Search results for "ICE"

showing 10 items of 26338 documents

Using a mobile application to support children's writing motivation

2013

PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…

ta113Class (computer programming)Multimediabusiness.industryComputer scienceUsabilitycomputer.software_genreEducationBlended learningWriting motivationComputer Science (miscellaneous)Mathematics educationCreative writingMobile technologyta516businessMobile deviceResearch questioncomputerInteractive Technology and Smart Education
researchProduct

An Information system design product theory for the abstract class of integrated requirements and delivery management systems

2014

Information and Communications Technology-enabled international sourcing of software-intensive systems and services (eSourcing) is increasingly used as a means of adding value, reducing costs, sharing risks, and achieving strategic aims. To maximally reap the benefits from eSourcing and to mitigate the risks, providers and clients have to be aware of and build capabilities for the eSourcing life-cycle. China is in a position to become a superpower for eSourcing service provisioning, but most Chinese eSourcing service providers are small or medium-sized and typically work for larger intermediaries instead of end-clients, limiting their business and capabilities development. The extant litera…

ta113Class (computer programming)Process managementKnowledge managementbusiness.industryComputer scienceService providerCost reductionIntermediaryRisk analysis (business)Management systemInformation systemProduct (category theory)business
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

How Students Get Going : Triggers for Students’ Learning in Project-Based Education

2018

Repeatedly documented positive student responses to project-based learning during its decades-long tradition in CS attest to the effectiveness of learning by doing. Support for reflective learning nevertheless continues to be a topic worth studying because the intensity of project work together with a high technical orientation among CS students often complicate reflective practice. A critical incident-inspired assignment was added to a project-based course to support reflective practice in spring 2017. In a previous study, the authors analyzed how students approached the assignment and whether they found it supportive for learning. The present study content-analyses the situations that tri…

ta113Computer sciencegovernment.form_of_governmentReflective practice05 social sciences0211 other engineering and technologiesprojektioppiminen050301 education02 engineering and technologyProject-based learningLearning-by-doing (economics)Work (electrical)Project basedproject-based learningMathematics educationgovernmentlearning triggersStudent learning0503 educationCritical Incident Techniquereflektio021106 design practice & managementIncident reportreflection
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct

An easy approach to epistemology and ontology in computing theses

2013

In many research fields---notably social sciences but also in those fields where design, experiment-based science, and social sciences are mixed---researchers must often describe their epistemological and ontological commitments in research reports. The research literature describes those commitments in various ways, often grouped under research paradigms such as positivism, post-positivism, and constructivism, and described as "world views." This paper presents the bare bones of the ontological and epistemological questions in scientific practice. Ontologically speaking, subject matters can be mind-dependent or mind-independent. Epistemologically speaking, elements of research may be more …

ta113Constructivism (philosophy of education)Interpretation (philosophy)Scientific practiceSubject (philosophy)Information systemOntologyta516SociologyPositivismta611EpistemologyTerminology
researchProduct

Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks

2015

The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare perfor…

ta113Engineeringta213business.industryEvent (computing)Real-time computingProbabilistic logicdata miningSONanomaly detectionself-organizing networksLTEBase stationcell outageSoftwareRandom-access channelUser equipmentNetwork serviceAnomaly detectionmobile cellular networkstiedonlouhintabusiness
researchProduct