Suggested Topics within your search.
Showing 1 - 11 results of 11 for search '"User (computing)"', query time: 0.05s Refine Results
  1. 1

    Advanced Topics in end user computing by Mahmood,Mo Adam

    Published 2005
    View in OPAC
    Book
  2. 2

    Analisis Kepuasan Pengguna Aplikasi Sidawai Menggunakan End User Computing Statisfaction (EUCS) DAn Importance Performance Analysis (IPA) by Kiki Haerani, Khairul Imtihan, Wafiah Murniati

    Published 2024-08-01
    “…Dalam membuat instrument kuesioner tingkat kepuasan pengguna mengunakan model End-User Computing Statisfanction (EUCS). EUCS menggunakan 5 indikator penliaian, diantaranya Content, Format, Accurancy, Ease of use dan Timelines. …”
    Get full text
    Article
  3. 3

    Analysis of Factors Influencing Viu Application User Satisfaction using the End User Computing Satisfaction (EUCS) and DeLone & McLean by Dea Fitri Sabrina, Dwi Rosa Indah, Mgs Afriyan Firdaus, Naretha Kawadha Pasema Gumay

    Published 2024-11-01
    “…This research employs two methods, namely End User Computing Satisfaction (EUCS) and Delone & McLean, to ascertain the factors influencing user satisfaction with the Viu application. …”
    Get full text
    Article
  4. 4

    End User Computing Satisfaction : Model Analisis Kepuasan Pengguna Aplikasi Menggunakan Partial Least Square Structural Equation Modeling (Studi Kasus) by Aditia Angga Perdana, Meinarini Catur Utami, Qurrotul Aini

    Published 2021-11-01
    “…Metode riset ini menerapkan End-User Computing Satisfaction (EUCS) dengan cara kuantitatif dan diseminasi kuesioner mendapatkan informasi dari objek penelitian. …”
    Get full text
    Article
  5. 5

    TDMA-based user scheduling policies for federated learning by Meixia TAO, Dong WANG, Rui SUN, Naifu ZHANG

    Published 2021-06-01
    “…To improve the communication efficiency in FL (federated learning), for the scenario with heterogeneous edge user's computing capacity and channel state, a class of time division multiple access (TDMA) based user scheduling policies were proposed for FL.The proposed policies aim to minimize the system delay in each round of model training subject to a given sample size constraint required for computing in each round.In addition, the convergence rate of the proposed scheduling algorithms was analyzed from a theoretical perspective to study the tradeoff between the convergence performance and the total system delay.The selection of the optimal batch size was further analyzed.Simulation results show that the convergence rate of the proposed algorithm is at least 30% higher than all the considered benchmarks.…”
    Get full text
    Article
  6. 6

    Development of Serious Games as A Programming Learning Platform for Informatics Students by Noven Indra Prasetya, Shofiya Syidada, Lestari Retnawati

    Published 2025-01-01
    “…The research instrument used is the end-user computing satisfaction (EUCS) questionnaire with a 5-point Likert scale to evaluate user satisfaction with the platform. …”
    Get full text
    Article
  7. 7

    Dynamic computing offloading strategy in LEO constellation edge computing network by GAO Yufang, JI Zhi, ZHAO Kanglian, LI Wenfeng, HU Peicong

    Published 2024-07-01
    “…To address this problem, a multi-user computing offloading strategy based on stochastic game was proposed under the system model of dynamic environment low earth orbit constellation edge computing network. …”
    Get full text
    Article
  8. 8

    Implementation of an information system for tuberculosis in healthcare facilities in Indonesia: evaluation of its effectiveness and challenges by Rita Dian Pratiwi, Bachti Alisjahbana, Yanri Wijayanti Subronto, Sigit Priyanta, Suharna Suharna

    Published 2025-01-01
    “…SITB utilization is comprehensively assessed using the End-User Computing Satisfaction (EUCS) method, which considers the dimensions of content, accuracy, timeliness, and ease of use. …”
    Get full text
    Article
  9. 9

    Anonymizing region construction scheme based on query range in location-based service privacy protection by Zhuo-xiong PEI, Xing-hua LI, Hai LIU, Kai-yue LEI, Jian-feng MA, Hui LI

    Published 2017-09-01
    “…Since k-anonymity method can reduce the users’ computation cost and provides the precise query results,it has been widely used to protect the user’s privacy in location-based service.However,the existing schemes did not consider the size of the querying region for location based service provider (LSP) during the construction of the anonymizing region,which led that the quality of service was low.To solve this problem,the user’s querying range was introduced to present a novel anonymizing region construction scheme.In the proposal,the anonymity server first generated the original anonymizing sub-regions according to the user’s privacy requirements,and then merged these sub-regions to construct the anonymity region submitted to LSP based on the size of corresponding querying regions.The security and experiment analysis show that the presented scheme not only protects the user’s privacy effectively,but also decreases LSP’s querying regions,thereby improving the quality of service.…”
    Get full text
    Article
  10. 10

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  11. 11

    Joint optimization algorithm for task offloading and resource allocation in low earth orbit satellites edge computing scenario by XIA Weiwei, HU Jing, SONG Tiecheng

    Published 2024-07-01
    “…Aiming at the offloading requirements of ground users’ computing tasks in edge computing scenario of low earth orbit (LEO) satellites, a joint offloading and resource allocation optimization (JORAO) algorithm was proposed. …”
    Get full text
    Article