Search results for " computing"
showing 10 items of 2075 documents
Numerical methods for a nonlinear impact model: A comparative study with closed-form corrections
2011
A physically based impact model-already known and exploited in the field of sound synthesis-is studied using both analytical tools and numerical simulations. It is shown that the Hamiltonian of a physical system composed of a mass impacting on a wall can be expressed analytically as a function of the mass velocity during contact. Moreover, an efficient and accurate approximation for the mass outbound velocity is presented, which allows to estimate the Hamiltonian at the end of the contact. Analytical results are then compared to numerical simulations obtained by discretizing the system with several numerical methods. It is shown that, for some regions of the parameter space, the trajectorie…
SEMANTIC AND CONTEXTUAL APPROACH FOR THE RECOMMENDATION OF LEARNING MODULES IN MOBILITY
2012
International audience; Many researchers argue that mobile learning is just an adaptation of e-learning on mobile technology, but far from a simple extension of e-learning, m-learning raises original issues in technological and pedagogical terms. M-learning is usually based on the consideration of a context rich on information and interactions. The challenge of m-learning is therefore, not simply to transfer on mobile content designed primarily for e-learning. This concept implies that we must rethink the entire process of the learning experience in mobility to maximize its efficiency.
Recommender system for combination of learning elements in mobile environment
2012
5 pages; International audience; The paper presents an ongoing research about the development of a new recommender system dedicated to m-learning. This system is an extension of content based recommender system proposals. It's made of three levels architecture: 1/ a domain model describing the knowledge of teaching, 2/ a user model defining learner's profile and learning's context, 3/ an adaptation model containing rules and metaheuristics, which aims at combining learning modules. Our system takes into account the spatio-temporal context of the learners, the evolution of learner's profile and the dynamic adaptation of modules during the learning process in a mobile environment. The result …
Performance Improvements of EventIndex Distributed System at CERN
2023
El trabajo de esta tesis se enmarca dentro del proyecto EventIndex del experimento ATLAS, un gran detector de partı́culas del LHC (Gran Colisionador de Hadrones) en el CERN. El objetivo del proyecto es catalogar todas las colisiones de partı́culas, o eventos, registrados en el detector ATLAS y también simulados a lo largo de sus años de funcionamiento. Con este catálogo se pueden caracterizar los datos a nivel de evento para su búsqueda y localización por parte de los usuarios finales. También se pueden realizar comprobaciones en la cadena de registro y reprocesado de los datos, para comprobar su corrección y optimizar futuros procesos. Debido al incremento en las tasas y volumen de datos e…
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…
Implementation techniques for the lattice Boltzmann method
2010
Positive Computing as Paradigm to Overcome Barriers to Global Co-authoring of Open Educational Resources
2018
The adoption of Open Educational Resources (OER) can support collaboration and knowledge sharing. One of the main areas of the usage OER is the internationalization, i.e., the use in a global context. However, the globally distributed co-creation of digital materials is still low. Therefore, we identify essential barriers, in particular for co-authoring of OER in global environments. We use a design science research method to introduce a barrier framework for co-authoring OER in global settings and propose a wellbeing-based system design constructed from the barrier framework for OER co-authoring tool. We describe how positive computing concepts can be used to overcome barriers, emphasizing…
Efficacy of the cloud computing technology in the management of communications and business processes of the companies
2016
W artykule zbadano tendencje rozwoju i stosowania różnych klas systemów informatycznych w zarządzaniu w relacji do rodzajów procesów biznesowych. Zaprezentowano krótki przegląd aktualnego stanu wykorzystania technologii chmury obliczeniowej na świecie i na Ukrainie. Korzyści wynikające z zastosowania modelu "SaaS - Software as a Service" zostały wyjaśnione na przykładzie innowacji międzynarodowego projektu "Bitrix 24", w którym zrealizowane zostały główne cele systemów CRM w połączeniu z szerokimi możliwościami koordynacji procesów komunikacyjnych i biznesowych nowoczesnych firm. Projekt ten został przetłumaczony na większość języków europejskich i wykorzystuje narzędzia społecznego środowi…
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…