Search results for "Computing"

showing 10 items of 25279 documents

Caractérisation et diagenèse thermique des roches mères pétrolières de la série des Schistes d'âge néocomien moyen-barrémien dans le bassin intérieur…

2006

8 pages; International audience

série des Schistes[SDE.MCG]Environmental Sciences/Global Changesbassin intérieur[ SDU.STU.ST ] Sciences of the Universe [physics]/Earth Sciences/Stratigraphy[ SDU.STU.GC ] Sciences of the Universe [physics]/Earth Sciences/Geochemistry[SDE.MCG.CPE]Environmental Sciences/Global Changes/domain_sde.mcg.cpeNéocomien[SDE.MCG.CPE] Environmental Sciences/Global Changes/domain_sde.mcg.cpe[ SDE.MCG.CPE ] Environmental Sciences/Global Changes/domain_sde.mcg.cpe[ SDE.MCG ] Environmental Sciences/Global Changes[SDE.MCG] Environmental Sciences/Global Changes[SDU.STU.GC]Sciences of the Universe [physics]/Earth Sciences/Geochemistry[SDU.STU.ST]Sciences of the Universe [physics]/Earth Sciences/Stratigraphymatière organiquegéochimie organique[SDU.STU.GC] Sciences of the Universe [physics]/Earth Sciences/Geochemistry[SDU.STU.ST] Sciences of the Universe [physics]/Earth Sciences/StratigraphyBarrémienGabonComputingMilieux_MISCELLANEOUS
researchProduct

Nodulisation et compaction différentielle dans une série crétacée du bassin intérieur gabonais.

2006

6 pages; International audience

série des Schistesfaciès lacustrescompaction différentielle[SDU.STU.ST]Sciences of the Universe [physics]/Earth Sciences/Stratigraphynodulisation[SDU.STU.ST] Sciences of the Universe [physics]/Earth Sciences/Stratigraphybassin intérieurGabon[ SDU.STU.ST ] Sciences of the Universe [physics]/Earth Sciences/StratigraphyComputingMilieux_MISCELLANEOUSCrétacé inférieur
researchProduct

Les archives de la Sûreté et l'histoire de la France des années 1930. A propos de travaux récents et de l'ANR Paprik@2F

2019

International audience

sûretéannées 1930histoire[SHS.HIST] Humanities and Social Sciences/HistoryANR Paprik@2FFrance[SHS.HIST]Humanities and Social Sciences/HistoryComputingMilieux_MISCELLANEOUS
researchProduct

Absolute quantification of noncoding RNA by microscale thermophoresis

2019

Abstract Accurate quantification of the copy numbers of noncoding RNA has recently emerged as an urgent problem, with impact on fields such as RNA modification research, tissue differentiation, and others. Herein, we present a hybridization‐based approach that uses microscale thermophoresis (MST) as a very fast and highly precise readout to quantify, for example, single tRNA species with a turnaround time of about one hour. We developed MST to quantify the effect of tRNA toxins and of heat stress and RNA modification on single tRNA species. A comparative analysis also revealed significant differences to RNA‐Seq‐based quantification approaches, strongly suggesting a bias due to tRNA modifica…

tRNA stabilityRNA UntranslatedAbsolute quantificationRNA Quantification | Hot PaperComputational biology010402 general chemistry01 natural sciencesCatalysis[SDV.BBM.GTP]Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]RNA modification540 ChemistryhybridizationComputingMilieux_MISCELLANEOUS010405 organic chemistryChemistryMicroscale thermophoresisCommunicationRNA[SDV.BBM.BM]Life Sciences [q-bio]/Biochemistry Molecular Biology/Molecular biologyGeneral ChemistryRibosomal RNANon-coding RNAmicroscale thermophoresisCommunications0104 chemical sciencesTissue DifferentiationTransfer RNA570 Life sciences; biologyfluorescenceRNA quantification
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

Introduction of Multiflow for HSDPA

2012

This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …

ta113Computer scienceNetwork packetbusiness.industryHSDPALoad balancing (computing)Antenna diversityMonipistelähetysScramblingHandoverTelecommunications linkNetwork performanceNodeBbusinessMultipoint transmissionComputer network2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct