Search results for "Soft"

showing 10 items of 9809 documents

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Using a mobile application to support children's writing motivation

2013

PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…

ta113Class (computer programming)Multimediabusiness.industryComputer scienceUsabilitycomputer.software_genreEducationBlended learningWriting motivationComputer Science (miscellaneous)Mathematics educationCreative writingMobile technologyta516businessMobile deviceResearch questioncomputerInteractive Technology and Smart Education
researchProduct

Design principles for collaboration platforms for open education

2015

Increasing the current low uptake of Open Education Resources (OER) is a key challenge for researchers and practitioners in the field. User studies have shown that collaboration is a main success factor for successful open educational activities. However, effective collaboration in open educational contexts requires well planned processes and platforms supporting collaboration, in particular in physically distributed settings. We have been investigating the value of such platforms, their main features and user requirements to enable collaboration from immature ideas to completed resources. We used quantitative and qualitative research methods to collect insights from potential users of such…

ta113Collaborative softwareKnowledge managementopen educational resourcesbusiness.industryComputer scienceIntellectual propertyUser requirements documentOpen educational resourcesFocus groupcollaborationTerminologyOpen educationcollaboration platformsOERopen educationbusinessQualitative research
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct