Search results for "test"

showing 10 items of 19001 documents

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

How older and younger people see technology in Northern and Southern Europe : Closing the generation gap

2016

Background Mental representations of technology can be affected by many social and biological factors. The aim of this study was to test the effects of two of these factors, age and culture, on how people mentally represent and experience technologies by comparing the conceptions of old and young people in Spain and Finland. Both Spain and Finland are European countries, but they are historically, geographically, and culturally very different. Method The study is framed within the life-based design (LBD) paradigm, where culture and age interact to define particular forms of life in which technology might be used and perceived differently. We hypothesised that there are differences in the me…

ta113Generation gapculture and technologytechnology generationsmedia_common.quotation_subjectClosing (real estate)Biomedical EngineeringUser perceptionGender studiesta3142Younger peopleTest (assessment)culturekulttuuriuser perceptionMental representationGeriatrics and GerontologyPsychologyGerontologymedia_commonGerontechnology
researchProduct

Revisiting rainfall to explore exam questions and performance on CS1

2015

The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…

ta113Guard (information security)novice programmersUnit testingCommon errorRainfall problemDivision by zeroCode (semiotics)Test (assessment)PedagogyComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationta516CS1PsychologyKnowledge transferProceedings of the 15th Koli Calling Conference on Computing Education Research
researchProduct

Design time, run time, and artificial intelligence techniques for mobility of user interface

2011

Abstract Advancement in technology provides opportunities to user as well as challenges for application development organization. User interfaces which were design for specific device tend to be developed for various devices. Users are busy people, when they move among different context would like to move application with them. The current trend of users demanding mobile graphic user interface to support their daily life and work has led to a new generation of techniques. Design time technique provides better usability as compare to run time technique. On the other hand artificial intelligence technique like agent provides better flexibility and usability as compare to others. In this paper…

ta113Mobile agentMultimediaDesign time techniquebusiness.industryComputer scienceNatural user interfaceUsabilityGraphical user interface testingcomputer.software_genreUser interface designRun time techniqueUser experience designInterface metaphorHuman–computer interactionHeuristic evaluationGeneral Earth and Planetary Sciences10-foot user interfaceArtificial intelligenceUser interfacebusinesscomputerGeneral Environmental ScienceGraphical user interfaceProcedia Computer Science
researchProduct

Exploiting ongoing EEG with multilinear partial least squares during free-listening to music

2016

During real-world experiences, determining the stimulus-relevant brain activity is excitingly attractive and is very challenging, particularly in electroencephalography. Here, spectrograms of ongoing electroencephalogram (EEG) of one participant constructed a third-order tensor with three factors of time, frequency and space; and the stimulus data consisting of acoustical features derived from the naturalistic and continuous music formulated a matrix with two factors of time and the number of features. Thus, the multilinear partial least squares (PLS) conforming to the canonical polyadic (CP) model was performed on the tensor and the matrix for decomposing the ongoing EEG. Consequently, we …

ta113Multilinear mapmedicine.diagnostic_testBrain activity and meditationSpeech recognition02 engineering and technologyElectroencephalographyta3112Matrix decomposition03 medical and health sciences0302 clinical medicinetensor decompositionFrequency domainPartial least squares regression0202 electrical engineering electronic engineering information engineeringmedicineSpectrogramOngoing EEG020201 artificial intelligence & image processingmusicTime domain030217 neurology & neurosurgerymultilinear partial least squaresMathematics
researchProduct

Cluster-Based RF Fingerprint Positioning Using LTE and WLAN Outdoor Signals

2015

In this paper we evaluate user-equipment (UE) positioning performance of three cluster-based RF fingerprinting methods using LTE and WLAN signals. Real-life LTE and WLAN data were collected for the evaluation purpose using consumer cellular-mobile handset utilizing ‘Nemo Handy’ drive test software tool. Test results of cluster-based methods were compared to the conventional grid-based RF fingerprinting. The cluster-based methods do not require grid-cell layout and training signature formation as compared to the gridbased method. They utilize LTE cell-ID searching technique to reduce the search space for clustering operation. Thus UE position estimation is done in short time with less comput…

ta113PercentileK-nearest neighborComputer sciencebusiness.industrycell-IDFingerprint (computing)Real-time computingFingerprint recognitionGridHandsetlaw.inventionminimization of drive testsEuclidean distanceLTElawEmbedded systemgrid-based RF fingerprintingRadio frequencyCluster analysisbusinessfuzzy C-meanshierarchical clustering
researchProduct

H.264 QoS and Application Performance with Different Streaming Protocols

2015

Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed

ta113Protocol (science)HLSbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceReal-time computingstreaming protocolsQoSFrame rateRTSPTest sequenceUser experience designRTMPReal Time Streaming ProtocolQoEH.264businesscomputerComputer networkProceedings of the 8th International Conference on Mobile Multimedia Communications
researchProduct

An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems

2012

Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …

ta113Requirements managementTest strategyKnowledge managementProcess managementService product managementOffshoringTest managementComputer sciencebusiness.industrySystem testingSoftware performance testingService providerSoftware qualityOutsourcingSoftwareAcceptance testingPerformance engineeringManagement systemInformation systemNon-functional testingOperational acceptance testingbusinessSystem integration testing2012 45th Hawaii International Conference on System Sciences
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

CSI with games and an emphasis on TDD and unit testing

2012

ta113Unit testingGeneral Computer ScienceGame programmingbusiness.industryComputer scienceEmphasis (telecommunications)ta516TelecommunicationsbusinessIndustrial engineeringEducationACM Inroads
researchProduct