Schelling's Model
(IEEE, 2007)Clustering involves arranging a P2P overlay network?s topology so that peers having certain characteristics are grouped together as neighbors. Clustering can be used to organize a P2P overlay network so that requests ... -
A Peer-to-Peer Reference Architecture
(IEEE, 2006)Peer-to-Peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralised manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to ... -
A Framework for Developing Mobile, Context-aware Applications
(2004)The emergence of truly ubiquitous computing, enabled by the availability of mobile, heterogenous devices that supply context information, is currently hampered by the lack of programming support for the design and ...