Sort by: Order: Results:

Now showing items 1039-1058 of 2085

  • Java Decaffeinated: experiences building a programming language from components 

    Farragher, Linda; Dobson, Simon (Trinity College Dublin, Department of Computer Science, 2000-06)
    Most modern programming languages are complex and feature rich. Whilst this is (sometimes) an advantage for industrial-strength applications, it complicates both language teaching and language research. We describe our ...
  • Java RMI in a Mobile Environment 

    MacSweeney, Paul (Trinity College Dublin. Department of Computer Science, 2004-09)
    There are many problems that must be addressed when attempting to enhance a particular middleware programming framework, in this case Java RMI, to allow it operate effectively in a mobile environment. The Architecture ...
  • JFS: A Secure Distributed File System for Network Computers 

    O'Connell, Marcus; Nixon, Patrick (Trinity College Dublin, Department of Computer Science, 1999-03)
    Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the computing resources. With the network-centric ...
  • A Jigsaw Puzzle Metaphor for Representing Linked Data Mappings 

    CROTTI JUNIOR, ADEMAR (Trinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Science, 2019)
    This thesis presents a visual representation approach for Linked Data mappings known as Jigsaw Puzzles for Representing Mappings, or Juma. The term Linked Data refers to a set of best practices for publishing and interlinking ...
  • Joint Dynamic Bandwidth and Queue Management for Upstream SLA-Oriented QoS in Multi-Tenant, Multi-Service PONs 

    Ruffini, Marco (2020)
    We devise a PON upstream scheduler that jointly manages intra-ONT and inter-ONT capacity across VNOs. This provides balancing between throughput and delay, providing SLA-oriented QoS supporting low latency 5G applications ...
  • Journey Time Estimation Using Route Profiles 

    Bouchier, Shane (Trinity College Dublin. Department of Computer Science, 2004-09)
    Estimating journey times is of increasing importance in the modern world for the fulfilment of social and business occasions. Probably the most variable journey times are the times experienced when using a road network. ...
  • ?Just-in-time? generation of datasets by considering structured representations of given consent for GDPR compliance 

    Debruyne, Christophe; Lewis, David; O'Sullivan, Declan (2020)
    Data processing is increasingly becoming the subject of various policies and regulations, such as the European General Data Protection Regulation (GDPR) that came into effect in May 2018. One important aspect of GDPR is ...
  • JXTA, In the Support of User Migration Across Smart Spaces 

    Commins, Martin (Trinity College Dublin. Department of Computer Science, 2002-09)
    ?Smart Spaces? are environments with traditional computing hardware as well as embedded computers, information appliances, and multi-modal sensors. The goal of a smart space is to sense, recognise and understand the tasks ...
  • A k-anonymous approach to privacy preserving collaborative filtering 

    PATSAKIS, KONSTANTINOS (2015)
    This article proposes a new technique for Privacy Preserving Collaborative Filtering (PPCF) based on microaggregation, which provides accurate recommendations estimated from perturbed data whilst guaranteeing user k-anonymity. ...
  • k-NN approach for classifying semantic roles via Tai-mapping projections 

    Franco-Penya, Hector-Hugo (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2013)
    Semantic role labelling (SRL) is the task of labelling text with a semantic notation in order to identify who did what? When? How? Etc. Once the text is labelled; that information can be used to solve a multitude of other ...
  • KAFCA : knowledge autonomy for reactive context-aware applications 

    O'Connor, Neil (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2010)
    Pervasive computing represents a vision of networked computers being distributed throughout our everyday environment in order to transparently provide services to people. The use of sensors enables the deployment of so-called ...
  • Kaffemik: a distributed JVM on a single address space 

    CAHILL, VINNY; WEBER, STEFAN (2001)
    Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
  • Kaffemik: Supporting a distributed JVM on a single address space architecture. 

    CAHILL, VINNY; WEBER, STEFAN (2001)
    Java is increasingly used to develop large server applications. In order to provide powerful platforms for such applications a number of projects have proposed Java Virtual Machines (JVMs) that are based on network ...
  • Keeping connected in care : development of technology to stimulate social interaction among older people in care facilities 

    McDonnell, Ronan (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2012)
    Care settings for older people, such as nursing homes, can have low levels of social engagement. Social interaction has been shown in many studies as being crucial to both the mental and physical well-being of older adults. ...
  • Key challenges in the current TB & HIV information system in South Africa : a case study in Khayelitsha, Western Cape 

    Koivu, Annariina (Trinity College (Dublin, Ireland). School of Computer Science & Statistics, 2015)
    South Africa has one of the most serious human immunodeficiency virus (HIV) / and tuberculosis (TB) epidemics in the world, with high incidence, prevalence and co-infection rates. Information is at the heart of managing ...
  • Keyimages ontologized for the Cultural Masses 

    MAC an AIRCHINNIGH, MICHEAL (University of Sofia, 2011)
    Humans name things. Naming is essential for pointing to recognizable images, sounds, and emotions. In every culture throughout history certain stereotypical images have emerged to indicate grounded truths for the people. ...
  • Keys don't grow in threes 

    FARRELL, STEPHEN (IEEE, 2009)
    Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
  • Knowledge Based Networking 

    KEENEY, JOHN; LEWIS, DAVID; O'SULLIVAN, DECLAN; JONES, DOMINIC HUGH; SONG, GUO (IGI Global, 2009)
    Knowledge-Based Networking, which is built on-top of Content-based Networking (CBN), involves the forwarding of events across a network of brokers based on subscription filters applied to some semantics of the data and ...