Browsing Computer Science (Scholarly Publications) by Title
Now showing items 1011-1030 of 1381
-
Saffron: A Data Value Assessment Tool for Quantifying the Value of Data Assets
(2019)Data has become an indispensable commodity and it is the basis for many products and services. It has become increasingly important to understand the value of this data in order to be able to exploit it and reap the full ... -
SAMoD: Shared Autonomous Mobility-on-Demand using Decentralized Reinforcement Learning
(2018)Shared mobility-on-demand systems can improve the efficiency of urban mobility through reduced vehicle ownership and parking demand. However, some issues in their implementations remain open, most notably the issue of ... -
Saoithín: A Theorem Prover for UTP
(Springer, 2010)Saoithín is a theorem prover developed to support the Unifying Theories of Programming (UTP) framework. Its primary design goal was to support the higher-order logic, alphabets, equational reasoning and “programs as ... -
Scalable Privacy
(ACM, 2017) -
Scientific publication: policy on open access (European Research Advisory Board Final Report)
(EURAB, 2006)EURAB was invited by the Commission to examine the issue of scientific publication with particular reference to policy recommendations regarding open access for Framework Programme 7 (FP7). A clear policy at European ... -
Scrutability of Intelligent Personal Assistants
(Association for Computing Machinery, 2022)Intelligent personal assistants (IPAs) have become widely available, yet they remain primarily used for discrete, straightforward tasks. By contrast, both user studies and literature reviews indicate that IPAs of the future ... -
An SDN architecture for under water search and surveillance
(IEEE, 2017) -
A SDN-Controlled Underwater MAC and Routing Testbed
(IEEE, 2016) -
Secure pay-per-view testbed
(IEEE, 1995)Trials of video on demand and pay-per-view systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace their distribution networks. Video streams ... -
Secure routing for mobile ad-hoc networks
(IEEE, 2005)In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing ... -
Security Boundaries
(2008)Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ... -
Security considerations in a network management environment
(IEEE, 1994)Considers the security aspects of communication between two management processes operating in different management domains; identifies two major risks: the security of information exchanged during the management association, ... -
Security considerations in space and delay tolerant networks
(2006)This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and ... -
Seeing is Believing: Body Motion Dominates in Multisensory Conversations
(2010)In many scenes with human characters, interacting groups are an important factor for maintaining a sense of realism. However, little is known about what makes these characters appear realistic. In this paper, we investigate ... -
Self-adapting context definition
(2007)Many approaches to context-aware computing have focused on providing means for developers to define application contexts. In these approaches, correct application behavior depends on the developer defining the right contexts. ... -
Self-managed decentralised systems using K-Components and collaborative reinforcement learning
(ACM, 2004)Components in a decentralised system are faced with uncertainty as how to best adapt to a changing environment to maintain or optimise system performance. How can individual components learn to adapt to recover from faults ... -
Self-Organising Algorithms for Residential Demand Response
(IEEE, 2014)Residential Demand Response has shown promising results in smart grid applications. It can be achieved manually or autonomously. The variety of algorithms applied to achieve autonomous Demand Response have lacked a ...