Search results for "computer.software_genre"

showing 10 items of 3858 documents

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Experimental BIM applications in Archaeology: a work-flow

2014

In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…

business.industryComputer scienceCloud computingcomputer.software_genreArchaeologyBIM Archaeology Semantic modelling Data export Web documentationField (computer science)Domain (software engineering)Cultural heritageBuilding information modelingRelational database management systemWork flowbusinesscomputerDatabase model
researchProduct

Integrating Social Skills in Task-Oriented 3D IVA

2005

This paper presents a set of mechanisms oriented to incorporate social information into the decision taking of task-oriented 3DIVA. The aim of this approach is to integrate collaborative skills in different character's roles (seller/buyer, worker, pedestrian, etc.) in order to enhance its behavioral animation. The collective intelligence expected in this kind of multi-character domains (e.g. storytelling, urban simulation, interactive games, etc.) requires agents able to dialogue/interact with other characters, to autonomously group/ungroup (according to their goals), or to distribute tasks and coordinate their execution for solving possible conflicts. The social model implemented follows t…

business.industryComputer scienceCollective intelligenceContext (language use)computer.software_genreTask (project management)Intelligent agentResource (project management)Social skillsHuman–computer interactionConflict resolutionNarrativeArtificial intelligencebusinessSet (psychology)computerComputer animationStorytelling
researchProduct

An inductive inference approach to classification

1994

Abstract In this paper we introduce a formal framework for investigating the relationship of inductive inference and the task of classification. We give the first results on the relationship between functions that can be identified in the limit and functions that can be acquired from unclassified objects only. Moreover, we present results on the complexity of classification functions and the preconditions necessary in order to allow the computation of such functions.

business.industryComputer scienceComputationInductive reasoningMachine learningcomputer.software_genreTheoretical Computer ScienceTask (project management)Order (biology)Artificial IntelligenceArtificial intelligenceLimit (mathematics)businesscomputerSoftwareJournal of Experimental & Theoretical Artificial Intelligence
researchProduct

Benchmarking non-photorealistic rendering of portraits

2017

We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringImage processing02 engineering and technologyBenchmarkingMachine learningcomputer.software_genreNon-photorealistic renderingImage (mathematics)Set (abstract data type)0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Key (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerAbstraction (linguistics)
researchProduct

Assessment of qualitative judgements for conditional events in expert systems

1991

business.industryComputer scienceConditional events; qualitative probabilities.; linear and nonlinear systems; numerical probabilities; coherenceConditional eventsqualitative probabilitiesExpert elicitationConditional probability distributioncomputer.software_genreMachine learningExpert systemcoherencenumerical probabilitieslinear and nonlinear systemsArtificial intelligencebusinesscomputer
researchProduct

Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures

2015

Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…

business.industryComputer scienceController (computing)Distributed computingFloodlight020206 networking & telecommunicationsCloud computing02 engineering and technologycomputer.software_genreNetwork traffic controlVirtual machineCloud testing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArchitecturebusinessSoftware-defined networkingcomputerComputer network2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

Design Space Exploration for a Custom VLIW Architecture: Direct Photo Printer Hardware Setting Using VEX Compiler

2008

Increasingly more computing power is demanded for contemporary applications such as multimedia, 3D visualization, and telecommunication. This paper presents a design space exploration (DSE) experience for an embedded VLIW processor that allows finding out the best architecture for given application. The proposed method has been implemented and tested using an image processing chain for direct photo printer. Our results show a considerable improvement in hardware cost and performance. After the best architecture is identified, we applied a technique to optimize the code in VEX system that uses ?inlining? function in order to reduce execution time.

business.industryComputer scienceDesign space explorationOptimizing compilerImage processingcomputer.software_genreSpace explorationVisualizationInstruction setComputer architectureVery long instruction wordEmbedded systemCompilerbusinesscomputerComputer hardware2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
researchProduct

Fallzahlplanung in referenzkontrollierten Diagnosestudien

2002

Purpose: A tutorial illustration of a flexible approach to determine the sample size in reference-controlled diagnostic trials. Materials and Methods: Assuming the usual setting of a new diagnostic method to be compared with a reference method, the emphasis is on the sensitivity of the new method in comparison with the reference method, using a binary outcome (positive versus negative) for both methods. Based on the confidence interval of the sensitivity, a simple but flexible procedure for determining the sample size is described, which incorporates clinically interpretable information. The procedure is illustrated by the fictious planning of a trial to assess the diagnostic value of MRI v…

business.industryComputer scienceDiagnostic TrialMachine learningcomputer.software_genreOutcome (probability)Confidence intervalClinical trialSample size determinationRange (statistics)A priori and a posterioriRadiology Nuclear Medicine and imagingSensitivity (control systems)Artificial intelligencebusinesscomputerRöFo - Fortschritte auf dem Gebiet der Röntgenstrahlen und der bildgebenden Verfahren
researchProduct