Search
Now showing items 571-580 of 2142
Developing cloud business models: A case study on cloud gaming
(IEEE Computer Society, 2011)
Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, ...
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
(Academic Conferences International, 2023)
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. ...
Developing E-Authentication for E-Assessment : Diversity of Students Testing the System in Higher Education
(Sciendo, 2020)
Sähköinen tunnistautuminen on yksi keskeisistä teemoista verkko-opetuksessa, -opiskelussa ja - arvioinnissa. Tämän tutkimuksen tarkoituksena oli tutkia opiskeluunsa erityistä tukea tarvitsevien yliopisto-opiskelijoiden ...
Developing Organization-Specific Information Security Policies by using Critical Thinking
(Association for Information Systems, 2018)
Developing Solutions For Healthcare : Deploying Artificial Intelligence to an Evolving Target
(IEEE Computer Society, 2017)
—The pace of deploying artificial intelligence (AI)
techniques to healthcare has been speeding up. Many of the
initiatives have been technology driven aiming at finding problems
matching the new technology while systematic, ...
Development of a Native Cross-Platform iRODS GUI Client
(iRODS Consortium, 2015)
This paper describes activities on the research IT infrastructure development project at the University of Jyväskylä.
The main contribution is a cross-platform iRODS client application with a rich graphical user interface. ...
Development of an Agile Requirements Risk Prioritization Method : A Design Science Research Study
(Association for Information Systems, 2023)
The practice of information systems development (ISD) has changed during the past two decades from very structured approaches to agile ISD methods. However, many methods available for managing requirements-related risks ...
Device-to-device communication for LTE-advanced network system
(University of Jyväskylä, 2014)
Device-to-device (D2D) communication has been proposed as a mean for local connections in future ellular networks in order to provide improved throughput, spectrum savings, and longer battery lives. Here we widen the ...
Differential Privacy : An Umbrella Review
(Springer, 2023)
Privacy-preserving analysis of data refers to possibilities of using personal information from individuals in a completely anonymous fashion. In a statistical sense, this means that statistics and models derived and learned ...
Differentiating Malignant from Benign for Melanocytic and Non-melanocytic Skin Tumors : A Pilot Study on Hyperspectral Imaging and Convolutional Neural Networks
(Society for Publication of Acta Dermato-Venereologica, 2022)