225 research outputs found
Experimental Design in Game Testing
The gaming industry has been on constant rise over the last few years. Companies invest huge amounts of money for the release of their games. A part of this money is invested in testing the games. Current game testing methods include manual execution of pre-written test cases in the game. Each test case may or may not result in a bug. In a game, a bug is said to occur when the game does not behave according to its intended design. The process of writing the test cases to test games requires standardization. We believe that this standardization can be achieved by implementing experimental design to video game testing. In this thesis, we discuss the implementation of combinatorial testing to test games. Combinatorial testing is a method of experimental design that is used to generate test cases and is primarily used for commercial software testing. In addition to the discussion of the implementation of combinatorial testing techniques in video game testing, we present a method for finding combinations resulting in video game bugs
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which offer limited selection of security and privacy preferences. This lack of awareness and loss of control over data sharing increases threats to a client's data and diminishes trust in these systems. We propose EPICS, an efficient and effective solution for enforcing security policies in composite Web services that protects data privacy throughout the service interaction lifecycle. The solution ensures that the data are distributed along with the client policies that dictate data access and an execution monitor that controls data disclosure. It empowers data owners with control of data disclosure decisions during interactions with remote services and reduces the risk of unauthorized access. The paper presents the design, implementation, and evaluation of the EPICS framework
Fluorescence enhancement via lossless all-dielectric spherical mesocavities
Metal nanoparticles have traditionally been used to enhance optical signals,
including fluorescence from a dye proximal to the particle. Here, we sought to
examine whether appreciable enhancement was possible using relatively simple
all-dielectric particles. Using rapid numerical simulations, we deduce that
lossless all-dielectric spherical particles with mesoscale sizes, between
nanoscale (~nm) and microscale ( m), are
surprisingly suitable for fluorescence enhancement demonstrating up to enhancement factors. We discuss both the enhancement possible as well as
limiting losses, which are distinct from those observed in metal particles. For
a given sphere of a specific refractive index size matters: much larger
fluorescence enhancement can be achieved with meso-sized particles than with
particles of smaller size. The enhancement originates from multipolar () resonances which induce much stronger electric
field enhancement within spheres. The order, , of these resonances is
larger than conventionally utilized dipolar or quadrupolar Mie resonances in
nanoparticles and smaller than of typical whispering gallery modes () in microparticles. With the absence of non-radiative Ohmic losses
inherent to plasmonic particles, can increase, decrease or even stay the
same with increasing intrinsic quantum yield , for suppressed, enhanced or
intact radiative decay rates of fluorophore. This work serves to draw attention
to the use of dielectric particles for engineering strong fluorescence
enhancement, pointing to possible applications of these materials in imaging,
molecular sensing, light coupling, and quantum information processing.Comment: 17 pages, 5 figure
An Uncommon Case of Solitary Peripheral Osteoma in the Mandible
Osteoma is a benign osteogenic lesion which is composed of well differentiated mature compact and/or cancellous bone that proliferates continuously. Its prevalence is 4%. Its pathogenesis is still controversial. Solitary peripheral osteoma of craniofacial region is a rare finding. We report a case of 30-year-old female having solitary peripheral osteoma present on the lingual cortex of the left posterior mandible which was initially asymptomatic but now is causing discomfort while chewing and not associated with Gardner’s syndrome. We also laid emphasis on its clinical, differential diagnosis, radiological, surgical, and histopathological features. The aim of this paper is to present an uncommon case of solitary peripheral osteoma in the mandible along with analysis of literature for peripheral osteomas of jaws and to contribute to the knowledge concerning the pathogenesis, differential diagnosis, and management of these lesions
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences. This lack of awareness and loss of control over data sharing increases threats to a client\u27s data and diminishes trust in these systems
- …