Now showing items 668-687 of 1381

    • A k-anonymous approach to privacy preserving collaborative filtering 

      PATSAKIS, KONSTANTINOS (2015)
      This article proposes a new technique for Privacy Preserving Collaborative Filtering (PPCF) based on microaggregation, which provides accurate recommendations estimated from perturbed data whilst guaranteeing user k-anonymity. ...
    • Kaffemik: a distributed JVM on a single address space 

      CAHILL, VINNY; WEBER, STEFAN (2001)
      Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
    • Kaffemik: Supporting a distributed JVM on a single address space architecture. 

      CAHILL, VINNY; WEBER, STEFAN (2001)
      Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
    • Keyimages ontologized for the Cultural Masses 

      MAC an AIRCHINNIGH, MICHEAL (University of Sofia, 2011)
      Humans name things. Naming is essential for pointing to recognizable images, sounds, and emotions. In every culture throughout history certain stereotypical images have emerged to indicate grounded truths for the people. ...
    • Keys don't grow in threes 

      FARRELL, STEPHEN (IEEE, 2009)
      Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
    • Knowledge Based Networking 

      KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN; JONES, DOMINIC HUGH; SONG, GUO (IGI Global, 2009)
      Knowledge-Based Networking, which is built on-top of Content-based Networking (CBN), involves the forwarding of events across a network of brokers based on subscription filters applied to some semantics of the data and ...
    • Knowledge Delivery Mechanism for Autonomic Overlay Network Management 

      O'Sullivan, Declan; Lewis, David (IEEE, 2009)
      The complexity of current computing networks and the required fluidity of their operation requires autonomy to be central to the design and implementation of a managed overlay network. This paper presents a system in which ...
    • Kosmoscope: A Seismic Observatory 

      HAAHR, MADS; Redfern, Tim (ACM, 2009)
      Earth tremors are a constant, intrinsic part of our planet's nature and a visceral experience when first encountered. Kosmoscope, a telematic art installation by Tim Redfern, marries two venerable technologies, the ...
    • L2 and Linfinity Stability Analysis of Heterogeneous Traffic With Application to Parameter Optimization for the Control of Automated Vehicles 

      Bouroche, Melanie; Monteil, Julien; Leith, Douglas J. (2018)
      The presence of (partially) automated vehicles on the roads presents an opportunity to compensate the unstable behaviour of conventional vehicles. Vehicles subject to perturbations should (i) recover their equilibrium ...
    • L2 based Colour Correction for Light Field Arrays 

      Smolic, Aljosa; Grogan, Mairéad (2019)
      In recent years, there has been an increase in the popularity of Light Field (LF) imaging technology with the increase in availability of LF camera devices such as the Lytro, as well as an increase in the use of LF ...
    • Language and friendships: A co-evolution model of social and linguistic conventions 

      BACHWERK, MARTIN; VOGEL, CARL (World Scientific, 2012)
      Human social networks are dynamic, yet the majority of computational models of language evolution operate with either fixed or random interaction patterns between agents. This paper presents a model of lexicon formation ...
    • Language Model Co-occurrence Linking for Interleaved Activity Discovery 

      Kelleher, John (2020)
      As ubiquitous computer and sensor systems become abundant, the potential for automatic identification and tracking of human behaviours becomes all the more evident. Annotating complex human behaviour datasets to achieve ...
    • Language-independent aspect-oriented programming 

      CAHILL, VINNY (2003)
      The term aspect-oriented programming (AOP) has come to describe the set of programming mechanisms developed specifically to express crosscutting concerns. Since crosscutting concerns cannot be properly modularized within ...
    • A Late Fusion Approach to Cross-Lingual Document Re-ranking 

      ZHOU, DONG; WADE, VINCENT PATRICK; LAWLESS, SEAMUS (ACM, 2010)
      The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to standard bag- of-words based models. ...
    • Latent Ambiguity in Latent Semantic Analysis? 

      EMMS, MARTIN; MALDONADO GUERRA, ALFREDO (ScitePress, 2013)
    • LATTE: Location And Time Triggered Email 

      CLARKE, SIOBHAN; CAHILL, VINNY (2004)
      Computer users, especially mobile ones, have developed a significant dependency on electronic communication. Enhancing the capabilities of such communication by adding an awareness of context such as location and ...
    • Laughter and Topic Changes: Temporal Distribution and Information Flow 

      VOGEL, CARL; CAMPBELL, NICK (IEEE, 2012)
      Laughter is an important component of social interaction that has attracted interest within conversational analysis. However, it is not universally accepted that laughs have a function in discourse structure. In this study ...