18,888 Hits in 2.9 sec

Using ACL2 To Teach Students About Software Testing

Ruben Gamboa, Alicia Thoney
2022 Electronic Proceedings in Theoretical Computer Science  
In this paper, we describe one of the major activities, in which students use the ACL2 Sedan's counter-example generation facility to investigate properties of various existing checksum algorithms used  ...  Students are challenged to state the relevant properties correctly, so that the counter-example generation tool is used effectively in all cases, and ACL2 can find formal proofs automatically in some of  ...  The type :digit-list is easy to define using the defdata framework, so the testing framework can generate random inputs.  ... 
doi:10.4204/eptcs.359.4 fatcat:oeovrmnhzfd3vfg7ilbb4zh6i4

Fuzzy Tsukamoto and ITIL for Improvement Strategy on Incident Ticket Services

Ticket Incident is a service provided to clients who work with Meraki Digital Indonesia.  ...  This improvement method is following the purpose of assessment in each area service operation by using questionnaires, then to correct this problem another approach is needed with Fuzzy Tsukamoto to measure  ...  Meraki Digital Indonesia, Centennial Tower 29 Floor. Jl. General Gatot Subroto No. 27, South Jakarta, Indonesia .  ... 
doi:10.35940/ijitee.j9063.0881019 fatcat:d2u433h4snf6jjzjoyothybujy

Perci: Pervasive Service Interaction with the Internet of Things

G. Broll, E. Rukzio, M. Paolucci, M. Wagner, A. Schmidt, H. Hussmann
2009 IEEE Internet Computing  
For this purpose, the Perci framework extends the Semantic Markup for Web Services (OWL-S) descriptions with its custom Service User Interface Annotation (SUIA) ontology.  ...  Dynamic Mobile Interfaces Service descriptions and extensions provide the basis for dynamically generating mobile interfaces in the Perci framework.  ... 
doi:10.1109/mic.2009.120 fatcat:lgx7fd56sfavzlrt3dv5gxcjwq

PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies [chapter]

Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis
2006 Lecture Notes in Computer Science  
This paper proposes a forensic investigation technique, which can be embedded in the framework of existing PETs , thereby adding network forensic functionality to the PET.  ...  However, an AU can generate several pairs of keys during times of low system load and request tickets from the DS (one ticket for each pair of key).  ...  The Server sends (Step 11) the ticket (generated and signed by the DS) to the FIE including the secret key.  ... 
doi:10.1007/11909033_17 fatcat:sjtqkjoxjjamva2fttyrww7nsq


GV Pameela
The whole framework including software and tools will operate from cloud-based servers for increased stability and reliability.  ...  This is a fully cloud based system linked to QR code-based wallet linked ticket booking mechanism which is connected to a secured payment gateway.  ...  In this paper, a system is employed where the framework of technology is used to generate the ticket automatically and also detection technique is used to upgrade the seat vacancy.  ... 
doi:10.26782/jmcms.2020.07.00014 fatcat:av2rw5xarjdfzgf65ysdq52azy

Uniticket: A Third Party Universal E-Ticket System Based on Mobile Phone

Linli Hu, Yuhao Wang, Dong Li
2011 Wireless Engineering and Technology  
The General Framework and the Functions of Uniticket The purpose of designing Uniticket is to provide a security online service of inquiry, booking, payment and refund, a universal mobile ticketing platform  ...  Class Function Indent Manage Manage order number Digital Signature Generate digital signature Generate QR Code Generate 2-D barcode image MD5Util Generate MD5 code XML Manage Read data  ... 
doi:10.4236/wet.2011.23023 fatcat:akp7thkenjfuvajzlng77mncg4

A methodological framework for measuring the level of convenience of transport ticketing systems

Dušan Zalar, Rasa Ušpalytė-Vitkūnienė, Danijel Rebolj, Marjan Lep
2017 Transport  
results through the application of the developed framework on traditional smart ticketing and contactless payment card ticketing technologies.  ...  First, a methodological framework for modelling ticketing convenience based on end-to-end passenger experience is presented.  ...  The survey The purpose of the survey was to demonstrate the use of the framework.  ... 
doi:10.3846/16484142.2017.1300783 fatcat:wk2c4sjpizeyrkxjnanv5keabm


Subarna Shakya
2019 Journal of Artificial Intelligence and Capsule Networks  
In this paper, we provide a data security analysis and solution for privacy protection framework during data migration.  ...  A Secure Socket Layer (SSL) is established and migration tickets with minimum privilege is introduced. Further, data encryption is done using Prediction Based Encryption (PBE).  ...  The security framework time cost depends on establishment of SSL, Generating and transmitting encryption key, migration ticket and decryption of the keys.  ... 
doi:10.36548/jaicn.2019.1.006 fatcat:hww4ltkdznbvdgynxh6auu5vn4

Android Application for Ticket Booking and Ticket Checking in Suburban Railways

Subarnarekha Ghosal, Shalini Chaturvedi, Akshay Taywade, N. Jaisankar
2015 Indian Journal of Science and Technology  
Also the ticket checker is provided with an application to search for the user's ticket with the ticket number in the cloud database for checking purposes.  ...  Technological development has resulted in a boundary free digital world. This development has resulted in transaction through virtual money instead of real ones.  ...  Then generate ticket options have to be selected for generating a ticket. Then payment mode has to be selected.  ... 
doi:10.17485/ijst/2015/v8is2/60291 fatcat:tr6acyrjszgmtfzamvmg3jhwei

An Exploration of Designing for Playfulness in a Business Context

Sherif Mekky, Andrés Lucero
2016 Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '16  
The Playful Experiences (PLEX) framework is a categorization of 22 experiences that has been used to design for and evaluate aspects of playfulness.  ...  This paper investigates through three studies how to design for and evaluate playful user experiences in business at three stages of the design process: idea generation, conceptualization, and evaluation  ...  Study 3: Ticketing App Evaluation The main purpose of this third study was to evaluate the playful experiences elicited by the app.  ... 
doi:10.1145/2851581.2892332 dblp:conf/chi/MekkyL16 fatcat:rni7wi5dqnh4lmxsha32tib7ba

A Trust Distributed DRM System Using Smart Cards

Ming-Kung SUN, Michael CHANG, Hsiao-Ching LIN, Chi-Sung LAIH, Hui-Tang LIN
2012 IEICE transactions on information and systems  
Digital Rights Management (DRM) ensures that the usage of digital media adheres to the intentions of the copyright holder and prevents the unauthorized modification or distribution of media.  ...  Due to the widespread adoption of digital content use, DRM has received a fair amount of attention and has seen implementation in many commercial models.  ...  The purpose of the ticket card is to hold value to exchange for the usage rules granted in the form of a RO.  ... 
doi:10.1587/transinf.e95.d.2991 fatcat:wpsibskixbft3pqdjywvo3vf7i

A measurement framework for assessing the digital transformation of cultural institutions: the Italian case

Deborah Agostino, Chiara Costantini
2021 Meditari Accountancy Research  
The purpose of this paper is to develop a framework to assess an organisation's level of digital transformation as a whole, taking the field of museums as an exemplary case of application.  ...  Purpose Public and private sector organisations are widely endorsing digital transformation processes, but little is known about the level of digitalisation of an organisation as a whole.  ...  This study approaches this issue of accounting for digital transformation, with the purpose of developing a measurement framework to assess the digital readiness of an organisation as a whole.  ... 
doi:10.1108/medar-02-2021-1207 fatcat:mlrghjei5bczxpdgbtrocfumgi

Secure Cloud based Privacy Preserving DataMinning Platform

S Kumaraswamy, Manjula S H, K R Venugopal
2017 Indonesian Journal of Electrical Engineering and Computer Science  
These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation  ...  It prevents the access ticket in generating of specifier ticket. The access ticket cannot be used by any TC for any purposes, if the TP execute access ticket revocation from Revocator.  ...  Digital signatures consist of following setup such as Key Generation process which produces secret/master key and public key, Signing process which generates a signature by using secret/master key for  ... 
doi:10.11591/ijeecs.v7.i3.pp830-838 fatcat:c5zerwrg7zdjzizu4typpneixu

Framework Development of Serious Game-Based Instrument for Malay Language Early Literacy Assessment

Rohani Aziz, Helmi Norman, Norazah Nordin, Fatin Nabilah Wahid, Ruslina Ibrahim
2019 Creative Education  
For that purposed, 17 experts from different fields of studies were involved in the FGD session. The findings were analyzed using descriptive analysis.  ...  Therefore, the aim of this study is to establish the framework development of a Serious Game-Based Instrument for early literacy student assessment.  ...  Three generations of digital assessments as previously stated by (Bennett, Gard-ner, Cartledge, Ramnath, & Council, 2017) ; The first generation uses designs based on paper-pencil assessments; The next  ... 
doi:10.4236/ce.2019.1012247 fatcat:vji4tgla5ffc5hn2tmqyrg5axi

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents
디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구

Yong Kim, Eun-Jeong Kim
2009 Journal of the Korean Society for information Management  
For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card  ...  With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records  ...  proposed a general framework of e-tickets in late 1990s. A number of different e-ticket methods have since been published in the literature.  ... 
doi:10.3743/kosim.2009.26.2.027 fatcat:u3dbzijsa5ad3dq66z3cyntona
« Previous Showing results 1 — 15 out of 18,888 results