Search results for " Process"

showing 10 items of 17204 documents

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

DOBRO : a prediction error correcting robot under drifts

2016

We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.

ta113Concept driftComputer scienceMean squared prediction error02 engineering and technologyARIMAconcept drifton-line prediction error correction020204 information systems0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingAutoregressive integrated moving averageSimulation
researchProduct

Wastewater treatment: New insight provided by interactive multiobjective optimization

2011

In this paper, we describe a new interactive tool developed for wastewater treatment plant design. The tool is aimed at supporting the designer in designing new wastewater treatment plants as well as optimizing the performance of already available plants. The idea is to utilize interactive multiobjective optimization which enables the designer to consider the design with respect to several conflicting evaluation criteria simultaneously. This is more important than ever because the requirements for wastewater treatment plants are getting tighter and tighter from both environmental and economical reasons. By combining a process simulator to simulate wastewater treatment and an interactive mul…

ta113Decision support systemInformation Systems and ManagementOperations researchProcess (engineering)business.industrySoftware developmentMulti-objective optimizationManufacturing engineeringManagement Information SystemsSimulation-based optimizationArts and Humanities (miscellaneous)WastewaterDevelopmental and Educational PsychologyDesign processbusinessEngineering design processInformation SystemsDecision Support Systems
researchProduct

Gear classification and fault detection using a diffusion map framework

2015

This article proposes a system health monitoring approach that detects abnormal behavior of machines. Diffusion map is used to reduce the dimensionality of training data, which facilitates the classification of newly arriving measurements. The new measurements are handled with Nyström extension. The method is trained and tested with real gear monitoring data from several windmill parks. A machine health index is proposed, showing that data recordings can be classified as working or failing using dimensionality reduction and warning levels in the low dimensional space. The proposed approach can be used with any system that produces high-dimensional measurement data. peerReviewed

ta113Diffusion (acoustics)Training setta214Computer scienceDimensionality reductiondiffusion mapExtension (predicate logic)computer.software_genreFault detection and isolationfault detectionsystem health monitoringArtificial IntelligenceSignal ProcessingComputer Vision and Pattern RecognitionData miningCluster analysiscomputerSoftwareCurse of dimensionalityclustering
researchProduct

Collaborative EA Information Elicitation Method : The IEM for Business Architecture

2015

This study contributes to the enterprise architecture (EA) methodologies by suggesting a method for eliciting architecture requirements: gathering both the current architecture information, and the development needs and requirements for the business architecture (BA) dimension in EA planning. Most of all EA dimensions, the developing of the BA requires collaboration with various non-IT stakeholders. It presents thus challenges to the IT department, or the consultancy involved in EA related efforts. The contribution of the various stakeholder groups as informants is, however, crucial to well founded EA design decisions. The suggested method takes related IS development fields as starting poi…

ta113EngineeringKnowledge managementRequirements engineeringbusiness.industryrequirements elicitationComputingMethodologies_MISCELLANEOUSStakeholderEnterprise architectureInformation technologyRequirements elicitationpublic administrationBusiness process modelingKnowledge acquisitionmethodsmenetelmätenterprise architectureBusiness architecturejulkinen hallintokokonaisarkkitehtuuribusiness
researchProduct

Fault-proneness of open source software: Exploring its relations to internal software quality and maintenance process

2013

The goal of this study is to explore how fault-proneness of open source software (OSS) could be explained in terms of internal quality attributes and maintenance process metrics. We reviewed earlier studies and performed a multiple case study of eight Java-based projects based on data available in the Source Forge repository. Overall, we studied 342 re- leases of those systems. As is usual, software quality was regarded as a set of internal and external quality attributes. A to- tal of 76 internal quality attributes were measured from the source code of the selected systems via the tool SoftCalc. Two external quality attributes contributing to fault-proneness were in turn obtained from the …

ta113Engineeringfault-pronenessbusiness.industryopen-source softwareSoftware developmentohjelmiston ylläpitoprosessiSoftware peer reviewsoftware qualityohjelmiston laatuSoftware qualityavoimen lähdekoodin ohjelmistoSoftware analyticsvirhealttiusSoftware sizingPersonal software processohjelmistomittaritSoftware quality analystsoftware metricsSoftware verification and validationSoftware engineeringbusinesssoftware maintenance processThe Open Software Engineering Journal
researchProduct

User experience targets as design drivers:A case study on the development of a remote crane operator station

2013

In recent years, the notion of user experience, or UX, as an essential aspect to be addressed in the design and development of technologies has been increasingly discussed. In this paper, we present a case study in which we have used UX targets as the main design drivers and focus areas in developing a new remote operator station user interface for container cranes. UX targets describe the experiential qualities to which the product design should aim at. However, taking UX targets into consideration during product design is challenging, because only little is known about how they would be best operationalized to serve the different phases of the design process. Through our case study, we de…

ta113Focus (computing)EngineeringOperationalizationProduct designbusiness.industryExperiential learninguser experience targetconcept designUser experience designcontainer crane operationHuman–computer interactionuser experienceContainer (abstract data type)Systems engineeringremote operator stationUser interfaceEngineering design processbusiness
researchProduct

Interface Detection Using a Quenched-Noise Version of the Edwards-Wilkinson Equation

2015

We report here a multipurpose dynamic-interface-based segmentation tool, suitable for segmenting planar, cylindrical, and spherical surfaces in 3D. The method is fast enough to be used conveniently even for large images. Its implementation is straightforward and can be easily realized in many environments. Its memory consumption is low, and the set of parameters is small and easy to understand. The method is based on the Edwards-Wilkinson equation, which is traditionally used to model the equilibrium fluctuations of a propagating interface under the influence of temporally and spatially varying noise. We report here an adaptation of this equation into multidimensional image segmentation, an…

ta113Image segmentationta114DiscretizationInterface (Java)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONobject detectionimage edge detectionImage segmentationComputer Graphics and Computer-Aided DesignGrayscaleGray-scaleObject detectionSurface topographyNoiseMathematical modelThree-dimensional displaysSegmentationTomography3D image processingNoiseSurface morphologyAlgorithmSoftwareIEEE Transactions on Image Processing
researchProduct