225 research outputs found

    Experimental Design in Game Testing

    Get PDF
    The gaming industry has been on constant rise over the last few years. Companies invest huge amounts of money for the release of their games. A part of this money is invested in testing the games. Current game testing methods include manual execution of pre-written test cases in the game. Each test case may or may not result in a bug. In a game, a bug is said to occur when the game does not behave according to its intended design. The process of writing the test cases to test games requires standardization. We believe that this standardization can be achieved by implementing experimental design to video game testing. In this thesis, we discuss the implementation of combinatorial testing to test games. Combinatorial testing is a method of experimental design that is used to generate test cases and is primarily used for commercial software testing. In addition to the discussion of the implementation of combinatorial testing techniques in video game testing, we present a method for finding combinations resulting in video game bugs

    EPICS: A Framework for Enforcing Security Policies in Composite Web Services

    Get PDF
    With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which offer limited selection of security and privacy preferences. This lack of awareness and loss of control over data sharing increases threats to a client's data and diminishes trust in these systems. We propose EPICS, an efficient and effective solution for enforcing security policies in composite Web services that protects data privacy throughout the service interaction lifecycle. The solution ensures that the data are distributed along with the client policies that dictate data access and an execution monitor that controls data disclosure. It empowers data owners with control of data disclosure decisions during interactions with remote services and reduces the risk of unauthorized access. The paper presents the design, implementation, and evaluation of the EPICS framework

    Fluorescence enhancement via lossless all-dielectric spherical mesocavities

    Full text link
    Metal nanoparticles have traditionally been used to enhance optical signals, including fluorescence from a dye proximal to the particle. Here, we sought to examine whether appreciable enhancement was possible using relatively simple all-dielectric particles. Using rapid numerical simulations, we deduce that lossless all-dielectric spherical particles with mesoscale sizes, between nanoscale (≲100\lesssim 100~nm) and microscale (≳1\gtrsim 1 μ\mum), are surprisingly suitable for fluorescence enhancement demonstrating up to F∼104F\sim 10^4 enhancement factors. We discuss both the enhancement possible as well as limiting losses, which are distinct from those observed in metal particles. For a given sphere of a specific refractive index size matters: much larger fluorescence enhancement can be achieved with meso-sized particles than with particles of smaller size. The enhancement originates from multipolar (4≲ℓ≲104 \lesssim \ell \lesssim 10) resonances which induce much stronger electric field enhancement within spheres. The order, ℓ\ell, of these resonances is larger than conventionally utilized dipolar or quadrupolar Mie resonances in nanoparticles and smaller than of typical whispering gallery modes (ℓ≳20\ell \gtrsim 20) in microparticles. With the absence of non-radiative Ohmic losses inherent to plasmonic particles, FF can increase, decrease or even stay the same with increasing intrinsic quantum yield q0q_0, for suppressed, enhanced or intact radiative decay rates of fluorophore. This work serves to draw attention to the use of dielectric particles for engineering strong fluorescence enhancement, pointing to possible applications of these materials in imaging, molecular sensing, light coupling, and quantum information processing.Comment: 17 pages, 5 figure

    An Uncommon Case of Solitary Peripheral Osteoma in the Mandible

    Get PDF
    Osteoma is a benign osteogenic lesion which is composed of well differentiated mature compact and/or cancellous bone that proliferates continuously. Its prevalence is 4%. Its pathogenesis is still controversial. Solitary peripheral osteoma of craniofacial region is a rare finding. We report a case of 30-year-old female having solitary peripheral osteoma present on the lingual cortex of the left posterior mandible which was initially asymptomatic but now is causing discomfort while chewing and not associated with Gardner’s syndrome. We also laid emphasis on its clinical, differential diagnosis, radiological, surgical, and histopathological features. The aim of this paper is to present an uncommon case of solitary peripheral osteoma in the mandible along with analysis of literature for peripheral osteomas of jaws and to contribute to the knowledge concerning the pathogenesis, differential diagnosis, and management of these lesions

    EPICS: A Framework for Enforcing Security Policies in Composite Web Services

    Get PDF
    With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences. This lack of awareness and loss of control over data sharing increases threats to a client\u27s data and diminishes trust in these systems
    • …
    corecore