Search results for "test"
showing 10 items of 19001 documents
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…
How older and younger people see technology in Northern and Southern Europe : Closing the generation gap
2016
Background Mental representations of technology can be affected by many social and biological factors. The aim of this study was to test the effects of two of these factors, age and culture, on how people mentally represent and experience technologies by comparing the conceptions of old and young people in Spain and Finland. Both Spain and Finland are European countries, but they are historically, geographically, and culturally very different. Method The study is framed within the life-based design (LBD) paradigm, where culture and age interact to define particular forms of life in which technology might be used and perceived differently. We hypothesised that there are differences in the me…
Revisiting rainfall to explore exam questions and performance on CS1
2015
The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…
Design time, run time, and artificial intelligence techniques for mobility of user interface
2011
Abstract Advancement in technology provides opportunities to user as well as challenges for application development organization. User interfaces which were design for specific device tend to be developed for various devices. Users are busy people, when they move among different context would like to move application with them. The current trend of users demanding mobile graphic user interface to support their daily life and work has led to a new generation of techniques. Design time technique provides better usability as compare to run time technique. On the other hand artificial intelligence technique like agent provides better flexibility and usability as compare to others. In this paper…
Exploiting ongoing EEG with multilinear partial least squares during free-listening to music
2016
During real-world experiences, determining the stimulus-relevant brain activity is excitingly attractive and is very challenging, particularly in electroencephalography. Here, spectrograms of ongoing electroencephalogram (EEG) of one participant constructed a third-order tensor with three factors of time, frequency and space; and the stimulus data consisting of acoustical features derived from the naturalistic and continuous music formulated a matrix with two factors of time and the number of features. Thus, the multilinear partial least squares (PLS) conforming to the canonical polyadic (CP) model was performed on the tensor and the matrix for decomposing the ongoing EEG. Consequently, we …
Cluster-Based RF Fingerprint Positioning Using LTE and WLAN Outdoor Signals
2015
In this paper we evaluate user-equipment (UE) positioning performance of three cluster-based RF fingerprinting methods using LTE and WLAN signals. Real-life LTE and WLAN data were collected for the evaluation purpose using consumer cellular-mobile handset utilizing ‘Nemo Handy’ drive test software tool. Test results of cluster-based methods were compared to the conventional grid-based RF fingerprinting. The cluster-based methods do not require grid-cell layout and training signature formation as compared to the gridbased method. They utilize LTE cell-ID searching technique to reduce the search space for clustering operation. Thus UE position estimation is done in short time with less comput…
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems
2012
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …
An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths
2015
In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…