default search action
Tom Lunney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j14]Shane Miller, Kevin Curran
, Tom Lunney:
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses. Int. J. Digit. Crime Forensics 13(6): 1-20 (2021) - [j13]Shane Miller, Kevin Curran
, Tom Lunney:
Detection of Anonymising Proxies Using Machine Learning. Int. J. Digit. Crime Forensics 13(6): 1-17 (2021) - 2020
- [j12]Shane Miller, Kevin Curran, Tom Lunney:
Detection of Virtual Private Network Traffic Using Machine Learning. Int. J. Wirel. Networks Broadband Technol. 9(2): 60-80 (2020)
2010 – 2019
- 2019
- [j11]William Duffy, Kevin Curran
, Daniel Kelly
, Tom Lunney:
An investigation into smartphone based weakly supervised activity recognition systems. Pervasive Mob. Comput. 56: 45-56 (2019) - [c18]Juanita Blue, Joan Condell, Tom Lunney:
Proving Yourself: Addressing the Refugee Identity Crisis with Bayesi-Chain Probability & Digital Footprints. ISNCC 2019: 1-6 - [c17]Juanita Blue, Joan Condell, Tom Lunney:
It is Probably Me: A Bayesian Approach to Weighting Digital Identity Sources. ISNCC 2019: 1-6 - 2018
- [c16]Shane Miller, Kevin Curran
, Tom Lunney:
Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. CyberSA 2018: 1-8 - [c15]William Duffy, Kevin Curran
, Daniel Kelly, Tom Lunney:
Addressing the Problem of Activity Recognition with Experience Sampling and Weak Learning. IntelliSys (1) 2018: 1238-1250 - 2016
- [j10]Karla Muñoz, Julieta Noguez, Luis Neri, Paul Mc Kevitt, Tom Lunney:
A Computational Model of Learners Achievement Emotions Using Control-Value Theory. J. Educ. Technol. Soc. 19(2): 42-56 (2016) - [c14]Murat Akser
, Brian Bridges, Giuliano Campo, Abbas Cheddad
, Kevin Curran
, Lisa Fitzpatrick, Linley Hamilton, John Harding, Ted Leath, Tom Lunney, Frank Lyons, Minhua Ma
, John MacRae, Tom Maguire
, Aiden McCaughey, Eileen McClory, Victoria McCollum
, Paul Mc Kevitt, Adam Melvin, Paul Moore, Eleanor Mulholland, Karla Muñoz, Greg O'Hanlon, Laurence Roman:
SceneMaker: Creative Technology for Digital StoryTelling. ArtsIT/DLI 2016: 29-38 - [c13]Eleanor Mulholland, Paul Mc Kevitt, Tom Lunney, Karl-Michael Schneider:
Analysing Emotional Sentiment in People's YouTube Channel Comments. ArtsIT/DLI 2016: 181-188 - 2015
- [j9]Eleanor Mulholland, Paul McKevitt, Tom Lunney, John Farren, Judy Wilson:
360-MAM-Affect: Sentiment Analysis with the Google Prediction API and EmoSenticNet. EAI Endorsed Trans. Scalable Inf. Syst. 2(6): e5 (2015) - [c12]Eleanor Mulholland, Paul McKevitt, Tom Lunney, John Farren, Judy Wilson:
360-MAM-Affect: Sentiment analysis with the Google prediction API and EmoSenticNet. INTETAIN 2015: 217-221 - [c11]Shane Miller, Kevin Curran
, Tom Lunney:
Securing the internet through the detection of anonymous proxy usage. WorldCIS 2015: 153-158 - 2013
- [c10]Kevin Meehan
, Tom Lunney, Kevin Curran
, Aiden McCaughey:
Context-aware intelligent recommendation system for tourism. PerCom Workshops 2013: 328-331 - 2012
- [c9]Jennifer Hyndman, Tom Lunney, Paul McKevitt:
AmbiLearn: Enhancing the Learning Environment for Primary School Education. SGDA 2012: 231-242 - 2011
- [j8]Karla Muñoz
, Paul Mc Kevitt, Tom Lunney, Julieta Noguez
, Luis Neri
:
An emotional student model for game-play adaptation. Entertain. Comput. 2(2): 133-141 (2011) - [j7]Jennifer Hyndman, Tom Lunney, Paul McKevitt:
AmbiLearn: Multimodal Assisted Learning. Int. J. Ambient Comput. Intell. 3(1): 53-59 (2011) - [j6]Kevin Curran
, Eoghan Furey
, Tom Lunney, Jose A. Santos
, Derek Woods, Aiden McCaughey:
An evaluation of indoor location determination technologies. J. Locat. Based Serv. 5(2): 61-78 (2011) - [p1]Karla Muñoz, Paul McKevitt, Tom Lunney, Julieta Noguez, Luis Neri:
Designing and Evaluating Emotional Student Models for Game-Based Learning. Serious Games and Edutainment Applications 2011: 245-271 - 2010
- [j5]Rosaleen Hegarty, Tom Lunney, Kevin Curran
, Maurice D. Mulvenna
:
Ambient Interface Design (AID) for the Ergonomically Challenged. Int. J. Ambient Comput. Intell. 2(2): 57-64 (2010) - [c8]Ali Nur Mohammad Noman, Kevin Curran
, Tom Lunney:
A Watermarking Based Tamper Detection Solution for RFID Tags. IIH-MSP 2010: 98-101 - [c7]Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condell, Minhua Ma
:
SceneMaker: Multimodal Visualisation of Natural Language Film Scripts. KES (4) 2010: 430-439 - [c6]Karla Muñoz, Paul McKevitt, Tom Lunney, Julieta Noguez
, Luis Neri
:
PlayPhysics: An Emotional Games Learning Environment for Teaching Physics. KSEM 2010: 400-411
2000 – 2009
- 2009
- [j4]Rosaleen Hegarty, Tom Lunney, Kevin Curran
, Maurice D. Mulvenna
:
Ambient Communication Experience (ACE). Int. J. Ambient Comput. Intell. 1(2): 53-58 (2009) - [j3]Karen Lee, Tom Lunney, Kevin Curran
, Jose Santos:
Ambient Middleware for Context-Awareness (AMiCA). Int. J. Ambient Comput. Intell. 1(3): 66-78 (2009) - [c5]Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condell:
SceneMaker: Intelligent Multimodal Visualisation of Natural Language Scripts. AICS 2009: 144-153 - [c4]Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condell:
SceneMaker: Automatic Visualisation of Screenplays. KI 2009: 265-272 - 2006
- [c3]Kevin Curran, Elaine Smyth, Paul McKevitt, Tom Lunney:
MPEG-7 Content-Based Descriptor Audio Applications. AMT 2006: 380-383 - 2003
- [c2]Tom Lunney, Aidan McCaughey:
Object persistence in Java. PPPJ 2003: 115-120 - 2002
- [j2]Paul Flynn, Kevin Curran
, Tom Lunney:
A decision support system for telecommunications. Int. J. Netw. Manag. 12(2): 69-80 (2002) - 2000
- [c1]Paul Flynn, Tom Lunney, Terri Scott, Kevin Curran:
Decision Support Systems within Telecommunications. ICEIS 2000: 127-131
1990 – 1999
- 1998
- [j1]Shaunna McClintock, Tom Lunney, Abdulla Hashim:
A genetic algorithm environment for star pattern recognition. J. Intell. Fuzzy Syst. 6(1): 3-16 (1998)
Coauthor Index
aka: Paul McKevitt
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint