Search results for "SOFTWARE"
showing 10 items of 7396 documents
Security of information in IT systems
2005
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
Revenue models in cloud computing
2012
Cloud computing brings new possibilities, allowing software firms to sell their software products using the Software-as-a-Service (SaaS) model. SaaS provides opportunities for flexible pricing but creates challenges on how to achieve a profitable revenue stream. In this multicase study, the revenue models of five SaaS providers were examined. The main interest of the study was to investigate the different revenue models and the reasons for using particular revenue models. The revenue models were found to be mainly based on software renting, with a variety of pricing strategies. For SaaS providers, software renting generates a steady and predictable stream of revenue. The software renting mo…
Benefits of Software Renting in Cloud Business
2012
In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become a strategic tool to compete in the market. In this multi-case study, software renting was found to help the case firms to (i) differentiate themselves from competitors; (ii) increase their competitive advantage by making the software available for a larger customer group, and (iii) decrease the price of software by using centralized software delivery and maintenance. peerReviewed
Signal processing procedures for the evaluation of the cardiovascular effects in the obstructive sleep apnea syndrome
2002
A new index, the cross-power index (CPI), is proposed to quantify the severity of obstructive sleep apnea syndrome (OSAS) in terms of its cardiovascular effects. On the basis of the influences that recurring drops in oxygen saturation have on systolic blood pressure variability of OSAS patients, CPI is defined as the integral of the cross-spectrum modulus between systolic blood pressure and oxygen saturation. In a test group of 22 subjects, CPI correctly identified all 15 OSAS patients included in the pool. Moreover, evaluation of CPI in six OSAS patients sleeping with and without a CPAP (continuous positive airway pressure) device demonstrated that CPAP treatment substantially reduced the …
A statistical model for magnitudes and angles of wavelet frame coefficients and its application to texture retrieval
2014
Abstract This paper presents a texture descriptor based on wavelet frame transforms. At each position in the image, and for each resolution level, we consider both vertical and horizontal wavelet detail coefficients as the components of a bivariate random vector. The magnitudes and angles of these vectors are computed. At each level the empirical histogram of magnitudes is modeled by a Generalized Gamma distribution, and the empirical histogram of angles is modeled by a different version of the von Mises distribution that accounts for histograms with 2 modes. Each texture is characterized by few parameters. A new distance is presented (based on the Kullback–Leibler divergence) that allows g…
Cloud Services Pricing Models
2013
A major condition for commercial success is a well-defined pricing strategy, however, cloud service providers face many challenges around pricing. Clearness and transparency in pricing is beneficial for all the actors in the ecosystem, where the currently existing abundance of different pricing models makes decision making difficult for service providers, partners, customers and competitors. In this paper, the SBIFT pricing model is evaluated and updated to cloud context. As a result, a 7-dimensional cloud pricing framework is proposed that helps clarifying the possible pricing models in order to let companies differentiate themselves from competitors by price. The framework can be used als…
Using Induced Ordered Weighted Averaging (IOWA) Operators for Aggregation in Cross-Efficiency Evaluations
2014
This paper proposes an enhancement of the cross-efficiency evaluation through the aggregation of cross-efficiencies by using a particular type of induced ordered weighted averaging IOWA operator. The use of a weighted average of cross-efficiencies for the calculation of the cross-efficiency scores, instead of the usual arithmetic mean, allows us to introduce some flexibility into the analysis. In particular, the main purpose of the approach we present is to provide aggregation weights that reflect the decision maker DM preferences regarding the relative importance that should be attached to the cross-efficiencies provided by the different decision-making units. To do it, an ordering is to b…
Southeast Asia as a Linguistic Area
2006
The languages belonging to the families of Mon-Khmer, Tai, Sinitic, Hmong-Mien, and Chamic (Malayo-Polynesian) spoken in mainland Southeast Asia share a considerable number of properties due to contact-induced convergence. General characteristics of the languages in this area are the lack of obligatory grammatical categories and the central role of pragmatics (indeterminateness), syllabic morphology, and relatively flexible correlations between word class and syntactic positions (versatility). The following properties will be described in some more detail: word order, numeral classifiers, cooccurrence patterns of the verb with coverbs, tense-aspect-modality markers and directional verbs, an…
The Critical Mass of Wireless Communications
2011
The aim of this chapter is to identify and analyze the timing and level of critical mass in the development of market penetration for wireless communications. The authors assume that critical mass is fulfilled at the point when the acceleration of the diffusion process is at its maximum. In practice, this point is determined by estimating the diffusion function and calculating the second derivative with respect to time. The diffusion of mobile subscription is modelled using the Bass diffusion model. The penetration levels and points of time of critical mass of 209 countries or areas of the world are identified and subsequently subjected to regression analysis against population and economic…
Intra-cardiac Signatures of Atrial Arrhythmias Identified by Machine Learning and Traditional Features
2021
Intracardiac devices separate atrial arrhythmias (AA) from sinus rhythm (SR) using electrogram (EGM) features such as rate, that are imperfect. We hypothesized that machine learning could improve this classification.