Search results for "Data_MISCELLANEOUS"

showing 10 items of 31 documents

Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages

2012

Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle.

EngineeringSoftwareProcess managementbusiness.industryData_MISCELLANEOUSCloud computingProduct (category theory)Marketingbusiness
researchProduct

A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection

2019

Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingQuantization (signal processing)Data_MISCELLANEOUS020207 software engineeringWatermark02 engineering and technologyGraphics (cs.GR)Computer Science - Graphics[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingComputer engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshVertex normalQuantization (image processing)Digital watermarkingCryptography and Security (cs.CR)ComputingMilieux_MISCELLANEOUSSmoothing
researchProduct

Mappings of finite distortion: Sharp Orlicz-conditions

2003

We establish continuity, openness and discreteness, and the condition $(N)$ for mappings of finite distortion under minimal integrability assumptions on the distortion.

General MathematicsDistortionMathematical analysisData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONData_CODINGANDINFORMATIONTHEORYfinite distortionTopologycontinuityopenness and discretenessMathematicsOrlicz conditions30C65
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Generalized Dimension Distortion under Mappings of Sub-Exponentially Integrable Distortion

2010

We prove a dimension distortion estimate for mappings of sub-exponentially integrable distortion in Euclidean spaces, which is essentially sharp in the plane.

Integrable systemMathematics - Complex VariablesGeneral MathematicsModulota111Mathematical analysisData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONData_CODINGANDINFORMATIONTHEORY30C62Distortion (mathematics)Exponential growthDimension (vector space)TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYEuclidean geometryFOS: MathematicsComplex Variables (math.CV)Constant (mathematics)MathematicsMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Techno-Trust and Rational Trust in Technology – A Conceptual Investigation

2018

Part 2: Methodological; International audience; Trust is essential when using technology. If people do not trust new technology, they do not accept it. If people do not accept new technologies such as autonomous ships, their development is hampered in the absence of financial support. The importance of trust brings into question the essential conceptual components of phenomena that contribute to trust. This knowledge is required for the basis of investigating trust in technology. Especially, it is important to understand why humans trust. The reasons can be intuitive but they can also be supported by rational arguments. The latter type of trust can be called rational trust. A beneficial way…

Knowledge managementrational trustDesignComputer scienceEmerging technologiesbusiness.industrydesignData_MISCELLANEOUShuman-technology interactionHuman-technology interactionOrder (business)Techno-Trustluottamusihminen-konejärjestelmätrationaalisuusteknologia[INFO]Computer Science [cs]Rational trustbusinesstechno-trust
researchProduct

An Advanced Technique for User Identification Using Partial Fingerprint

2013

User identification is a very interesting and complex task. Invasive biometrics is based on traits uniqueness and immutability over time. In forensic field, fingerprints have always been considered an essential element for personal recognition. The traditional issue is focused on full fingerprint images matching. In this paper an advanced technique for personal recognition based on partial fingerprint is proposed. This system is based on fingerprint local analysis and micro-features, endpoints and bifurcations, extraction. The proposed approach starts from minutiae extraction from a partial fingerprint image and ends with the final matching score between fingerprint pairs. The computation o…

MinutiaeSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMatching (statistics)Biometricsbusiness.industryComputer scienceData_MISCELLANEOUSFeature extractionFingerprint Verification CompetitionPattern recognitionFingerprint recognitionIdentification (information)FingerprintComputer visionArtificial intelligenceUser identification Partial fingerprint Minutiae Roto-translation parametersbusiness
researchProduct

Modeling Changes for SHOIN(D) Ontologies: An Exhaustive Structural Model

2013

Ontology development starts with a rigorous ontological analysis that provides a conceptualization of the domain to model agreed by the community. An ontology, specified in a formal language, approximates the intended models of this conceptualization. It needs then to be revised and refined until an ontological commitment is found. Also ulterior updates, responding to changes in the domain and/or the conceptualization, are expected to occur throughout the ontology life cycle. To handle a consistent application of changes, a couple of ontology evolution methodologies have been proposed. Maintaining the structural consistency is one of the ontology evolution criteria. It implies modeling chan…

Ontology Inference Layer[INFO.INFO-LO] Computer Science [cs]/Logic in Computer Science [cs.LO][INFO.INFO-WB] Computer Science [cs]/WebComputer scienceProcess ontology030303 biophysicsData_MISCELLANEOUS[ INFO.INFO-WB ] Computer Science [cs]/Web02 engineering and technologyOntology (information science)computer.software_genre03 medical and health sciencesOntology chart[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]SHOIN(D) Description LogicOntology components0202 electrical engineering electronic engineering information engineeringUpper ontologyOWL DL[INFO.INFO-FL] Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]0303 health sciencesbusiness.industryOntology-based data integration[INFO.INFO-WB]Computer Science [cs]/WebSuggested Upper Merged Ontology[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]Structural ConsistencyOntology EvolutionIEEE[ INFO.INFO-FL ] Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Ontology Model020201 artificial intelligence & image processing[ INFO.INFO-LO ] Computer Science [cs]/Logic in Computer Science [cs.LO]Artificial intelligenceComputingMethodologies_GENERALChange ModellingbusinesscomputerNatural language processing
researchProduct

A new method for the optimum generation of real colours on CRT monitors

1997

The use of computers for colour generation is widely extended in colour research. Sometimes the reproduction of colours whose chromaticity coordinates correspond to a specific real standard is fundamental. In this paper we present a review of the capabilities and limitations of CRT monitors to generate colours. Finally, we propose a method for the optimum generation of real colours based on visual perception.

OpticsVisual perceptionbusiness.industryComputer scienceData_MISCELLANEOUSChromaticitybusinessJournal of Optics
researchProduct

Primitive rispetto all’ oscillazione

2002

We study the real valued functions having a primitive with respect to the oscillation or a primitive with respect to the oscillation up to anegligible set.

Set (abstract data type)Pure mathematicsOscillationGeneral MathematicsData_MISCELLANEOUSHardware_INTEGRATEDCIRCUITSHardware_PERFORMANCEANDRELIABILITYAlgebra over a fieldMathematicsRendiconti del Circolo Matematico di Palermo
researchProduct