Search results for "Computer science"

showing 10 items of 22367 documents

Selection of the Proper Revenue and Pricing Model for SaaS

2014

Recent research on software revenue and pricing models has revealed important ways in which firms can benefit from software renting. However, it is still unclear how SaaS providers select a proper revenue and pricing model to make their services attractive for customers. Based on 32 interviews with software professionals from four case firms, this study reveals how different factors impacted on the selection of a revenue and pricing model. It can be concluded that customers’ needs were the main driving force to the selection of the most appropriate pricing and revenue model in the market. peerReviewed

ta113TheoryofComputation_MISCELLANEOUSbusiness.industryComputer scienceSoftware as a servicecloud computingCloud computingSaaSRentingSoftwareRevenue modelrevenue modelsRevenueYield managementbusinesssoftware pricingSelection (genetic algorithm)Industrial organization2014 IEEE 6th International Conference on Cloud Computing Technology and Science
researchProduct

Social Collaborative Viewpoint Regression with Explainable Recommendations

2017

A recommendation is called explainable if it not only predicts a numerical rating for an item, but also generates explanations for users' preferences. Most existing methods for explainable recommendation apply topic models to analyze user reviews to provide descriptions along with the recommendations they produce. So far, such methods have neglected user opinions and influences from social relations as a source of information for recommendations, even though these are known to improve the rating prediction. In this paper, we propose a latent variable model, called social collaborative viewpoint regression (sCVR), for predicting item ratings based on user opinions and social relations. To th…

ta113Topic modelInformation retrievalComputer sciencetopic modeling02 engineering and technologyRecommender systemtrusted social relationsViewpointsSocial relationRegression020204 information systemsBenchmark (surveying)0202 electrical engineering electronic engineering information engineeringuser comment analysis020201 artificial intelligence & image processingrecommender systemsTupleLatent variable modelProceedings of the Tenth ACM International Conference on Web Search and Data Mining
researchProduct

Convolutional neural networks in skin cancer detection using spatial and spectral domain

2019

Skin cancers are world wide deathly health problem, where significant life and cost savings could be achieved if detection of cancer can be done in early phase. Hypespectral imaging is prominent tool for non-invasive screening. In this study we compare how use of both spectral and spatial domain increase classification performance of convolutional neural networks. We compare five different neural network architectures for real patient data. Our models gain same or slightly better positive predictive value as clinicians. Towards more general and reliable model more data is needed and collection of training data should be systematic. peerReviewed

ta113Training setskin cancerArtificial neural networkComputer sciencebusiness.industryspektrikuvausHyperspectral imagingspectral imagingSpectral domainPattern recognitionneuroverkotmedicine.diseaseneural networksWorld wideConvolutional neural networkihosyöpämedicineArtificial intelligenceSkin cancerEarly phasebusinessta217
researchProduct

CSI with games and an emphasis on TDD and unit testing

2012

ta113Unit testingGeneral Computer ScienceGame programmingbusiness.industryComputer scienceEmphasis (telecommunications)ta516TelecommunicationsbusinessIndustrial engineeringEducationACM Inroads
researchProduct

Human-technology choreographies

2014

Bodily movements have traditionally had mostly instrumental value in interaction design. However, movements can also be given a central role in understanding behaviour and in designing technology for humans. This workshop is aiming at taking a fresh, movement-oriented look at the design and evaluation of technology in a wide variety of contexts.

ta113Value (ethics)ChoreographyComputer scienceHuman–computer interactionta6131Body movementInteraction designSpace (commercial competition)Variety (cybernetics)Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Making group processes explicit to student

2014

This article considers student learning about group work in the context of project courses where student groups work under realistic expectations. Based on the literature, justice is explicated as a group work concept and regarded as a professional skill that can be practiced. Preliminary student feedback on teaching through continuous discussions on justice are presented together with teacher experiences.

ta113Work (electrical)Group (mathematics)Computer sciencePedagogyComputingMilieux_COMPUTERSANDEDUCATIONContext (language use)Justice (ethics)Group workStudent learningProject-based learningProceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14
researchProduct

Visualization in the integrated SimPhoNy multiscale simulation framework

2018

Abstract We describe three distinct approaches to visualization for multiscale materials modelling research. These have been developed with the framework of the SimPhoNy FP7 EU-project, and complement each other in their requirements and possibilities. All have been integrated via wrappers to one or more of the simulation approaches within the SimPhoNy project. In this manuscript we describe and contrast their features. Together they cover visualization needs from electronic to macroscopic scales and are suited to simulations made on personal computers, workstations or advanced High Performance parallel computers. Examples as well as recommendations for future calculations are presented.

ta113Workstation010308 nuclear & particles physicsComputer scienceGeneral Physics and AstronomyElectronic charge density01 natural scienceselectronic charge densityComputational scienceVisualizationComplement (complexity)law.inventionatomisticHardware and Architecturelaw0103 physical sciencesCover (algebra)010306 general physicsvisualizationfluidComputer Physics Communications
researchProduct