Search results for "computer.software_genre"

showing 10 items of 3858 documents

Corrigendum to “Predicting service request in support centers based on nonlinear dynamics, ARMA modeling and neural networks” [Expert Systems with Ap…

2013

Service (business)Artificial neural networkbusiness.industryComputer scienceGeneral EngineeringMachine learningcomputer.software_genreExpert systemComputer Science ApplicationsNonlinear systemArtificial IntelligenceArtificial intelligencebusinesscomputerExpert Systems with Applications
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

A Cloud Federation Architecture

2015

Cloud Computing is the state of the art computation paradigm enabling providers to offer computing resources to customers in a pay-per-use fashion. Nowadays public Cloud providers offer similar services within few service models, mainly IaaS and PaaS. Cloud providers give to the user the feeling to dispose of infinite resources, thus having to predict the user requirements in order to provide services with minimal costs, maintaining at the same time high levels of SLAs. In order to achieve this goal, Cloud providers can cooperate together to bring new business opportunities, such as expanding available resources, achieving cost effective asset optimization and adopting power saving policies…

Service (business)Cloud computing securityVendorOrder (business)business.industryCloud testingCloud computingBusinessAsset (computer security)User requirements documentComputer securitycomputer.software_genrecomputer2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
researchProduct

A hybrid approach to semantic web services matchmaking

2008

AbstractDeploying the semantics embedded in web services is a mandatory step in the automation of discovery, invocation and composition activities. The semantic annotation is the “add-on” to cope with the actual interoperability limitations and to assure a valid support to the interpretation of services capabilities. Nevertheless many issues have to be reached to support semantics in the web services and to guarantee accurate functionality descriptions. Early efforts address automatic matchmaking tasks, in order to find eligible advertised services which appropriately meet the consumer’s demand. In the most of approaches, this activity is often entrusted to software agents, able to drive re…

Service (business)Computer scienceWS-I Basic Profilebusiness.industryApplied MathematicsServices computingSemantic web servicesOntology web language service (OWLS)Agentscomputer.software_genreSocial Semantic WebTheoretical Computer ScienceWorld Wide WebHybrid systemFuzzy C-mean (FCM) clusteringArtificial IntelligenceFuzzy multisetSemantic Web StackWeb serviceWS-PolicybusinessSemantic WebcomputerSoftwareInternational Journal of Approximate Reasoning
researchProduct

A weighted logistic regression for conjoint analysis and Kansei engineering

2007

Customer needs for emotional satisfaction are increasingly being considered by product and service designers. While several existing methods such as conjoint analysis (CA), Kano model and quality function deployment support the translation of customer requirements into technical specifications, researchers are now working to develop methods aimed at integrating affective aspects into product design. Kansei engineering (KE) is a design philosophy that considers customer perceptions and emotions by adopting a multi-disciplinary approach. CA is a useful tool within a KE project. This article presents a methodology for conducting a KE project in early development phases. This methodology is bas…

Service (business)EngineeringATTRIBUTE IMPORTANCEPhilosophy of designProduct designOperations researchSettore SECS-S/02 - Statistica Per La Ricerca Sperimentale E Tecnologicabusiness.industryMODELSManagement Science and Operations ResearchOF-FIT TESTScomputer.software_genreINTERIORConjoint analysisDESIGNKano modelHALOData miningOrdered logitKansei engineeringSafety Risk Reliability and QualitybusinesscomputerERRORQuality function deploymentQuality and Reliability Engineering International
researchProduct

Involving the elderly in the content development of a health enhancing tablet-based service

2014

The aim of the present study was to specify the needs of elderly for a health-enhancing tablet-based service. An interview study was performed with voluntary elderly (N=19, female 15, male 4, aged 76.2 years (SD 8.3)). The attitudes towards improving health behaviours and technology utilisation were explored. The content illustrations were developed for the interviews, and evaluated by participants using a numerical scale (1 very poor − 5 very good) and verbal feedback. Content analysis was used in the analysis of qualitative data. Taking care of one's own well-being comprehensively was the most important incentive to maintain one's activity. Content illustrations were evaluated as high (av…

Service (business)IncentiveMultimediaContent analysisScale (social sciences)Applied psychologyVerbal feedbackQualitative propertyContent developmentcomputer.software_genrePsychologycomputerDiversity (business)Proceedings of the 4th International Conference on Wireless Mobile Communication and Healthcare - "Transforming healthcare through innovations in mobile and wireless technologies"
researchProduct

Model-Driven Development Approach for Providing Smart Home Services

2009

Smart home is about the application of automation techniques for the comfort and security of residents' privately owned homes. In a smart home environment, different and independent embedded devices provide services that can be freely used by others, in the sense of service invocation. This paper presents our idea of using Model Driven Development (MDD) for the composition of existing services, by which we aim at demonstrating how new smart home services will be promoted.

Service (business)Model driven developmentbusiness.industryComputer scienceHome automationInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerAutomation
researchProduct

Media Delivery to Remote Renderers Controlled by the Mobile Phone

2009

In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.

Service (business)MultimediaComputer sciencebusiness.industryService delivery frameworkMobile computingService providercomputer.software_genreMobile phoneNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552The InternetSession (computer science)Best-effort deliverybusinesscomputerComputer network
researchProduct

American Options Based Service Pricing For Virtual Operators

2008

In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…

Service (business)Operations researchComputer scienceQuality of serviceService providerCongestion pricingOperating expenseComputer securitycomputer.software_genreFixed costEnhanced serviceVirtual networkcomputer
researchProduct