Search results for "computer.software_genre"
showing 10 items of 3858 documents
Corrigendum to “Predicting service request in support centers based on nonlinear dynamics, ARMA modeling and neural networks” [Expert Systems with Ap…
2013
Privacy Enhanced Device Access
2012
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
A Cloud Federation Architecture
2015
Cloud Computing is the state of the art computation paradigm enabling providers to offer computing resources to customers in a pay-per-use fashion. Nowadays public Cloud providers offer similar services within few service models, mainly IaaS and PaaS. Cloud providers give to the user the feeling to dispose of infinite resources, thus having to predict the user requirements in order to provide services with minimal costs, maintaining at the same time high levels of SLAs. In order to achieve this goal, Cloud providers can cooperate together to bring new business opportunities, such as expanding available resources, achieving cost effective asset optimization and adopting power saving policies…
A hybrid approach to semantic web services matchmaking
2008
AbstractDeploying the semantics embedded in web services is a mandatory step in the automation of discovery, invocation and composition activities. The semantic annotation is the “add-on” to cope with the actual interoperability limitations and to assure a valid support to the interpretation of services capabilities. Nevertheless many issues have to be reached to support semantics in the web services and to guarantee accurate functionality descriptions. Early efforts address automatic matchmaking tasks, in order to find eligible advertised services which appropriately meet the consumer’s demand. In the most of approaches, this activity is often entrusted to software agents, able to drive re…
A weighted logistic regression for conjoint analysis and Kansei engineering
2007
Customer needs for emotional satisfaction are increasingly being considered by product and service designers. While several existing methods such as conjoint analysis (CA), Kano model and quality function deployment support the translation of customer requirements into technical specifications, researchers are now working to develop methods aimed at integrating affective aspects into product design. Kansei engineering (KE) is a design philosophy that considers customer perceptions and emotions by adopting a multi-disciplinary approach. CA is a useful tool within a KE project. This article presents a methodology for conducting a KE project in early development phases. This methodology is bas…
Involving the elderly in the content development of a health enhancing tablet-based service
2014
The aim of the present study was to specify the needs of elderly for a health-enhancing tablet-based service. An interview study was performed with voluntary elderly (N=19, female 15, male 4, aged 76.2 years (SD 8.3)). The attitudes towards improving health behaviours and technology utilisation were explored. The content illustrations were developed for the interviews, and evaluated by participants using a numerical scale (1 very poor − 5 very good) and verbal feedback. Content analysis was used in the analysis of qualitative data. Taking care of one's own well-being comprehensively was the most important incentive to maintain one's activity. Content illustrations were evaluated as high (av…
Model-Driven Development Approach for Providing Smart Home Services
2009
Smart home is about the application of automation techniques for the comfort and security of residents' privately owned homes. In a smart home environment, different and independent embedded devices provide services that can be freely used by others, in the sense of service invocation. This paper presents our idea of using Model Driven Development (MDD) for the composition of existing services, by which we aim at demonstrating how new smart home services will be promoted.
Media Delivery to Remote Renderers Controlled by the Mobile Phone
2009
In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.
American Options Based Service Pricing For Virtual Operators
2008
In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…