Search results for "Data_MISCELLANEOUS"
showing 10 items of 31 documents
Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages
2012
Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle.
A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection
2019
Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…
Mappings of finite distortion: Sharp Orlicz-conditions
2003
We establish continuity, openness and discreteness, and the condition $(N)$ for mappings of finite distortion under minimal integrability assumptions on the distortion.
Security and privacy in the cloud a long-term view
2011
In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.
Generalized Dimension Distortion under Mappings of Sub-Exponentially Integrable Distortion
2010
We prove a dimension distortion estimate for mappings of sub-exponentially integrable distortion in Euclidean spaces, which is essentially sharp in the plane.
Techno-Trust and Rational Trust in Technology – A Conceptual Investigation
2018
Part 2: Methodological; International audience; Trust is essential when using technology. If people do not trust new technology, they do not accept it. If people do not accept new technologies such as autonomous ships, their development is hampered in the absence of financial support. The importance of trust brings into question the essential conceptual components of phenomena that contribute to trust. This knowledge is required for the basis of investigating trust in technology. Especially, it is important to understand why humans trust. The reasons can be intuitive but they can also be supported by rational arguments. The latter type of trust can be called rational trust. A beneficial way…
An Advanced Technique for User Identification Using Partial Fingerprint
2013
User identification is a very interesting and complex task. Invasive biometrics is based on traits uniqueness and immutability over time. In forensic field, fingerprints have always been considered an essential element for personal recognition. The traditional issue is focused on full fingerprint images matching. In this paper an advanced technique for personal recognition based on partial fingerprint is proposed. This system is based on fingerprint local analysis and micro-features, endpoints and bifurcations, extraction. The proposed approach starts from minutiae extraction from a partial fingerprint image and ends with the final matching score between fingerprint pairs. The computation o…
Modeling Changes for SHOIN(D) Ontologies: An Exhaustive Structural Model
2013
Ontology development starts with a rigorous ontological analysis that provides a conceptualization of the domain to model agreed by the community. An ontology, specified in a formal language, approximates the intended models of this conceptualization. It needs then to be revised and refined until an ontological commitment is found. Also ulterior updates, responding to changes in the domain and/or the conceptualization, are expected to occur throughout the ontology life cycle. To handle a consistent application of changes, a couple of ontology evolution methodologies have been proposed. Maintaining the structural consistency is one of the ontology evolution criteria. It implies modeling chan…
A new method for the optimum generation of real colours on CRT monitors
1997
The use of computers for colour generation is widely extended in colour research. Sometimes the reproduction of colours whose chromaticity coordinates correspond to a specific real standard is fundamental. In this paper we present a review of the capabilities and limitations of CRT monitors to generate colours. Finally, we propose a method for the optimum generation of real colours based on visual perception.
Primitive rispetto all’ oscillazione
2002
We study the real valued functions having a primitive with respect to the oscillation or a primitive with respect to the oscillation up to anegligible set.