Search results for " Software"

showing 10 items of 1178 documents

A feasibility analysis on the use of ultrasonic multihop communications for E-health applications

2017

Rise in population aging as well as diffusion of chronic diseases and health consciousness require constant monitoring of health conditions but also lead to increasing costs for the governments. Body Area Networks represent the next frontier in health care and are envisaged as the natural choice to provide detailed and updated information on health status to prevent health risks and diseases. However if, on the one hand, a large research effort has been devoted so far to the investigation of BAN communications on and around the body, on the other hand intra-BAN communications are still a scarcely explored area because of the difficulties and risks in successfully propagating signals inside …

business.industryComputer scienceUniversal Software Radio PeripheralNode (networking)020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologyTransmission (telecommunications)Default gatewayHealth care0202 electrical engineering electronic engineering information engineeringRadio frequencyUnicast0210 nano-technologyTelecommunicationsbusinessComputer network2017 IEEE International Conference on Communications (ICC)
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

Tasks and Digital Tools

2016

International audience; This chapter considers scholastic tasks with digital tools. The first two sections consider tasks in ‘ordinary’ classrooms (tasks for learning) and issues relating to tasks using mathematical software. The first section presents examples of tasks with digital tools to highlight potential problems and opportunities for learning. The second section considers issues arising from the literature on tasks design with and without digital tools. The final section looks at task-tool issues in larger-than-the-individual classroom research and in assessment; it also comments of avenues for further development

business.industryComputer scienceassessment[SHS.EDU]Humanities and Social Sciences/Education05 social sciencesSection (typography)task design050301 educationJob designmathematics education[MATH.MATH-HO]Mathematics [math]/History and Overview [math.HO]Mathematical software0501 psychology and cognitive sciencesSoftware engineeringbusiness0503 educationdigital tools050104 developmental & child psychology
researchProduct

Plenoptic image watermarking to preserve copyright

2017

Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.

business.industryData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyÒpticaImage (mathematics)GeographyRobustness (computer science)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoint (geometry)Computer visionArtificial intelligencebusinessRepresentation (mathematics)Digital watermarkingThree-Dimensional Imaging, Visualization, and Display 2017
researchProduct

An empirical study of performance using Clone & Own and Software Product Lines in an industrial context

2021

Abstract Context: Clone and Own (CaO) is a widespread approach to generate new software products from existing software products by adding small changes. The Software Product Line (SPL) approach addresses the development of families of products with similar features, moving away from the production of isolated products. Despite the popularity of both approaches, no experiment has yet compared them directly. Objective: The goal of this paper is to know the different performances of software engineers in the software products development process using two different approaches (SPL and CaO). Method: We conducted an experiment in the induction hobs software environment with software engineers. …

business.industryProcess (engineering)Computer science020207 software engineeringContext (language use)02 engineering and technologyComputer Science ApplicationsProduct (business)Empirical researchSoftware020204 information systemsFactor (programming language)0202 electrical engineering electronic engineering information engineeringClone (computing)Software engineeringbusinessSoftware product linecomputerSoftwareInformation Systemscomputer.programming_languageInformation and Software Technology
researchProduct

Cyber Security Strategy Implementation Architecture in a Value System

2018

In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…

business.industryProcess (engineering)Computer scienceOperating environmentmedia_common.quotation_subjectInformation structureProblem statementcomputer.file_formatComputer securitycomputer.software_genreStrategy implementationQuality (business)ExecutablebusinesscomputerAgile software developmentmedia_common
researchProduct

Benefits of Software Renting in Cloud Business

2012

In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become a strategic tool to compete in the market. In this multi-case study, software renting was found to help the case firms to (i) differentiate themselves from competitors; (ii) increase their competitive advantage by making the software available for a larger customer group, and (iii) decrease the price of software by using centralized software delivery and maintenance. peerReviewed

business.industryTeam software processSoftware as a servicecloud computingCloud computingCompetitor analysisCompetitive advantagesoftware rentingSaaSRentingSoftwareSoftware deploymentcloud businessMarketingbusinessIndustrial organization
researchProduct

Progressive Web Apps for the Unified Development of Mobile Applications

2018

Progressive Web Apps (PWAs) allow for web applications to be developed in an offline-first approach. While Web apps traditionally did not properly function without an Internet connection, PWAs enable them to be downloaded, installed and used offline on various systems, including mobile devices and personal computers. We present an introduction to the state-of-art in research and practice. Based on this, we discuss various underlying concepts and technologies. Then, we scrutinize and compare PWAs against cross-platform app development approaches on both technical and overarching aspects. A list of suggestions for future research is also presented. We urge academia to keep up with the latest …

business.product_categoryWeb developmentbusiness.industryComputer sciencemedia_common.quotation_subject020207 software engineeringMobile Web02 engineering and technologyField (computer science)World Wide Web020204 information systemsCross-platform0202 electrical engineering electronic engineering information engineeringInternet accessWeb applicationbusinessFunction (engineering)Mobile devicemedia_common
researchProduct

Una questione di software

2012

cinema software cinema postcinema
researchProduct

A gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers

2020

Software pipelines enable organizations to chain applications for adding value to contents (e.g., confidentially, reliability, and integrity) before either sharing them with partners or sending them to the cloud. However, the pipeline components add overhead when processing large volumes of data, which can become critical in real-world scenarios. This paper presents a gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers. In this model, the gears represent applications, whereas gearboxes represent software pipelines. This model was implemented as a collaborative system that automatically performs Gear up (by using parallel patterns…

cloud storageCloud storageComputer Networks and CommunicationsComputer scienceDistributed computingcontinuous deliveryCloud computing02 engineering and technologyVirtual containersSoftwareIn-memory storage0202 electrical engineering electronic engineering information engineeringParallel patternssoftware pipelinesInformáticabusiness.industryvirtual containers020206 networking & telecommunicationsPipeline (software)Cloud storage; Continuous delivery; In-memory storage; Parallel patterns; Software pipelines; Virtual containersPipeline transportin-memory storageContinuous deliveryHardware and ArchitectureSoftware deploymentparallel patternsContainer (abstract data type)020201 artificial intelligence & image processingbusinessCloud storageSoftwareSoftware pipelinesFuture Generation Computer Systems
researchProduct