Search results for "computer.software_genre"

showing 10 items of 3858 documents

Evaluating the Authenticity of Virtual Environments: Comparison of Three Devices

2016

Immersive virtual environments (VEs) have the potential to provide novel cost effective ways for evaluating not only new environments and usability scenarios, but also potential user experiences. To achieve this, VEs must be adequately realistic. The level of perceived authenticity can be ascertained by measuring the levels of immersion people experience in their VE interactions. In this paper the degree of authenticity is measured via anauthenticity indexin relation to three different immersive virtual environment devices. These devices include (1) a headband, (2) 3D glasses, and (3) a head-mounted display (HMD). A quick scale for measuring immersion, feeling of control, and simulator sick…

immersionArticle SubjectComputer sciencemedia_common.quotation_subject02 engineering and technologycomputer.software_genreQuality of resultshuman-technology interactionlcsh:QA75.5-76.95authenticityHuman–computer interactionuser experience0202 electrical engineering electronic engineering information engineeringImmersion (virtual reality)0501 psychology and cognitive sciencesautenttisuus050107 human factorsmedia_commonta113Multimediabusiness.industry05 social sciences020207 software engineeringUsabilityHuman-Computer InteractionFeelingvirtual environmentsSimulator sicknesslcsh:Electronic computers. Computer sciencekäyttäjäkokemusbusinessImmersive virtual environmentcomputerAdvances in Human-Computer Interaction
researchProduct

Assisting immersive virtual reality development with user experience design approach

2017

In our study we explored how to design a biography of a late Finnish artist as a VR experience. We conducted a development process assisted by user experience (UX) design methods, which increased the process efficiency, and resulted in a research prototype. Through previous research and our development process, we identified components affecting the user experience. These components are: Immersion, Presence, Disorientation, Sense of Control, Pleasantness, Exploration and Simulator Sickness. From our user study with 13 participants, we were able to draw implications that relate to these components. While the set of components could be incomplete or subject to change, shows that further resea…

immersionEngineering02 engineering and technologyVirtual realitycomputer.software_genreUser experience designHuman–computer interaction0202 electrical engineering electronic engineering information engineeringImmersion (virtual reality)0501 psychology and cognitive sciencesta518Design methods050107 human factorsta113Multimediabusiness.industryomnidirectional videoUser journey05 social sciencesuser experience design020207 software engineeringinteractive omnidirectional videoUser interface designSimulator sicknessProcess efficiencyvirtual realitybusinesscomputerProceedings of the 21st International Academic Mindtrek Conference
researchProduct

Immersion revisited:A review of existing definitions of immersion and their relation to different theories of presence

2016

The term immersion continues to be applied inconsistently within and across different fields of research connected with the study of virtual reality and interactive media. Moreover, immersion is oftentimes used interchangeably with the terms presence and engagement. This article details a review of existing definitions of immersion originating within the study of video games, virtual environments, and literary works of fiction. Based on this review, a three-dimensional taxonomy of the various conceptualizations of immersion is proposed. That is, the existing definitions of immersion may be broadly divided into three categories, each representing a dimension of the taxonomy: immersion as a p…

immersionSocial Psychologylcsh:T58.5-58.64Computer sciencelcsh:Information technologyCommunication05 social sciencesComputingMilieux_PERSONALCOMPUTINGvideo gamesVirtual realitycomputer.software_genre050105 experimental psychologyHuman-Computer Interaction03 medical and health sciences0302 clinical medicineVirtual machinevirtual environmentsComputer graphics (images)Immersion (virtual reality)virtual reality0501 psychology and cognitive sciencespresencecomputer030217 neurology & neurosurgery
researchProduct

A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki

2018

Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…

information securityInterface (Java)Computer scienceBusiness processmedia_common.quotation_subjectriskienhallinta02 engineering and technologyComputer securitycomputer.software_genretietämyksenhallintaBusiness continuitydesign science research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringtietoturvakyberturvallisuusRisk managementmedia_commonbusiness.industryService design05 social sciencesInformation securityResilience (organizational)CountermeasurePsychological resiliencebusinesscomputer050203 business & management
researchProduct

Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…

2018

This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…

information systems architectureCorrectnessbusiness.industryComputer scienceProcess (engineering)Multi-agent systemIntelligent decision support systeminformation systemscomputer.software_genrerisk managementAutomationExpert systemSystems engineeringComputer Aided DesignDesign processcomputer networks ISAT 2017businesscomputer
researchProduct

The Role of Information in Art Museum Communication Process

2013

Abstract The way that nowadays world is constantly changing influences both individuals and organizations. They have to act in an innovative, fast environment, pursuing their goals. The amount of information increases and it becomes difficult to filtrate and transform it. This is a conceptual paper, which aims at analysing art museums in nowadays society from a communication perspective. It starts out by describing how the museum institution managed to adapt during time and the way it modified under the action of innovation. It describes the needs and functions that such an institution has in society and corroborates them with the information sending process, offering scenario in which an e…

information.Knowledge managementMultimediaProcess (engineering)business.industrycommunicationmedia_common.quotation_subjectPerspective (graphical)General Engineeringart museumEnergy Engineering and Power Technologycomputer.software_genreAction (philosophy)Institutionbusinesscomputermedia_commonProcedia Economics and Finance
researchProduct

Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

2019

Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…

integrity of a memory snapshotreliabilityvirtualisointiComputer scienceforensic soundnessHypervisormuistit (tietotekniikka)computer.software_genrevirtualizationatomicitymemory forensicsmemory acquisitionOperating systemMemory acquisitionlive forensicstietoturvacomputerProceedings of the 5th International Conference on Information Systems Security and Privacy
researchProduct

An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia

2020

The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…

interpolation.General Computer Scienceparallel filtersComputer scienceGPUGpuGraphics processing unitLatency (audio)Parametric model02 engineering and technologycomputer.software_genre030507 speech-language pathology & audiology03 medical and health sciencesSoftware portabilityHRTF modeling0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceMultimediaparametric modelGeneral EngineeringTeleconferenceBinaural synthesis020206 networking & telecommunicationsVideo processingEnergy consumptioninterpolationInterpolationHrtf modelingScalabilityParallel filtersElectrónicaAugmented realitylcsh:Electrical engineering. Electronics. Nuclear engineering0305 other medical sciencelcsh:TK1-9971Mobile devicecomputerIEEE Access
researchProduct

Development of Network Security Education

2021

Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…

järjestelmäarkkitehtuurioppimisympäristöComputer scienceNetwork securityDistance educationtietotekniikkacomputer.software_genreetäopetusComputingMilieux_COMPUTERSANDEDUCATIONnetwork securityverkko-opetusArchitecturetietoturvakyberturvallisuusMultimediabusiness.industryhallintajärjestelmätVirtualizationverkko-oppiminendistance educationManagement systemSystems architectureVirtual learning environmentThe Internetbusinesscomputerverkkohyökkäykset
researchProduct

Evaluating End-user Support : Validating the Use of Multiple Media in a CSCW Application

2006

Human-centred views on information systems are gaining more and more attention in IS community. The need to evaluate information systems from such a perspective is thus evident. In this paper, we exploit our earlier developed theoretical framework for evaluating end-user support in information systems, and demonstrate its usage in validating the use of multiple communication and collaboration media in a CSCW application. The evaluation is performed in terms of user perception in ISD process, users’ role in organizational information processing, and users’ behavioural nuances. Our study shows that a context specific theoretical framework is useful in validating the empirical results of syste…

järjestelmäsuunnitteluInstructional designEnd userComputer scienceInformation processingContext (language use)Application softwarecomputer.software_genreloppukäyttäjätkäyttäjälähtöisyysHuman–computer interactionComputer-supported cooperative workInformation systemcomputerosallistava suunnittelutukipalveluttietojärjestelmät
researchProduct