Search results for "Computer"

showing 10 items of 30657 documents

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

How Students Get Going : Triggers for Students’ Learning in Project-Based Education

2018

Repeatedly documented positive student responses to project-based learning during its decades-long tradition in CS attest to the effectiveness of learning by doing. Support for reflective learning nevertheless continues to be a topic worth studying because the intensity of project work together with a high technical orientation among CS students often complicate reflective practice. A critical incident-inspired assignment was added to a project-based course to support reflective practice in spring 2017. In a previous study, the authors analyzed how students approached the assignment and whether they found it supportive for learning. The present study content-analyses the situations that tri…

ta113Computer sciencegovernment.form_of_governmentReflective practice05 social sciences0211 other engineering and technologiesprojektioppiminen050301 education02 engineering and technologyProject-based learningLearning-by-doing (economics)Work (electrical)Project basedproject-based learningMathematics educationgovernmentlearning triggersStudent learning0503 educationCritical Incident Techniquereflektio021106 design practice & managementIncident reportreflection
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

Enterprise Architecture - To Business or Not to Business? That Is The Question!

2018

ta113Computer sciencetieto- ja viestintätekniikka05 social sciences0211 other engineering and technologiesEnterprise architecture02 engineering and technologyEngineering managementICTliiketoimintaenterprise architecture021105 building & construction0502 economics and businessscopekokonaisarkkitehtuuribusiness050203 business & managementProceedings of the 20th International Conference on Enterprise Information Systems
researchProduct

DOBRO : a prediction error correcting robot under drifts

2016

We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.

ta113Concept driftComputer scienceMean squared prediction error02 engineering and technologyARIMAconcept drifton-line prediction error correction020204 information systems0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingAutoregressive integrated moving averageSimulation
researchProduct

Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…

2011

The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…

ta113Control theory (sociology)Article SubjectComputer scienceControl (management)Sampling (statistics)Workloadlcsh:QA75.5-76.95Task (project management)Human-Computer InteractionSAFERDistractionStrategic controllcsh:Electronic computers. Computer scienceSimulationCognitive psychologyAdvances in Human-Computer Interaction
researchProduct

A Cooperative Coevolution Framework for Parallel Learning to Rank

2015

We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…

ta113Cooperative coevolutionTheoretical computer scienceLearning to RankComputer sciencebusiness.industryRank (computer programming)Genetic ProgrammingEvolutionary algorithmContext (language use)Genetic programmingImmune ProgrammingMachine learningcomputer.software_genreEvolutionary computationComputer Science ApplicationsComputational Theory and MathematicsCooperative CoevolutionInformation RetrievalBenchmark (computing)Learning to rankArtificial intelligencebusinesscomputerInformation SystemsIEEE Transactions on Knowledge and Data Engineering
researchProduct

Shared and personal learning spaces: Challenges for pedagogical design

2012

Abstract The development of new tools for collaboration, such as social software, plays a crucial role in leisure time and work activities. The aim of this article is to summarize the research in the field of computer-supported collaborative learning (CSCL). This is done particularly from the perspective of the blurred line between individual (personal) and group-level (shared) learning that the use of the new tools has forced us to re-think. First, individual and group-level perspectives to learning are discussed to make sense of the major notions of how learning is understood in CSCL research. Second, based on this theoretical grounding, it will be further elaborated what this means to th…

ta113Cooperative learningKnowledge managementComputer Networks and CommunicationsComputer sciencebusiness.industryEducational technologyCollaborative learningOpen learningExperiential learningLearning sciencesComputer Science ApplicationsEducationSynchronous learningActive learningta516businessta515The Internet and Higher Education
researchProduct

A Repository for Multirelational Dynamic Networks

2012

Nowadays, WWW contains a number of social media sites, which are growing rapidly. One of the main features of social media sites is to allow to its users creation and modification of contents of the site utilizing the offered WWW interfaces. Such contents are referred to as user generated contents and their type varies from site to site. Social media sites can be modeled as constantly evolving multirelational directed graphs. In this paper we discuss persistent data structures for such graphs, and present and analyze queries performed against the structures. We also estimate the space requirements of the proposed data structures, and compare them with the naive "store each complete snapshot…

ta113Databasebusiness.industryComputer scienceDirected graphcomputer.software_genreData structureData modelingTemporal databaseSnapshot (computer storage)Social mediaPersistent data structurebusinesscomputerContent management2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct