Search results for "cloud computing."

showing 10 items of 325 documents

Mobility and Spatio-Temporal Exposure Control

2013

Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…

Risk analysisService (systems architecture)Cover (telecommunications)Computer Networks and Communicationsbusiness.industryInternet privacyContext (language use)Cloud computingComputer securitycomputer.software_genreAsset (computer security)Hardware and ArchitectureRoamingbusinesscomputerVulnerability (computing)Journal of Cyber Security and Mobility
researchProduct

Examining business models of Software-as-a-Service companies

2013

SaaSliiketoimintamallitpilvipalvelutsoftware businessulkoistaminenohjelmistoalacloud computingsoftware companiesbusiness modelsohjelmistoliiketoimintaIT outsourcingtietotekniikkayrityksetSoftware-as-a-Service
researchProduct

Software-as-a-Service Revenue Models

2013

When should software providers maintain their traditional licensing model versus offering software as a service, and which SaaS model is more profitable: rental or pay per use? For customers, what are the trade-offs between traditional licensing, renting, and paying per use? peerReviewed

SaaSrevenue modelscloud computingsoftware licensingpay-per-usesoftware renting
researchProduct

Superparameterised cloud effects in the EMAC general circulation model (v2.50) – influences of model configuration

2020

A new module has been implemented in the fifth generation of the ECMWF/Hamburg (ECHAM5)/Modular Earth Submodel System (MESSy) Atmospheric Chemistry (EMAC) model that simulates cloud-related processes on a much smaller grid. This so-called superparameterisation acts as a replacement for the convection parameterisation and large-scale cloud scheme. The concept of embedding a cloud-resolving model (CRM) inside of each grid box of a general circulation model leads to an explicit representation of cloud dynamics. The new model component is evaluated against observations and the conventional usage of EMAC using a convection parameterisation. In particular, effects of applying different configurat…

Scale (ratio)Meteorologybusiness.industryCloud coverlcsh:QE1-996.5Cloud computingSensible heatGridlcsh:GeologyDiurnal cycleEnvironmental scienceClimate statePrecipitationbusinessGeoscientific Model Development
researchProduct

Towards a mean body for apparel design

2016

This paper focuses on shape average with applications to the apparel industry. Apparel industry uses a consensus sizing system; its major concern is to fit most of the population into it. Since anthropometric measures do not grow linearly, it is important to find prototypes to accurately represent each size. This is done using random compact mean sets, obtained from a cloud of 3D points given by a scanner and applying to the sample a previous definition of mean set. Additionally, two approaches to define confidence sets are introduced. The methodology is applied to data obtained from a real anthropometric survey. This paper has been partially supported by the following grants: TIN2009-14392…

ScannerComputer sciencePopulationCloud computingSample (statistics)02 engineering and technologycomputer.software_genre01 natural sciencesSet (abstract data type)010104 statistics & probabilityMean setAnthropometric surveyApparel design0202 electrical engineering electronic engineering information engineering0101 mathematicseducationeducation.field_of_studybusiness.industryConfidence setClothingSizingCompact spaceSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionData miningbusinesscomputerImage and Vision Computing
researchProduct

Adaptive SDN-based architecture using QoE metrics in live video streaming on Cloud Mobile Media

2017

The increasing adoption of smart phones, the increased access to mobile broadband networks and the availability of public cloud infrastructures are aligning to the next generation of truly ubiquitous multimedia services, known as Cloud Mobile Media (CMM) services. Nevertheless, due to an inherit higher and variable end to end delay mainly as a result of the virtualization process, new challenges appear in particular for live video streaming applications in order to keep a good Quality of Experience of the delivered video. Thus, to keep client's satisfaction at good levels in terms of Mean Opinion Score (MOS), we propose an adaptive Software Defined Networking (SDN)-based architecture runnin…

Schedulebusiness.industryComputer scienceMean opinion scoreMobile broadbandEnd-to-end delayCloud computingVirtualizationcomputer.software_genreVideo qualityQuality of experiencebusinesscomputerComputer network2017 Fourth International Conference on Software Defined Systems (SDS)
researchProduct

Algorithmic differentiation for cloud schemes (IFS Cy43r3) using CoDiPack (v1.8.1)

2019

Abstract. Numerical models in atmospheric sciences not only need to approximate the flow equations on a suitable computational grid, they also need to include subgrid effects of many non-resolved physical processes. Among others, the formation and evolution of cloud particles is an example of such subgrid processes. Moreover, to date there is no universal mathematical description of a cloud, hence many cloud schemes have been proposed and these schemes typically contain several uncertain parameters. In this study, we propose the use of algorithmic differentiation (AD) as a method to identify parameters within the cloud scheme, to which the output of the cloud scheme is most sensitive. We il…

Scheme (programming language)Mathematical optimization010504 meteorology & atmospheric sciencesComputer scienceAutomatic differentiationbusiness.industrylcsh:QE1-996.5Cloud computing010103 numerical & computational mathematicsGeneral MedicineLimitingNumerical modelsGrid01 natural scienceslcsh:GeologyFlow (mathematics)0101 mathematicsUncertainty quantificationbusinesscomputer0105 earth and related environmental sciencescomputer.programming_languageGeoscientific Model Development
researchProduct

Algorithmic Differentiation for Cloud Schemes

2019

<p>Numerical models in atmospheric sciences do not only need to approximate the flow equations on a suitable computational grid, they also need to include subgrid effects of many non-resolved physical processes. Among others, the formation and evolution of cloud particles is an example of such subgrid processes. Moreover, to date there is no universal mathematical description of a cloud, hence many cloud schemes were proposed and these schemes typically contain several uncertain parameters. In this study, we propose the use of algorithmic differentiation (AD) as a method to identify parameters within the cloud scheme, to which the output of the cloud scheme is most sensitive.…

Scheme (programming language)Mathematical optimizationAutomatic differentiationbusiness.industryComputer scienceCloud computingLimitingNumerical modelsGridFlow (mathematics)Uncertainty quantificationbusinesscomputercomputer.programming_language
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

Analysis of dynamic service oriented systems for security related problems detection

2017

The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…

Security engineeringCloud computing securitysecurity incidentsSecurity serviceSoftware security assuranceComputer scienceDistributed computingSherwood Applied Business Security Architecturesecurity levelSecurity managementservice oriented systemsComputer security modelSecurity information and event management
researchProduct