Search results for "computer.software_genre"

showing 10 items of 3858 documents

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Global vegetation monitoring through multitemporal analysis of pathfinder AVHRR land database

2005

We have applied a Land Surface Temperature algorithm to the whole Pathfinder AVHRR Land (PAL) database, aiming at studying the evolution of the vegetation at a global scale. The Land Surface Temperature parameter, along with NDVI, will allow retrieving vegetation changes between July 1981 and September 2001. We have also built a classification which takes into account both vegetation variations and thermal patterns, from NDVI and Air Temperature at 2 meters height data. This classification allows differentiating areas which present close vegetation changes throughout the year, but totally different climates, as for example in mountainous and semiarid regions. The main quality of this classi…

PathfinderLand surface temperatureDatabaseClimatologyNorthern HemisphereEnvironmental scienceSatelliteVegetationLand coverScale (map)computer.software_genrecomputerNormalized Difference Vegetation IndexRemote Sensing for Agriculture, Ecosystems, and Hydrology VII
researchProduct

An optimal code for patient identifiers.

2004

How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.

Patient Identification SystemsComputer scienceTransposition (telecommunications)Health Informaticscomputer.software_genreComputer Science ApplicationsIdentifierCode (cryptography)Data miningConstant-weight codeAlphabetError detection and correctionAlgorithmcomputerSoftwareAlgorithmsConfidentialityMathematicsComputer methods and programs in biomedicine
researchProduct

Bagging, bumping, multiview, and active learning for record linkage with empirical results on patient identity data

2011

Record linkage or deduplication deals with the detection and deletion of duplicates in and across files. For this task, this paper introduces and evaluates two new machine-learning methods (bumping and multiview) together with bagging, a tree-based ensemble-approach. Whereas bumping represents a tree-based approach as well, multiview is based on the combination of different methods and the semi-supervised learning principle. After providing a theoretical background of the methods, initial empirical results on patient identity data are given. In the empirical evaluation, we calibrate the methods on three different kinds of training data. The results show that the smallest training data set, …

Patient Identification SystemsTraining setComputer scienceActive learning (machine learning)business.industryHealth InformaticsEmpirical Researchcomputer.software_genreMachine learningComputer Science ApplicationsTask (project management)Set (abstract data type)Tree (data structure)Artificial IntelligenceIdentity (object-oriented programming)HumansBumpingMedical Record LinkageArtificial intelligenceData miningbusinesscomputerSoftwareRecord linkageComputer Methods and Programs in Biomedicine
researchProduct

An Augmented Reality System for Treating Psychological Disorders: Application to Phobia to Cockroaches

2005

Augmented reality has been used in many fields, but it has not been used to treat psychological disorders. Augmented reality presents several advantages respect to: the traditional treatment of psychological disorders and virtual reality treatments. In this paper we present the first augmented reality system for the treatment of phobia to cockroaches. Our system has been developed using ARToolkit software. It has been tested with one patient and the results have been very satisfactory. At first of the exposure session the patient was not able to approach to a real cockroach and after the exposure session using our augmented reality system, the patient was able to approach to a real cockroac…

Patient diagnosisPhobiasMultimediaComputer scienceHuman–computer interactionmedicineAugmented realitySession (computer science)Virtual realityComputer-mediated realitycomputer.software_genremedicine.diseasecomputerThird IEEE and ACM International Symposium on Mixed and Augmented Reality
researchProduct

On the Construction of Optimum Categories in Biomedical Data Recognition Problems

1979

The recognition of patterns within sets of biomedical data involves the following problems: a) Proper recording of the data to be used b) Extraction of suitable features c) Choice of categories or classes which are relevant to the medical decision task d) Estimation of the underlying distributions in the case of using parametric methods e) Choice of an adequate classification rule Whereas a lot of theories and procedures exists for most of these steps — particularly in the field of computer-aided differential diagnosis of electrocardiograms (ECG) (see [6]) — there has been only rare considerations on the problems of definition of appropriate categories.

Pattern vectorComputer sciencebusiness.industryQuadratic classifierMachine learningcomputer.software_genreField (computer science)Task (project management)Biomedical dataClassification ruleParametric methodsArtificial intelligencebusinesscomputer
researchProduct

Peer assessment based assignment to enhance interactions in online learning groups

2015

In this paper, we report on the findings from our PhD work on how peer assessment based assignment method can enhance interaction in online learning groups. The method is explored and tried out on the research methods course on the Bachelor of Commerce Programme which is run in distance learning mode at Makerere University. Based on the idea that learning groups can enhance effective learning in online learning environments, we used the affordance eLearning framework to design the peer assessment based assignment task and then qualitative methods collect and report on data. The results reveal that there was increased interaction through peer feedback. Students were motivated because of the …

Peer feedbackMultimediaComputer sciencemedia_common.quotation_subjectDistance educationBachelorcomputer.software_genreTask (project management)Peer assessmentQuality (business)Affordancecomputermedia_commonQualitative research2015 International Conference on Interactive Collaborative Learning (ICL)
researchProduct

Adaptive formative feedback to improve strategic search decisions in task-oriented reading

2014

This study analyses the effectiveness of adaptive formative feedback to boost strategic search decisions and performance when students are asked to answer a set of questions in a task-oriented reading situation. We compared automatic feedback that included information about the right answer with feedback that also included the connection between the students' strategic search decisions and their performance. Ninety-two high school students read two non-continuous texts. They received feedback during a training phase, and then they read and also received feedback with a similar text in a final phase. Text and questions were presented using a new computer-based technology that provided automa…

Peer feedbackMultimediaComputer sciencemedia_common.quotation_subjectcomputer.software_genrePhase (combat)Computer Science ApplicationsEducationFormative assessmentComprehensionReading (process)Mathematics educationTask orientedTraining phaseSet (psychology)computermedia_commonJournal of Computer Assisted Learning
researchProduct