Sort by: Order: Results:

Now showing items 1051-1070 of 2090

  • JXTA, In the Support of User Migration Across Smart Spaces 

    Commins, Martin (Trinity College Dublin. Department of Computer Science, 2002-09)
    ?Smart Spaces? are environments with traditional computing hardware as well as embedded computers, information appliances, and multi-modal sensors. The goal of a smart space is to sense, recognise and understand the tasks ...
  • A k-anonymous approach to privacy preserving collaborative filtering 

    PATSAKIS, KONSTANTINOS (2015)
    This article proposes a new technique for Privacy Preserving Collaborative Filtering (PPCF) based on microaggregation, which provides accurate recommendations estimated from perturbed data whilst guaranteeing user k-anonymity. ...
  • k-NN approach for classifying semantic roles via Tai-mapping projections 

    Franco-Penya, Hector-Hugo (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2013)
    Semantic role labelling (SRL) is the task of labelling text with a semantic notation in order to identify who did what? When? How? Etc. Once the text is labelled; that information can be used to solve a multitude of other ...
  • KAFCA : knowledge autonomy for reactive context-aware applications 

    O'Connor, Neil (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2010)
    Pervasive computing represents a vision of networked computers being distributed throughout our everyday environment in order to transparently provide services to people. The use of sensors enables the deployment of so-called ...
  • Kaffemik: a distributed JVM on a single address space 

    CAHILL, VINNY; WEBER, STEFAN (2001)
    Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
  • Kaffemik: Supporting a distributed JVM on a single address space architecture. 

    CAHILL, VINNY; WEBER, STEFAN (2001)
    Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
  • Keeping connected in care : development of technology to stimulate social interaction among older people in care facilities 

    McDonnell, Ronan (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2012)
    Care settings for older people, such as nursing homes, can have low levels of social engagement. Social interaction has been shown in many studies as being crucial to both the mental and physical well-being of older adults. ...
  • Key challenges in the current TB & HIV information system in South Africa : a case study in Khayelitsha, Western Cape 

    Koivu, Annariina (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2015)
    South Africa has one of the most serious human immunodeficiency virus (HIV) / and tuberculosis (TB) epidemics in the world, with high incidence, prevalence and co-infection rates. Information is at the heart of managing ...
  • Keyimages ontologized for the Cultural Masses 

    MAC an AIRCHINNIGH, MICHEAL (University of Sofia, 2011)
    Humans name things. Naming is essential for pointing to recognizable images, sounds, and emotions. In every culture throughout history certain stereotypical images have emerged to indicate grounded truths for the people. ...
  • Keys don't grow in threes 

    FARRELL, STEPHEN (IEEE, 2009)
    Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
  • Knowledge Based Networking 

    KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN; JONES, DOMINIC HUGH; SONG, GUO (IGI Global, 2009)
    Knowledge-Based Networking, which is built on-top of Content-based Networking (CBN), involves the forwarding of events across a network of brokers based on subscription filters applied to some semantics of the data and ...
  • Knowledge Delivery Mechanism for Autonomic Overlay Network Management 

    O'Sullivan, Declan; Lewis, David (IEEE, 2009)
    The complexity of current computing networks and the required fluidity of their operation requires autonomy to be central to the design and implementation of a managed overlay network. This paper presents a system in which ...
  • Knowledge Discovery in Microbiology Data: Analysis of Antibiotic Resistance in Nosocomial Infections 

    Tsymbal, Alexey (Trinity College Dublin, Department of Computer Science, 2005)
    The goal of this paper is to address the currently serious problem of antibiotic resistance applying knowledge discovery techniques to real hospital data. In this paper we introduce our approach to that problem and the ...
  • Knowledge Engineering in a Real World Case-Based Reasoning Application 

    Cunningham, Padraig; Bonzano, Andrea (Trinity College Dublin, Department of Computer Science, 1999-05)
    Case-Based Reasoning (CBR) has emerged from research in cognitive psychology as a model of human memory and remembering. It has been embraced by researchers of AI applications as a methodology that avoids some of the ...
  • Knowledge Engineering Requirements in Derivational Analogy 

    Cunningham, Padraig; Finn, Donal; Slattery, Sean (Trinity College Dublin, Department of Computer Science, 1996-08)
    A major advantage in using a case-based approach to developing knowledge-based systems is that it can be applied to problems where a strong domain theory may be difficult to determine. However the development of case-based ...
  • Knowledge Engineering Requirements in Derivational Analogy 

    Cunningham, Padraig; Slattery, Sean; Finn, Donal (Trinity College Dublin, Department of Computer Science, 1993-09)
    A major advantage in using a case-based approach to developing knowledge-based systems is that it can be applied to problems where a strong domain theory may be difficult to determine. However the development of case-based ...
  • The knowledge representation and algorithm for personalized infectious disease risk prediction 

    VINARTI, RETNO AULIA (Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2019)
    Infectious diseases are a major cause of human morbidity. However, in the EU in 2014 more than 40 thousand deaths caused by infectious diseases were considered preventable. Information about infection risk based on personal ...
  • Knowledge-based Networking 

    O'SULLIVAN, DECLAN; LEWIS, DAVID; KEENEY, JOHN; JONES, DOMINIC HUGH (2008)
  • Knowledge-based Semantic Clustering 

    KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN (2008)
    Users of the web are increasingly interested in tracking the appearance of new postings rather than locating existing knowledge. Coupled with this is the emergence of the Web 2.0 movement (where everyone effectively ...