Search results for "computer.software_genre"

showing 10 items of 3858 documents

Adaptive SDN-based architecture using QoE metrics in live video streaming on Cloud Mobile Media

2017

The increasing adoption of smart phones, the increased access to mobile broadband networks and the availability of public cloud infrastructures are aligning to the next generation of truly ubiquitous multimedia services, known as Cloud Mobile Media (CMM) services. Nevertheless, due to an inherit higher and variable end to end delay mainly as a result of the virtualization process, new challenges appear in particular for live video streaming applications in order to keep a good Quality of Experience of the delivered video. Thus, to keep client's satisfaction at good levels in terms of Mean Opinion Score (MOS), we propose an adaptive Software Defined Networking (SDN)-based architecture runnin…

Schedulebusiness.industryComputer scienceMean opinion scoreMobile broadbandEnd-to-end delayCloud computingVirtualizationcomputer.software_genreVideo qualityQuality of experiencebusinesscomputerComputer network2017 Fourth International Conference on Software Defined Systems (SDS)
researchProduct

A Dynamic Attribute-Based Authentication Scheme

2015

Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…

Scheme (programming language)AuthenticationComputer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSConstruct (python library)computer.software_genreSignature (logic)Authentication protocolLightweight Extensible Authentication ProtocolData miningChallenge–response authenticationcomputerData Authentication Algorithmcomputer.programming_language
researchProduct

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

2015

Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …

Scheme (programming language)AuthenticationProperty (philosophy)Theoretical computer scienceTraceabilityDatabaseComputer scienceAuthentication schemecomputer.software_genreSignature (logic)Set (abstract data type)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAttribute treecomputercomputer.programming_language
researchProduct

Fast narrowing-driven partial evaluation for inductively sequential programs

2005

Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good results on small programs, it does not scale up well to realistic problems (e.g., interpreter specialization). In this work, we introduce a faster partial evaluation scheme by ensuring the termination of the process offline . For this purpose, we first characterize a class of programs which are quasi-terminating , i.e., the computations performed with needed narrowing—the symbolic computation mechanism of narrowing-driven partial evaluation—only contain finitely many different terms (and, thus, partial evaluation termi…

Scheme (programming language)Class (computer programming)Functional programmingTheoretical computer scienceComputer scienceComputationProgram transformationcomputer.software_genreSymbolic computationComputer Graphics and Computer-Aided DesignPartial evaluationProgram analysisLogical programmingSpecialization (logic)Automatic programmingcomputerSoftwareInterpretercomputer.programming_languageProceedings of the tenth ACM SIGPLAN international conference on Functional programming
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

UCS: Ultimate course search

2016

International audience; In this system prototype demonstration we present, Ultimate Course Search (UCS), a learning tool developed to provide students ways to efficiently search electronic educational materials. UCS integrates slides, lecture videos and textbooks into a single platform. The keywords extracted from the textbooks and the slides are the basis of the indexing scheme. For the videos, UCS relies on slide transitions and metadata to establish the correspondence between slides and video segments. The video segmentation is based on the slides being presented using the meta-data provided by the video recording software and image processing techniques.

Scheme (programming language)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologycomputer.software_genreCourse (navigation)[SPI]Engineering Sciences [physics]Software[ SPI.NRJ ] Engineering Sciences [physics]/Electric power[ SPI ] Engineering Sciences [physics]ComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringSegmentationcomputer.programming_languageMultimediabusiness.industry4. Education[SPI.NRJ]Engineering Sciences [physics]/Electric powerSearch engine indexing020207 software engineeringImage segmentation[ SPI.TRON ] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsMetadata020201 artificial intelligence & image processingbusinesscomputer2016 14th International Workshop on Content-Based Multimedia Indexing (CBMI)
researchProduct

Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.

2008

Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…

Scheme (programming language)Computer sciencemedia_common.quotation_subjectHash functionHealth Informaticscomputer.software_genreEncryption01 natural sciencesField (computer science)Patient identificationPublic-key cryptography010104 statistics & probability03 medical and health sciences0302 clinical medicineHealth Information ManagementOriginality030212 general & internal medicine0101 mathematicscomputer.programming_languagemedia_commonAdvanced and Specialized Nursingbusiness.industryData CollectionEpidemiologic StudiesIdentity (object-oriented programming)Data miningbusinesscomputerAlgorithmsConfidentialityMethods of information in medicine
researchProduct

On Obtaining Classification Confidence, Ranked Predictions and AUC with Tsetlin Machines

2020

Tsetlin machines (TMs) are a promising approach to machine learning that uses Tsetlin Automata to produce patterns in propositional logic, leading to binary (hard) classifications. In many applications, however, one needs to know the confidence of classifications, e.g. to facilitate risk management. In this paper, we propose a novel scheme for measuring TM confidence based on the logistic function, calculated from the propositional logic patterns that match the input. We then use this scheme to trade off precision against recall, producing area under receiver operating characteristic curves (AUC) for TMs. Empirically, using four real-world datasets, we show that AUC is a more sensitive meas…

Scheme (programming language)Decision support systemReceiver operating characteristicComputer sciencebusiness.industry0206 medical engineeringBinary number02 engineering and technologyPropositional calculusMachine learningcomputer.software_genreAutomatonSupport vector machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligenceLogistic functionbusinesscomputer020602 bioinformaticscomputer.programming_language2020 IEEE Symposium Series on Computational Intelligence (SSCI)
researchProduct