Institutions
|
About Us
|
Help
|
Gaeilge
0
1000
Home
Browse
Advanced Search
Search History
Marked List
Statistics
A
A
A
Show search options
Hide search options
Search using:
All
Any
None of these
Exact Phrase
in
Keyword (All Fields)
Title
Author
Subject
Institution
Funder
All
Any
None of these
Exact Phrase
in
Keyword (All Fields)
Title
Author
Subject
Institution
Funder
All
Any
None of these
Exact Phrase
in
Keyword (All Fields)
Title
Author
Subject
Institution
Funder
From
2104
2027
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
1959
1958
1957
1956
1955
1954
1953
1952
1951
1950
1949
1948
1947
1946
1945
1944
1943
1942
1941
1940
1939
1938
1937
1936
1935
1934
1933
1932
1931
1930
1929
1928
1927
1926
1925
1924
1923
1920
1919
1917
1916
1915
1914
1913
1912
1911
1910
1909
1908
1907
1906
1905
1904
1903
1902
1901
1900
1899
1898
1897
1896
1895
1894
1893
1892
1891
1890
1889
1888
1887
1886
1885
1884
1883
1882
1881
1880
1879
1878
1877
1876
1875
1874
1873
1872
1871
1870
1869
1868
1867
1866
1865
1864
1862
1861
1860
1859
1858
1857
1856
1855
1854
1853
1852
1851
1850
1849
1846
1842
1840
1835
1827
1825
1821
1820
1818
1817
1815
1812
1811
1810
1809
1808
1807
1806
1805
1804
1803
1802
1801
1800
1792
1790
1770
1713
1111
1000
To
2019
2104
2027
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
1959
1958
1957
1956
1955
1954
1953
1952
1951
1950
1949
1948
1947
1946
1945
1944
1943
1942
1941
1940
1939
1938
1937
1936
1935
1934
1933
1932
1931
1930
1929
1928
1927
1926
1925
1924
1923
1920
1919
1917
1916
1915
1914
1913
1912
1911
1910
1909
1908
1907
1906
1905
1904
1903
1902
1901
1900
1899
1898
1897
1896
1895
1894
1893
1892
1891
1890
1889
1888
1887
1886
1885
1884
1883
1882
1881
1880
1879
1878
1877
1876
1875
1874
1873
1872
1871
1870
1869
1868
1867
1866
1865
1864
1862
1861
1860
1859
1858
1857
1856
1855
1854
1853
1852
1851
1850
1849
1846
1842
1840
1835
1827
1825
1821
1820
1818
1817
1815
1812
1811
1810
1809
1808
1807
1806
1805
1804
1803
1802
1801
1800
1792
1790
1770
1713
1111
1000
Optionally, filter by:
(Leave unchecked to search all fields)
Item Type
Book
Book chapter
Conference item
Contribution to newspaper/magazine
Doctoral thesis
Journal article
Master thesis (research)
Master thesis (taught)
Multimedia
Patent
Report
Review
Working paper
Other
Peer Review Status
Peer reviewed
Non peer reviewed
Unknown
Institution
All Ireland Public Health Repository
Connacht-Ulster Alliance
Dublin City University
Dublin Institute of Technology
Dundalk Institute of Technology
Lenus
Marine Institute
Mary Immaculate College
Maynooth University
NUI Galway
Royal College of Surgeons in Ireland
Teagasc
Trinity College Dublin
University College Cork
University College Dublin
University of Limerick
Funder
Enterprise Ireland (EI)
Environmental Protection Agency (EPA)
Health Research Board (HRB)
Higher Education Authority (HEA)
Irish Aid
Irish Research Council for Humanities and Social Sciences (IRCHSS)
Irish Research Council for Science Engineering and Technology (IRCSET)
Marine Institute
Science Foundation Ireland (SFI)
Teagasc
Language
Irish
English
Bulgarian
Catalan; Valencian
Czech
Danish
Dutch; Flemish
French
German
Greek, Modern (1453-)
Croatian
Interlingue; Occidental
Italian
Japanese
Norwegian
Romanian; Moldavian; Moldovan
Spanish; Castilian
Serbian
Current Search:
All of 'computer' and 'science' in all fields;
2969 items found
Sort by
Relevance
Title
Author
Item type
Date
Institution
Peer review status
Language
Order
Ascending
Descending
25
50
100
per page
7
8
9
10
11
12
13
14
15
16
17
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Displaying Results 276 - 300 of 2969 on page 12 of 119
Marked
Mark
Proactive Persistent Agents - Using Situational Intelligence to Create Support Characters in Character-Centric Computer Games
(2004)
Mac Namee, Brian
Proactive Persistent Agents - Using Situational Intelligence to Create Support Characters in Character-Centric Computer Games
(2004)
Mac Namee, Brian
Abstract:
Throughout the 1990's computer game development was dominated by the improvement of game graphics. However, graphical excellence is now the norm rather than the exception, and so other technologies are coming to the fore as developers strive to make their games stand out in an ever more crowded market. Sophisticated artificial intelligence (AI) is one such technology which is now receiving a large share of game development effort as game designers attempt to create more believable computer controlled characters.
Influenced by the notion of situational intelligence, this work presents the proactive persistent agent (PPA) architecture, an intelligent agent architecture that has been developed to drive the behaviours of non player support characters in character centric computer games. The key features of the architecture are that: PPA characters display believable behaviour across a diverse range of situations, through the use of role passing and fuzzy cognitive maps; PPA bas...
http://hdl.handle.net/2262/1200
Marked
Mark
A behavioural analysis of computer game playing competence, experience and related physiological processes
(2008)
Linehan, Conor
A behavioural analysis of computer game playing competence, experience and related physiological processes
(2008)
Linehan, Conor
Abstract:
The current research programme represents a rst step in the psychological analysis of on-line game playing. In the literature review presented in Chapter 1, Network Latency and 'game challenge' were identied as two important variables affecting participants' enjoyment of on-line games. The experiments presented in Chapter 2 define 'game challenge' in terms of levels of derived relational responding, and found that participants were able to consistently respond in accordance with both one and three-node derived relations in the context of a computer game. The presence of Network Latency in a game was found to be detrimental to the game playing experience, but increasing the length of those delays was not. The experiments presented in Chapter 3 defined 'game challenge' in terms of more complex forms of derived relational responding and found that participants were able to consistently respond in accordance with derived 'Same' and 'Oppo...
http://eprints.maynoothuniversity.ie/1478/
Marked
Mark
Seeing is Worse than Believing: Reading People’s Minds Better than Computer-Vision Methods Recognize Actions
(2014)
Barbu, Andrei; Barrett, Daniel P.; Chen, Wei; Siddharth, N.; Xiong, Caiming; Corso, Jas...
Seeing is Worse than Believing: Reading People’s Minds Better than Computer-Vision Methods Recognize Actions
(2014)
Barbu, Andrei; Barrett, Daniel P.; Chen, Wei; Siddharth, N.; Xiong, Caiming; Corso, Jason J.; Fellbaum, Christiane D.; Hanson, Catherine; Hanson, Stephen Jose; Helie, Sebastien; Malaia, Evguenia; Pearlmutter, Barak A.; Siskind, Jeffrey Mark; Talavage, Thomas Michael; Wilbur, Ronnie B.
Abstract:
We had human subjects perform a one-out-of-six class action recognition task from video stimuli while undergoing functional magnetic resonance imaging (fMRI). Support-vector machines (SVMs) were trained on the recovered brain scans to classify actions observed during imaging, yielding average classification accuracy of 69.73% when tested on scans from the same subject and of 34.80% when tested on scans from different subjects. An apples-to-apples comparison was performed with all publicly available software that implements state-of-the-art action recognition on the same video corpus with the same cross-validation regimen and same partitioning into training and test sets, yielding classification accuracies between 31.25% and 52.34%. This indicates that one can read people’s minds better than state-of-the-art computer-vision methods can perform action recognition.
http://eprints.maynoothuniversity.ie/6547/
Marked
Mark
Resolving Perception Based Problems in Human-Computer Dialogue
(2016)
Schutte, Niels
Resolving Perception Based Problems in Human-Computer Dialogue
(2016)
Schutte, Niels
Abstract:
<p>We investigate the effect of sensor errors on situated human computer dialogues. If a human user instructs a robot to perform a task in a spatial environment, errors in the robot's sensor based perception of the environment may result in divergences between the user's and the robot's understanding of the environment. If the user and the robot communicate through a language based interface, these problems may result in complex misunderstand ings. In this work we investigate such situations. We set up a simulation based scenario in which a human user instructs a robot to perform a series of manipulation tasks, such as lifting, moving and re-arranging simple objects. We induce errors into the robot's perception, such as misclassification of shapes and colours, and record and analyse the user's attempts to resolve the problems. We evaluate a set of methods to alleviate the problems by allowing the operator to access the robot's understanding of t...
http://arrow.dit.ie/sciendoc/179
Marked
Mark
Designing novel applications inspired by emerging media technologies
(2011)
Lee, Hyowon; Smeaton, Alan F.
Designing novel applications inspired by emerging media technologies
(2011)
Lee, Hyowon; Smeaton, Alan F.
Abstract:
The field of Human-Computer Interaction provides a number of useful tools and methods for obtaining information on end-users and their usage context to inform the design of computer systems, yet relatively little is known on how to go about designing for a completely novel application where there is no user base, no existing practice of use available at the start. The success of the currently available HCI methodology that focuses on understanding users’ needs and establishing requirements is well-deserved in making computing applications usable in terms of fitting them to end-users’ usage contexts. However, too much emphasis on identifying user needs tends to stifle other more exploratory design activities where new types of applications are invented in order to discover or create new activities currently not practiced. In this paper, we argue that a great starting point of novel application design is not the problem space (trying to rigorously define the user requirements) but the...
http://doras.dcu.ie/16457/
Marked
Mark
Computer graphics - an object oriented approach
(1989)
O'Connell, Paul
Computer graphics - an object oriented approach
(1989)
O'Connell, Paul
Abstract:
More and more applications are being found for computer graphics ranging from business graphics to scientific modelling. Packages can be purchased which support these applications but sometimes users find these packages limit the control they have over the final image and are forced to resort to programming in order to overcome these limitations. COOGE is an attempt to support these users by providing a means to generate graphic applications using a set of graphic objects specifically geared towards CAD users. It provides all the power of a programming language while at the same time providing all the comfort of a package. COOGE is device-independent and user extendable. It provides a wide range of transformations and primitive graphic functions in both 2D and 3D. It also allows a user to set up a library of images in a device-independent format which can then in turn be incorporated into future images. This thesis outlines the issues behind designing a graphics library and how obje...
http://doras.dcu.ie/19191/
Marked
Mark
Introducing security aspects with model transformation
(2005)
FOX, JORGE; Jurjens, Jan
Introducing security aspects with model transformation
(2005)
FOX, JORGE; Jurjens, Jan
Abstract:
peer-reviewed
Aspect Oriented Programming and subsequently Aspect Oriented Software Development have received great attention recently and constitutes an interesting field of research in computer science. The goal of this paper is to propose a more precise understanding of aspects based on the idea of crosscutting concerns in view of model transformation. This proposal considers security aspects as an example of a behavior applied over a desired software product. This implies improving the actual definition of aspects. The work introduces the main current concepts of aspect, defines aspects as behavioral entities, presents examples, and outlines a method for model transformation based on the proposed definition.
http://hdl.handle.net/2262/17180
Marked
Mark
The Use of the European Computer Driving Licence (ECDL) as an IT training package in Irish universities
(2002)
Fallon, Helen
The Use of the European Computer Driving Licence (ECDL) as an IT training package in Irish universities
(2002)
Fallon, Helen
Abstract:
This paper explains the structure and outlines the origins of the European Computer Driving Licence. It presents some current figures on participation and completion rates and explains how the ECDL test centre accreditation system works. Brief details of the ECDL courseware packages currently used by Irish universities are given, followed by a short overview of the operation of ECDL in Irish universities.
http://eprints.maynoothuniversity.ie/11/
Marked
Mark
4pMU4. Novel computer aided design of labial flue pipes
(2010)
Moss, Brian; Lewis, Elfed; Leen, Gabriel; Bremer, Kort; Niven, Andrew
4pMU4. Novel computer aided design of labial flue pipes
(2010)
Moss, Brian; Lewis, Elfed; Leen, Gabriel; Bremer, Kort; Niven, Andrew
Abstract:
A labial flue pipe is a well known tone generator, which is familiar and easily recognisable as the organ pipes seen in many concert halls and churches. However, the design and understanding of the sounding mechanism of such pipes is fraught with difficulty. Traditionally labial pipes are constructed from age-old lookup tables that are closely guarded intellectual secrets. This paper discusses a novel computer program that facilitates the design and construction of such labial flue pipes. The computer program allows almost all aspects of the labial flue pipes design to be varied, the resultant frequency is generated and in addition the Ising efficiency number is provided. Furthermore, a discussion is included related to the fact that even though an Ising number greater than 3 indicates that a pipe is overblown, the fundamental tone is still predominant. A comparison will also be made between a CFD simulation of the labial flue pipe jet mechanism and smoke trail plots typical of such...
http://hdl.handle.net/10344/4333
Marked
Mark
Careers in software : is there life after programming?
(2010)
Downey, Jack
Careers in software : is there life after programming?
(2010)
Downey, Jack
Abstract:
Students interested in information systems and information technology careers can see a clear career path – from programmer to chief information officer (CIO). However, those interested in computer science or software engineering are attracted to the technology and seem not to consider what happens at later stages of their careers. This paper draws on a three year study where senior software practitioners across a variety of roles were interviewed about their work. The findings show profound difficulties in making the transition from hands on technical work to a role where they achieve through guiding the efforts of others.
http://hdl.handle.net/10344/700
Marked
Mark
Teaching three quality assurance techniques in tandem – lessons learned
(2005)
Kutay, Cat; Ali Babar, Muhammad
Teaching three quality assurance techniques in tandem – lessons learned
(2005)
Kutay, Cat; Ali Babar, Muhammad
Abstract:
This paper presents our experiences gained in teaching software quality to undergraduate computer science and engineering students at The University of New South Wales. We argue that increasing demand of high quality software makes it imperative to teach a wide variety of skills which are required to deliver quality product or design and implement a quality focused process. We taught three quality improvement techniques to give students a greater appreciation of the range of the techniques available, and their respective strengths and weaknesses. We found it challenging but rewarding to inculcate programming minded students with the skills required to deal with product and process quality related issues. We believe that the experiences gained from this exercise will be valuable to those interested in designing and offering software quality education and training at tertiary level.
http://hdl.handle.net/10344/2238
Marked
Mark
Interactive operators for evolutionary architectural design
(2011)
Byrne, Jonathan; Hemberg, Erik; O'Neill, Michael
Interactive operators for evolutionary architectural design
(2011)
Byrne, Jonathan; Hemberg, Erik; O'Neill, Michael
Abstract:
In this paper we explore different techniques that allow the user to direct interactive evolutionary search. Broadening interaction beyond simple evaluation increases the amount of feedback and bias a user can apply to the search. Increased feedback will have the effect of directing the algorithm to more fruitful areas of the search space. This paper examines whether additional feedback from the user can be a benefit to the problem of evolutionary design. We find that the interface between the user and the search space plays a vital role in this process.
http://hdl.handle.net/10197/3529
Marked
Mark
A bibliometric study of video retrieval evaluation benchmarking (TRECVid) : a methodological analysis
(2011)
Thornley, Clare V.; McLoughlin, Shane J.; Johnson, Andrea C.; Smeaton, Alan F.
A bibliometric study of video retrieval evaluation benchmarking (TRECVid) : a methodological analysis
(2011)
Thornley, Clare V.; McLoughlin, Shane J.; Johnson, Andrea C.; Smeaton, Alan F.
Abstract:
This paper provides a discussion and analysis of methodological issues encountered during a scholarly impact and bibliometric study within the field of computer science (TRECVid Text Retrieval and Evaluation Conference, Video Retrieval Evaluation). The purpose of this paper is to provide a reflection and analysis of the methods used to provide useful information and guidance for those who may wish to undertake similar studies, and is of particular relevance for the academic disciplines which have publication and citation norms that may not perform well using traditional tools. Scopus and Google Scholar are discussed and a detailed comparison of the effects of different search methods and cleaning methods within and between these tools for subject and author analysis is provided. The additional database capabilities and usefulness of “Scopus More” in addition to “Scopus General” is discussed and evaluated. Scopus paper coverage is found to favourably compare to Google Scholar but S...
http://hdl.handle.net/10197/3038
Marked
Mark
Spatio-temporal multi-granularity : modelling and implementation challenges
(2009)
Camossi, Elena; Bertolotto, Michela; Bertino, Elisa
Spatio-temporal multi-granularity : modelling and implementation challenges
(2009)
Camossi, Elena; Bertolotto, Michela; Bertino, Elisa
Abstract:
Multiple spatial and temporal granularities are essential to extract significant knowledge from datasets at different levels of detail: they enable to zoom-in and zoom-out a dataset, enhancing the data modelling flexibility and being instrumental to boost the analysis of information. Implementing granularities poses several interesting problems. Specifically, in this paper we analyse the issues involved by enhancing a data model and a query language with spatio-temporal multi-granularity, and we figure out efficacious solutions to address all of them. In our exposition, we investigate proper representations for the spatial and the temporal domains; then we conceive an appropriate design for granules and granularities, and for multi-granular values. In particular, mutual relationships among granularities and how they affect granularities design is discussed according to their influence on data access and considering the application of multi-granular conversions. Afterwards, we dedica...
http://hdl.handle.net/10197/1603
Marked
Mark
Open meta-search with OpenSearch: a case study
(2007)
O'Riordan, Adrian P.
Open meta-search with OpenSearch: a case study
(2007)
O'Riordan, Adrian P.
Abstract:
The goal of this project was to demonstrate the possibilities of open source search engine and aggregation technology in a Web environment by building a meta-search engine which employs free open search engines and open protocols. In contrast many meta-search engines on the Internet use proprietary search systems. The search engines employed in this case study are all based on the OpenSearch protocol. OpenSearch-compliant systems support XML technologies such as RSS and Atom for aggregation and distribution. The meta-search engine itself combines the ranked lists of the chosen search sources based on user-supplied weightings. This is implemented in Lucene, a free open source information retrieval library.
http://hdl.handle.net/10468/982
Marked
Mark
Using GOMS to predict the usability of user interfaces of small off-the-shelf software products
(1990)
O'Neill, Aine P
Using GOMS to predict the usability of user interfaces of small off-the-shelf software products
(1990)
O'Neill, Aine P
Abstract:
The design of user interfaces and how usable they are, are both important research topics in computer science. This thesis is a research effort aimed at exploring the whole concept of usability and measuring the quality of a user interface in terms of how usable it is. Usability means how easy a system can be learned and used. In order to have usable products, they must be initially designed with usability in mind. A survey of methods for designing user interfaces which incorporate usability are outlined and they include some or all of the principles for designing for usability, proposed by various authors. Evaluating the quality of existing interfaces can be done by various methods.The method used in this dissertation is the GOMS (goals, operators, methods and selection rules) approach. This model was initially proposed by [Card, Moran & Newell 83] and the approach is based on constructing an explicit model of the user's procedural knowledge, entailed by a particular syst...
http://doras.dcu.ie/19246/
Marked
Mark
Case-Based Travel Agent
(1999)
Peuret, Fr?d?ric
Case-Based Travel Agent
(1999)
Peuret, Fr?d?ric
Abstract:
THESIS 5243
With the explosion of the Internet, we are getting more and more information and it becomes difficult to digest. Agents exist to help the users. An agent is a component of software (or hardware) that is capable of accomplishing tasks on behalf of its user. To accomplish these tasks, it should be able to adapt itself to the user and should also be able to learn from his decisions. Most of them use a rule-based system and it appears that they are not really adapted to the user. A case-based reasoning system seems to be a better approach. Rule-based systems need a good definition of the system and are not able to learn very well from the user choices. What is more, it is not able to handle missing information or unexpected values. On the other hand, an agent build with a case-based reasoning system should be able to solve these problems. In order to show the benefits of a case-based reasoning system for an agent, one of the FIPA (Foundation for Intelligent Physical Agen...
http://hdl.handle.net/2262/786
Marked
Mark
Developing a Spoken Corpus and a Synthesiser for Irish (Gaelic)
(2006)
NI CHASAIDE, AILBHE
Developing a Spoken Corpus and a Synthesiser for Irish (Gaelic)
(2006)
NI CHASAIDE, AILBHE
http://hdl.handle.net/2262/39410
Marked
Mark
A Methodology for the Automated Introduction of Design Patterns
(1999)
O Cinneide, Mel; Nixon, Patrick
A Methodology for the Automated Introduction of Design Patterns
(1999)
O Cinneide, Mel; Nixon, Patrick
Abstract:
TCD-CS-1999-18
In reengineering legacy code it is frequently useful to introduce a design pattern in order to add clarity to the system and thus facilitate further program evolution. We show that this type of transformation can be automated in a pragmatic manner and present a methodology for the development of design pattern transformations. We address the issues of the definition of a starting point for the transformation, the decomposition of a pattern into minipatterns and the development of corresponding minitransformations that can introduce these minipatterns to a program. We argue that behaviour preservation is a key issue and develop a rigorous argument of this for each minitransformation we discover. The architecture of an existing software prototype is also discussed and the results of applying this methodology to develop a transformation for the Factory Method pattern are presented.
http://hdl.handle.net/2262/13013
Marked
Mark
Kronecker?s and Newton?s approaches to solving : A first comparison
(1999)
Hagele, Klemens
Kronecker?s and Newton?s approaches to solving : A first comparison
(1999)
Hagele, Klemens
Abstract:
TCD-CS-1999-47
In these pages we make a first attempt to compute efficiency of symbolic and numerical analysis procedures that solve systems of multivariate polynomial equations. In particular, we compare Kronecker?s solution (from the symbolic approach) with approximate zero theory (introduced by M. Shub & S. Smale as a foundation of numerical analysis). To this purpose we show upper and lower bounds of the bit length of approximate zeros. We also introduce efficient procedures that transform local Kronecker?s solution into approximate zeros and conversely. As an application of our study we exhibit an efficient procedure to compute splitting fields and Lagrange resolvent of univariate polynomial equations. We remark that this procedure is obtained by a convenient combination of both approaches (numeric and symbolic) to multivariate polynomial solving.
http://hdl.handle.net/2262/13021
Marked
Mark
Automatic Detection of Secondary Creases in Fingerprints
(1992)
Vernon, David
Automatic Detection of Secondary Creases in Fingerprints
(1992)
Vernon, David
Abstract:
TCD-CS-92-32
Human fingerprints comprise a series of whorls or ridges. In some special cases, these whorls are broken by so-called 'secondary creases': co-linear breaks across a sequence of adjacent ridges. A technique to automatically detect such creases in fingerprints is described. This technique utilizes a combination of spatial filtering and region-growing to identify the morphology of the locally fragmented fingerprint image. Regions are then thinned to form a skeletal model of the ridge structure. Creases are characterised by co-linear terminations on ridges and are isolated by analysing the Hough transform space derived from the ridge end points. Empirical results using both synthetic and real data are presented and discussed.
http://hdl.handle.net/2262/12759
Marked
Mark
Conceptual Scoffolding: A Spatially-founded Meaning Representation for Metaphor Comprehension
(1992)
Veale, Tony; Keane, Mark T.
Conceptual Scoffolding: A Spatially-founded Meaning Representation for Metaphor Comprehension
(1992)
Veale, Tony; Keane, Mark T.
Abstract:
TCD-CS-92-12
Once viewed as a rhetorical and superficial language phenomenon, metaphor is now recognized to serve a fundamental role in our conceptual structuring and language comprehension processes. In particular, it is argued that certain experiential metaphors based upon intuitions of spatial relations are inherent in the conceptual organization of our most abstract thoughts. In this paper we present a two stage computational model of metaphor interpretation which employs a spatially-founded semantics to broadly characterise the meaning carried by a metaphor in terms of a conceptual scaffolding, an interim meaning structure around which a fuller interpretation is fleshed out over time. We then present a semantics for the construction of conceptual scaffolding which is based upon core metaphors of collocation, containment and orientation. The goal of this scaffolding is to maintain the intended association of ideas even in contexts in which system knowledge is insufficient fo...
http://hdl.handle.net/2262/12918
Marked
Mark
Experiments in Adaptation-Guided Retrieval in Case-Based Design
(1994)
Smyth, Barry; Keane, Mark T.
Experiments in Adaptation-Guided Retrieval in Case-Based Design
(1994)
Smyth, Barry; Keane, Mark T.
Abstract:
TCD-CS-94-17
Case-based reasoning (CBR) has been applied with some success to complex planning and design tasks. In such systems, the best case is retrieved and adapted to solve a particular target problem. In general, the best case is that which can be most easily adapted to the target problem (as the overhead in adaptation is often very high). Standard CBR systems use semantic-similarity to retrieve cases, on the assumption that the most similar case is the best or easiest case to adapt. However, this assumption can be shown to be unwarranted. In this paper, we report a novel retrieval method, called adaptation-guided retrieval, that is sensitive to the ease-ofadaptation of cases. In the context of a CBR system for software-design, called Deja Vu, we show through a series of experiments that adaptation-guided retrieval is more accurate than standard retrieval techniques, that it scales well to large casebases and that it results in more efficient overall problem-solving perfor...
http://hdl.handle.net/2262/12782
Marked
Mark
Call Admission Control and Dynamic Pricing in a GSM/GPRS Cellular Network
(2004)
Olivr?, Alan
Call Admission Control and Dynamic Pricing in a GSM/GPRS Cellular Network
(2004)
Olivr?, Alan
Abstract:
In the past decade, the wireless communications market has experienced tremendous growth, and this growth is likely to continue in the near future. In addition to an increase in the number of users, ever more demanding applications will appear, resulting in ever greater resource requirements. The limited radio frequency spectrum available can no longer support this increasing demand, and the required quality of service will no longer be attainable if an efficient solution is not found. The easiest approach to solve this problem is to increase the capacity of the network, but this is uneconomic and not really practical. Indeed, at their current size, the networks are already under utilized most of the time, even if they can not accept every incoming call during congested peak periods. Increasing their capacity still further may solve the congestion problem for a while, but at the cost of an even higher global under utilization of resources. Other solutions have emerged to alleviate t...
http://hdl.handle.net/2262/826
Marked
Mark
Bridging Bonobo Components
(2001)
Squalli Houssaini, Abdelmalek
Bridging Bonobo Components
(2001)
Squalli Houssaini, Abdelmalek
Abstract:
To manage the increasing complexity of software, many modern and large applications make use of components. GNOME, the free desktop environment for UNIX like systems, has created its own component model, namely Bonobo. The Bonobo component model is based on CORBA technology. Relying on CORBA enables developers to access Bonobo components from different programming languages and platforms. It also means that IIOP, the protocol that guarantees interoperability between CORBA products, is used to communicate with Bonobo components. However, most firewalls prevent IIOP communication. This dissertation deals with bridging Bonobo components. In other words, it is about accessing Bonobo components that are behind a firewall. SOAP is an XML based protocol that uses HTTP for transporting its messages. In order to bridge Bonobo components, we will build an IIOP to SOAP bridge and vice versa. The system will redirect all the messages destined to the Bonobo components into the bridge. As the bri...
http://hdl.handle.net/2262/806
Displaying Results 276 - 300 of 2969 on page 12 of 119
7
8
9
10
11
12
13
14
15
16
17
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Item Type
Book (8)
Book chapter (180)
Conference item (1364)
Doctoral thesis (159)
Journal article (702)
Master thesis (research) (124)
Master thesis (taught) (113)
Multimedia (10)
Report (221)
Review (2)
Working paper (3)
Other (83)
Institution
Dublin City University (321)
NUI Galway (74)
Maynooth University (726)
Trinity College Dublin (728)
University College Cork (62)
University College Dublin (215)
University of Limerick (262)
Dublin Institute of Technology (458)
Lenus (2)
Dundalk Institute of Techno... (111)
Marine Institute (1)
Teagasc (1)
Royal College of Surgeons i... (5)
Connacht-Ulster Alliance (3)
Peer Review Status
Peer reviewed (2054)
Non peer reviewed (578)
Unknown (337)
Year
2017 (48)
2016 (88)
2015 (83)
2014 (116)
2013 (143)
2012 (209)
2011 (259)
2010 (296)
2009 (375)
2008 (205)
2007 (176)
2006 (178)
2005 (181)
2004 (129)
2003 (87)
2002 (75)
2001 (57)
2000 (41)
1999 (51)
1998 (27)
1997 (20)
1996 (19)
1995 (22)
1994 (18)
1993 (18)
built by Enovation Solutions