lnu.sePublications
Change search
Refine search result
1234567 1 - 50 of 859
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Abbas, Nadeem
    Umeå universitet.
    Properites of "Good" Java Examples2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Example programs are well known as an important tool to learn computer programming. Realizing the signicance of example programs, this study has been conducted with a goalto measure and evaluate the quality of examples used in academia. We make a distinctionbetween good and bad examples, as badly designed examples may prove harmful for novice learners. In general, students differ from expert programmers in their approach to read and comprehend a program. How do students understand example programs is explored in the light of classical theories and models of program comprehension. Key factors that impact program quality and comprehension are identified. To evaluate as well as improve the quality of examples, a set of quality attributes is proposed. Relationship between program complexity and quality is examined. We rate readability as a prime quality attribute and hypothesize that example programs with low readability are difficult to understand. Software Reading Ease Score (SRES), a program readability metric proposed by Börstler et al. is implemented to provide a readability measurement tool. SRES is based on lexical tokens and is easy to compute using static code analysis techniques. To validate SRES metric, results are statistically analyzed in correlation to earlier existing well acknowledged software metrics.

  • 2.
    Abbas, Nadeem
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Towards autonomic software product lines2011In: SPLC '11 Proceedings of the 15th International Software Product Line Conference, Volume 2, ACM Press, 2011, 44:1-44:8 p.Conference paper (Refereed)
    Abstract [en]

    We envision an Autonomic Software Product Line (ASPL). The ASPL is a dynamic software product line that supports self adaptable products. We plan to use reflective architecture to model and develop ASPL. To evaluate the approach, we have implemented three autonomic product lines which show promising results. The ASPL approach is at initial stages, and require additional work. We plan to exploit online learning to realize more dynamic software product lines to cope with the problem of product line evolution. We propose on-line knowledge sharing among products in a product line to achieve continuous improvement of quality in product line products.

  • 3.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Harnessing Variability in Product-lines of Self-adaptive Software Systems2015In: Proceedings of the 19th International Conference on Software Product Line: SPLC '15, ACM Press, 2015, 191-200 p.Conference paper (Refereed)
    Abstract [en]

    This work studies systematic reuse in the context of self-adaptive software systems. In our work, we realized that managing variability for such platforms is different compared to traditional platforms, primarily due to the run-time variability and system uncertainties. Motivated by the fact that recent trends show that self-adaptation will be used more often in future system generation and that software reuse state-of-practice or research do not provide sufficient support, we have investigated the problems and possibly resolutions in this context. We have analyzed variability for these systems, using a systematic reuse prism, and identified a research gap in variability management. The analysis divides variability handling into four activities: (1) identify variability, (2) constrain variability, (3) implement variability, and (4) manage variability. Based on the findings we envision a reuse framework for the specific domain and present an example framework that addresses some of the identified challenges. We argue that it provides basic support for engineering self-adaptive software systems with systematic reuse. We discuss some important avenues of research for achieving the vision.

  • 4.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Andersson, Jesper
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Löwe, Welf
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Autonomic Software Product Lines (ASPL)2010In: ECSA '10 Proceedings of the Fourth European Conference on Software Architecture: Companion Volume / [ed] Carlos E. Cuesta, ACM Press, 2010, 324-331 p.Conference paper (Refereed)
    Abstract [en]

    We describe ongoing work on a variability mechanism for Autonomic Software Product Lines (ASPL). The autonomic software product lines have self-management characteristics that make product line instances more resilient to context changes and some aspects of product line evolution. Instances sense the context, selects and bind the best component variants to variation-points at run-time. The variability mechanism we describe is composed of a profile guided dispatch based on off-line and on-line training processes. Together they form a simple, yet powerful variability mechanism that continuously learns, which variants to bind given the current context and system goals.

  • 5.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Andersson, Jesper
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Weyns, Danny
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Knowledge evolution in autonomic software product lines2011In: SPLC '11 Proceedings of the 15th International Software Product Line Conference, Volume 2, New York, NY, USA: ACM Press, 2011, 36:1-36:8 p.Conference paper (Refereed)
    Abstract [en]

    We describe ongoing work in knowledge evolution management for autonomic software product lines. We explore how an autonomic product line may benefit from new knowledge originating from different source activities and artifacts at run time. The motivation for sharing run-time knowledge is that products may self-optimize at run time and thus improve quality faster compared to traditional software product line evolution. We propose two mechanisms that support knowledge evolution in product lines: online learning and knowledge sharing. We describe two basic scenarios for runtime knowledge evolution that involves these mechanisms. We evaluate online learning and knowledge sharing in a small product line setting that shows promising results.

  • 6.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Andersson, Jesper
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Weyns, Danny
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Modeling Variability in Product Lines Using Domain Quality Attribute Scenarios2012In: Proceedings of the WICSA/ECSA 2012 Companion Volume, ACM Press, 2012, 135-142 p.Conference paper (Refereed)
    Abstract [en]

    The concept of variability is fundamental in software product lines and a successful implementation of a product line largely depends on how well domain requirements and their variability are specified, managed, and realized. While developing an educational software product line, we identified a lack of support to specify variability in quality concerns. To address this problem we propose an approach to model variability in quality concerns, which is an extension of quality attribute scenarios. In particular, we propose domain quality attribute scenarios, which extend standard quality attribute scenarios with additional information to support specification of variability and deriving product specific scenarios. We demonstrate the approach with scenarios for robustness and upgradability requirements in the educational software product line.

  • 7.
    Abdullahi, Abdille
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Component-based Software development2008Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Component-based Software development is a promising way to improve quality, time to market and handle the increasing complexity of software management. However, The component-based development is still a process with many problems, it is not well de_ned either from theoretical or practical point of view. This thesis gives a brief overview of Component-Based Software development and starts with brief historical evolution followed by a general explanation of the method. A detailed discussion of the underlying principles like components, component framework and compent system architecture are then presented. Some real world component stadards such as .net framework, CORBA CCM and EJB are given in detail. Finally, simple fille-sharing-program based on Apache's Avalon framework and another one based on .net framework are developed as a case study.

  • 8.
    Abrahamsson, Claes
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Videokompression och användarnytta2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Digital video är ett område som expanderat kraftigt senaste åren. På grund av avancerade videokompressionsmetoder kan numera en hel långfilm rymmas på mobiltelefonen eller den handhållna videospelaren. Men hur fungerar videokompression och hur hårt kan man komprimera en viss filmsekvens med bibehållen användarnytta? I denna uppsats görs en genomgång för grunderna inom videokompression. Dess förhållande till användarnyttan undersöks genom ett experiment. I detta experiment testas tre videosekvenser komprimerade med tre olika kodekar i tre olika datahastigheter för tre olika experimentgrupper. Slutsatsen av

    denna studie är att det är svårt att hitta en exakt brytpunkt där användaren finner videokvaliteten oacceptabel. Dock kan det konstateras att den högsta datahastigheten(256 kbit/s) genererar hög användarnytta medan den lägsta datahastigheten genererar låg användarnytta. Mellanhastigheten 128 kbit/s får knappt godkänt av testpersonerna.

  • 9.
    Abrahamsson, Jimmy
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Nätverksoptimering: Bästa möjliga tillgänglighet till lägsta möjliga länkkostnad2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Denna uppsats behandlar nätverksoptimering, med fokus på att få fram den bästa möjliga tillgängligheten till lägsta möjliga kostnad, i form av länkar. I studien tas en teoretiskt grundad hypotes om en metod fram för att lösa detta problemet. Samt genomförs ett test där metoden appliceras på ett studieobjekt för att bekräfta huruvida metoden verkar fungerar eller inte.

    Resultatet blir slutligen en metod som genom att analysera tillgängligheten, länk redundansen samt beräkna antal oberoende vägar mellan noder i ett nätverk. Kan genom att jämföra resultat från före en förändring med resultat från efter en förändring lyfta fram de förändringar som medför förbättringar. Varpå ett nätverk kan optimeras till bästa möjliga tillgänglighet till lägsta möjliga kostnad, i form av länkar.

  • 10.
    Adegoke, Adekunle
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Osimosu, Emmanuel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Service Availability in Cloud Computing: Threats and Best Practices2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model. This allows organizations to focus on core business goals instead of managing in-house IT infrastructure.                    

    However, as more business critical applications and data are moved to the cloud, service availability is becoming a growing concern. A number of recent cloud service disruptions have questioned the reliability of cloud environments to host business critical applications and data. The impact of these disruptions varies, but, in most cases, there are financial losses and damaged reputation among consumers.        

    This thesis aims to investigate the threats to service availability in cloud computing and to provide some best practices to mitigate some of these threats. As a result, we identified eight categories of threats. They include, in no particular order: power outage, hardware failure, cyber-attack, configuration error, software bug, human error, administrative or legal dispute and network dependency. A number of systematic mitigation techniques to ensure constant availability of service by cloud providers were identified. In addition, practices that can be applied by cloud customers and users of cloud services, to improve service availability were presented.

  • 11.
    Aghaee, Saeed
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Random Stream Cipher2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea comes from One-Time-Pad cipher using XOR operator on the plain text and the key to generate the cipher. The present work brings a new idea in symmetric encryption method, which inherits stream key generation idea from synchronous stream cipher and uses division instead of xoring. The Usage of division to combine the plain text with stream key gives numerous abilities to this method that the most important one is using random factors to produce the ciphers.

  • 12.
    Ahlgren, Hannes
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Graph visualization with OpenGL2005Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Vizz3D is a 3D graphics code analysis tool, developed at Växjö University that optionally can use Java3D or OpenGL. However, initially Java3D was the only programming interface used. No other version was considered. Therefore the applications structure was built with the Java3D way of thought in mind. But code visualization with 3D graphics can be a demanding task for the computers processor and its graphics hardware and Java3D is known to be somewhat inefficient. So an OpenGL version was introduced.

    This thesis reflects on the work restructuring the application’s code to fit both versions within Vizz3D in a structured and object-oriented way. The thesis shows the efforts to be taken to make an existing ever evolving tool easily extendible to other API’s. Additional aspects of OpenGL specific implementations are discussed throughout the thesis.

  • 13. Ahlgren, Per
    et al.
    Grönqvist, Leif
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Evaluation of retrieval effectiveness with incomplete relevance data: theoretical and experimental comparison of three measures2007In: International Journal of Information Processing & Management, Vol. In press, 14- p.Article in journal (Refereed)
    Abstract [en]

    The main reason for this work is to find an appropriate way to include multi-word units in a latent semantic vector model. This would be of great use since these models normally are defined in terms of words, which makes it impossible to search for many types of multi-word units when the model is used in information retrieval tasks. The paper presents a Swedish evaluation set based on synonym tests and an evaluation of vector models trained with different corpora and parameter settings, including a rather naive way to add bi- and trigrams to the models. The best results in the evaluation is actually obtained with both bi- and trigrams added. Our hope is that the results in a forthcoming evaluation in the document retrieval context, which is an important application for these models, still will be at least as good with the bi- and trigrams are added, as without.

  • 14. Ahlgren, Per
    et al.
    Grönqvist, Leif
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Measuring retrieval effectiveness with incomplete relevance data2006In: Current Research in Information Sciences and Technologies: Multidisciplinary approaches to global information systems (InSciT2006 proceedings), Open Institute of Knowledge , 2006, 74-78 p.Conference paper (Refereed)
  • 15. Ahlgren, Per
    et al.
    Grönqvist, Leif
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Retrieval evaluation with incomplete relevance data: A comparative study of three measures (poster abstract)2006In: Proceedings of the 15th ACM International Conference on Information and Knowledge Management (CIKM), ACM Press, New York, NY, USA , 2006, 872-873 p.Conference paper (Refereed)
  • 16.
    Ahlin, Daniel
    et al.
    Växjö University.
    Jartelius, Martin
    Växjö University.
    Tingdahl, Johanna
    Växjö University.
    Proxyserver för passiv informationssökning2005Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In today’s society the average person is flooded by information from everywhere. This is in particular the case when using the Internet; consider for a moment the fact that a decent search engine at this moment scans 8 058 million homepages. For a user that repeatedly comes back to the same site, the case is often that they know what they are looking for. The problem is to isolate the important information from all the other information embedding it.

    We would like to state that we have found one possible solution to this problem, where the user himself can define what information he is looking for at a specific server, then scan the server when visiting it with his browser. The information is then saved and made easily accessible to the user, independent of what system he is using.

    Our solution is based on a proxy-server, through which the user makes his connections. The server is configurable as to what information to scan for and where, as well as in what format, the data should be saved. Our method with an independent proxyserver is not as efficient as including this support into a browser, but it is enough to give proof of the concept. For high-speed connections to a server on the same network as the user, it might be possible for a user to notice that it is slowing down the connection, but it’s a matter of fractions of a second, and surfing under normal conditions the user is very unlikely to be bothered by the proxy. The actual loss in performance is the time required to make a second TCP-connection for each call, as well as a slight loss of efficiency due to Java’s thread synchronization.

  • 17.
    Ahmad, Khurram
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Azeem, Muhammad
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Gold Standard Website2009Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

     

    The aim of this thesis is to design a web base system which provides functionality of comparison between two java files on the basis of point-to information (P2I). User will upload Java files and analysis of Java files called point-to analysis (P2A). System will store the files in the file system for reference and download in later time. System will extract the information called P2I from P2A and it will store that information in the database.

    Database should be flexible to accommodate the changes in P2A file and system should be able to extract the P2I and store it in database with minimum support of system administrator.

     

  • 18.
    Aidemark, Jan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Investigating Concepts for an Interconnected Socio/Technical KM Planning Approach2009In: Proceedings of the 10th European conference on Knowledge Management: ECKM 2009 - Università Degli Studi Di Padoava, Vicenza, Italy, 3-4 September 2009 / [ed] . Bolisani, E. and Scarso, E., Reading, England: Academic Publising Ltd , 2009, 1-9 p.Conference paper (Refereed)
  • 19.
    Akhtar, Naeem
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Alzghoul, Ahmad
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Time performance comparison in determining the weak parts in wooden logs2009Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The steadily increasing demand of wood forces sawmills to increase the efficiency and effectiveness of their equipments. The weak parts and the twist in wooden logs have been documented as the most common and crucial defect in sawn lumber.

    In this thesis we are going to implement a program which is able to determine the weak parts in wooden logs. The implementation will be in two languages C++ and Matlab. Parts of the program are going to be implemented sometimes by C++ and sometimes by Matlab therefore different designs are going to be tested. The aim of this thesis is to check whether these designs will meet the real time bound of 10 m/s.

    The result shows that there is a huge difference in time performance for the different designs. Therefore, different discretization levels were used in order to meet the deadline of 10m/s. We found that in order to get better speed one should calculate the matrix for the function F and the Jacobian function J by using C++ not by Matlab. Also we found that when we called functions from one language to another an extra time is added.

  • 20.
    Akkaya, Deniz
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Thalgott, Fabien
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Honeypots in network security2010Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

  • 21.
    Alam Khan, Fakhri
    et al.
    University of Vienna.
    Han, Yuzhang
    University of Vienna.
    Pllana, Sabri
    University of Vienna.
    Brezany, Peter
    University of Vienna.
    An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific Workflows2010In: 24th IEEE International Conference on Advanced Information Networking and Applications, IEEE Computer Society, 2010, 1241-1248 p.Conference paper (Refereed)
    Abstract [en]

    In the process of a scientific experiment a workflow is executed multiple times using various values of the parameters of activities. For real-world workflows that may contain hundreds of activities, each having several parameters, it is practically not feasible to conduct a parameter sensitivity study by simply following a ”brute-force approach” (that is experimental evaluation of all possible cases). We believe that a heuristic-guided approach enables to find a near-optimal solution using a reasonable amount of resources without the need for the evaluation of all possibilities. In this paper we present a novel methodology for determination of parameter significance of scientific workflows that is based on Ant Colony Optimization (ACO). We refer to our methodology, which is a customization of ACO for Parameter Significance determination, as ACO4PS. We use ACO4PS to identify (1) which parameter strongly affects the overall result of the workflow and (2) for which combination of parameter values we obtain the expected result. ACO4PS generates a list of all workflow parameters sorted by significance as well as is capable of generating a subset of significant parameters. We empirically evaluate our methodology using a real-world scientific workflow that deals with the Non-Invasive Glucose Measurement.

  • 22.
    Alam Khan, Fakhri
    et al.
    University of Vienna.
    Han, Yuzhang
    University of Vienna.
    Pllana, Sabri
    University of Vienna.
    Brezany, Peter
    University of Vienna.
    Estimation of Parameters Sensitivity for Scientific Workflows2009In: 2009 International Conference on Parallel Processing Workshops, IEEE Computer Society, 2009, 457-462 p.Conference paper (Refereed)
    Abstract [en]

    Usually workflow activities in the scientific domain depend on a collection of parameters. These parameters determine the output of the activity, and consequently the output of the whole workflow. In the scientific domain, workflows have exploratory nature and are used to understand a scientific phenomenon or answer scientific questions. In the process of a scientific experiment a workflow is executed multiple times using various values of the parameters of activities. It is relevant to identify (1) which parameter strongly affects the overall result of the workflow and (2) for which combination of parameter values we obtain the expected result. Foreseeing these issues, in this paper we present our methodology to estimate the significance of all scientific workflow parameters as well as to estimate the most significant parameter to the workflow. The estimation of parameter significance will enable the scientist to fine tune, and optimize his results efficiently. Furthermore, we empirically validate our methodology on Non-Invasive Glucose Measurement workflow and discuss our results. The NIGM workflow uses the neural network model to calculate the glucose level in patient blood. The neural network model has a set of parameters, which affect the result of the workflow significantly. But, unfortunately the impact significance of these parameters is commonly unknown to the user. We present our approach for estimating and quantifying impact significance of neural network parameters.

  • 23.
    Alam Khan, Fakhri
    et al.
    University of Vienna.
    Han, Yuzhang
    University of Vienna.
    Pllana, Sabri
    University of Vienna.
    Brezany, Peter
    University of Vienna.
    Provenance Support for Grid-Enabled Scientific Workflows2008In: Fourth International Conference on Semantics, Knowledge and Grid, IEEE Computer Society, 2008, 173-180 p.Conference paper (Refereed)
    Abstract [en]

    The Grid is evolving and new concepts like Semantic Grid, Knowledge Grid are rapidly emerging, where humans and distributed machines share, exchange, and manage data and resources intelligently. Computational scientists typically use workflows to describe and manage scientific discovery processes. However, the credibility of the obtained results in the scientific community is questionable if the computational experiment is not reproducible. This issue is being addressed in our research reported in this paper via development of workflow provenance system for Grid-enabled scientific workflows. Workflow provenance collects data on workflow activities, data flow and workflow clients. Provenance information can be used to trace and test workflows and the data produced. Our approach supports reproducibility (i.e. to support re-enactment of workflow by an independent user) and dataflow visualization (i.e. visualization of statistical characteristics of input/output data). We illustrate our approach on the Non-Invasive Glucose Measurement (NIGM) application.

  • 24. Albrecht, Mario
    et al.
    Kerren, Andreas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Klein, Karsten
    Kohlbacher, Oliver
    Mutzel, Petra
    Paul, Wolfgang
    Schreiber, Falk
    Wybrow, Michael
    On Open Problems in Biological Network Visualization2009In: Graph Drawing: 17th International Symposium, GD 2009, Chicago, IL, USA, September 22-25, 2009. Revised Papers / [ed] David Eppstein and Emden R. Gansner, Berlin Heidelberg New York: Springer, 2009, 256-267 p.Chapter in book (Refereed)
    Abstract [en]

    Much of the data generated and analyzed in the life sciences can be interpreted and represented by networks or graphs. Network analysis and visualization methods help in investigating them, and many universal as well as special-purpose tools and libraries are available for this task. However, the two fields of graph drawing and network biology are still largely disconnected. Hence, visualization of biological networks does typically not apply state-of-the-art graph drawing techniques, and graph drawing tools do not respect the drawing conventions of the life science community.

    In this paper, we analyze some of the major problems arising in biological network visualization.We characterize these problems and formulate a series of open graph drawing problems. These use cases illustrate the need for efficient algorithms to present, explore, evaluate, and compare biological network data. For each use case, problems are discussed and possible solutions suggested.

  • 25.
    Ali, Amjad
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Migration from Internet Protocol Version 4 To Internet Protocol Version 62014Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    IPv4 has played it big role in spreading Internet and Internet based applications for more than 20 years. Now it will hand over the stage to its more powerful successor IPv6. IP is an important component of the TCP/IP protocol suit and the Internet is built on it.

             IPv6 is a new generation protocol suite which has been proposed by the Internet Engineering Task Force (IETF) which uses the 128-bit address instead of IPv4 32-bit address. Moving to the next generation of Internet Protocol became an issue to solve many problems in the current generation.

             Unfortunately IPv4 and IPv6 are incompatible with each other. It is necessary to create smooth transition mechanisms that a transition mechanism is required during the time of migration from IPv4 to IPv6 networks. This paper aims to supplement this by presenting the design and implementation of IPv4 to IPv6 Transition Scenarios. This paper very clearly illustrates the transition of IPv4-to-IPv6 Transition mechanisms along with how to execute IPv6 commands.

  • 26.
    Alkhars, Abeer
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mahmoud, Wasan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-Platform Desktop Development (JavaFX vs. Electron)2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, there are many technologies available for developing cross-platform desktop apps. JavaFX is a software platform based on the Java language. It has a set of features that play a role in its success. On the other hand, Electron is a new framework that allows developers to employ web technologies (JavaScript, HTML, and CSS) to create cross-platform desktop applications. This thesis describes and compares between these two frameworks. The purpose of this report is to provide guidance in choosing the right technique for a particular cross-platform desktop application. Simple cross-platform desktop applications have been developed to compare both approaches as well as find the advantages and disadvantages. The results show that both apps satisfied the functional and nonfunctional requirements. Each framework architecture has its own advantage in building particular apps. Both frameworks have rich APIs as well as rich GUI components for building desktop apps. Electron has good documentation and community help, but it cannot be compared to JavaFX. The Electron app gives faster execution time and less memory usage than JavaFX app. However, the implementation of OOP concepts in Electron using JavaScript has some concerns in terms of encapsulation and inheritance. 

  • 27. Allwood, Jens
    et al.
    Henrichsen, Peter Juel
    Grönqvist, Leif
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Ahlsén, Elisabeth
    Gunnarsson, Magnus
    Transliteration between Spoken Language Corpora: Moving between Danish BySoc and Swedish GSLC2005In: Nordic Journal of Linguistics, Vol. 28, no 1, 5-36 p.Article in journal (Refereed)
  • 28.
    Amatya, Suyesh
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-Platform Mobile Development: An Alternative to Native Mobile Development2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Mobile devices and mobile computing have made tremendous advances and become ubiquitous in the last few years. As a result, the landscape has become seriously fragmented which brings lots of challenges for the mobile development process. Whilst native approach of mobile development still is the predominant way to develop for a particular mobile platform, recently there is shifting towards cross-platform mobile development as well.

    In this thesis, a survey of the literature has been performed to see the trends in cross-platform mobile development over the last few years. With the result of the survey, it is argued that the web-based approach and in particular, hybrid approach, of mobile development serves the best for cross-platform development. Using the hybrid approach, a prototype application has also been developed and built into native application for different platforms. This has helped to get a better insight about the domain of cross-platform mobile development and its main advantage of the unification of the development and testing process.

    The results of this work indicate that even though cross platform tools are not fully matured they show great potential and reduce the cost associated in developing native mobile applications. Cross-platform mobile development is equally suitable for rapid development of high-fidelity prototypes of the mobile application as well as fairly complex, resource intensive mobile applications on its own right. As the upcoming future trends and the evolution of HTML5 continues to redefine the web, allowing its growth as a software platform, there remains great opportunities for cross-platform mobile development and hence provides an attractive alternative for the native mobile development.

  • 29.
    Andersson, Gustaf
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Andersson, Fredrik
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Android Environment Security2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.

  • 30.
    Andersson, Jesper
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    Edvinsson, Marcus
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    The Puppeteer — Directing Software Engineering Projects2008In: International Conference on Computer Science and Software Engineering: CSSE 2008, IEEE Computer Society , 2008Conference paper (Refereed)
    Abstract [en]

    Software engineering projects are often used to teach complex aspects of software engineering. It is well-known that these courses are difficult to run. In this paper we address one aspect that can be used to reduce differences between projects and project groups to more easily find the balance of “challenging but possible”. We describe the role of the “puppeteer” and present four communication patterns that we use in an international software engineering project course.

  • 31.
    Andersson, Jessica
    et al.
    Chalmers University of Technology.
    Larsson, Sofia
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Quality of Demand-Driven Documentation2014In: Proceedings of the 37th Information Systems Research Seminar in Scandinavia / [ed] Ahmad Ghazawneh, Jacob Nørbjerg and Jan Pries-Heje, 2014Conference paper (Refereed)
    Abstract [en]

    In this case study we investigate how demand-driven documentation can be used in open source projects. The study relied on questions and answers (demand-driven documenta- tion) posted on Stack Overflow and studied two open source projects, Apache POI and Firefox for Android, in depth. We found that the demand driven documentation provided by the respec- tive community is in general of good quality and contributed within an acceptable amount of time. We conclude that demand driven documentation can be suitable as a primary information source if other resources accompany it. However, the suitability is closely related to the size and activity of the project’s community. 

  • 32.
    Andersson, Martin
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Detecting known host security flaws over a network connection2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be made. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used.

    There is no common way of merging information from different VA tools. Therefore the Vulnerability Assessment Information Handler (VAIH) has been developed. The VAIH system consists of three parts. First, a intermediate language format defined in XML. Second, modules that converts the output of VA tools to the intermediate language format. Third, a program for reading and displaying the intermediate language format.

    The VAIH system makes it possible to merge the results from vulnerability assessment tools into one file that can be displayed and edited through a GUI.

  • 33.
    Andersson, Martin
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Software Security Testing: A Flexible Architecture for Security Testing2008Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Abstract: This thesis begins with briefly describing a few vulnerability classes that exist in today’s software. We then continue by describing how these vulnerabilities could be discovered through dynamic testing. Both general testing techniques and existent tools are mentioned.

    The second half of this thesis present and evaluates a new flexible architecture. This new architecture has the ability to combine different approaches and create a more flexible environment from where the testing can be conducted. This new flexible architecture aims towards reducing maintenance and/or adaptation time for existing tools or frameworks. The architecture consists of a given set of plug-ins that can be easily replaced to adapt test as needed. We evaluate this architecture by implementing test plug-ins. We also use this architecture and a set of test plug-ins to generate a fuzzer targeted to test a known vulnerable server.

  • 34.
    Andersson, Pär
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nylund, Robin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bring Your Own Device i kommun- och landstingsnätverk: En undersökning om dess utbredd2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    An ongoing question which have been brought into consideration lately is whether employees should be given the permission to bring their own devices to their jobs or not. The numbers of people using smartphones and laptops have been growing and with that, the will to make use of those devices at work. That phenomenon is called Bring Your Own Device and the implementation of it can cause network security related problems. This essay was written with the intentions to find out how many of the municipalities and counties that have allowed people to bring their own devices. The intentions was also to investigate which security actions that have been taken into consideration when securing the rest of the network from the brought devices. This was performed by sending out a survey. The result that the survey gave proves that BYOD have often been taking into consideration among the organizations. It also proves that many have chosen to not implement the phenomenon because of reasons like problem with the security, the costs, and the lack of resources. An overrepresented majority of the organizations who have chosen to implement it have decided to have the private devices in a separate network to secure the rest of the network infrastructure.

  • 35.
    Andersson, Rikard
    et al.
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mining Relations from Git Commit Messages: an Experience Report2014In: Proceedings of the Fifth Swedish Language Technology Conference, 2014Conference paper (Refereed)
  • 36.
    Andersson, Therese
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Praktisk optimering av marknadsföring i sociala medier2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this study is to examine how companies can preform practical optimization of their marketing efforts in social media. Marketing in social media is something that many business leaders prioritize as it promotes a two-way communication, which in turn can lead to the possibility to reach out to more customers and provide successful profit effects.

    The report examines selected best-practices to find those recommendations that can be viewed as best suited for pracital optimization of a company’s website and profile-pages in social media. In order to define the recommendations, the study reviewed which recommendations were applied to real companies and what need and what knowledge small businesses have in the area. This was examined by analyzing five businesses and their activity in social media, which was followed up by an digital survey targeting small businesses. The result include a summary of appropriate recommendations to smaller companies that want to practically optimize their marketing efforts in social media.

  • 37.
    Andersson, Tobias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hedlund, Victor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kommunikationslösningar i molnet: Examensarbete angående olika nätverkslösningar i WAN2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    To connect networks across geographically diverse sites has become increasingly common in todays society. This report will highlight the various WAN solutions to make this possible. The different solutions that will be highlighted in this report is rent own fiber , Layer 2 link, MPLS , and VPN. There will be comparisons between these solutions in terms of cost, safety , speed and reliability. This has been done with scientific articles and interviews , but the report also includes a practical laboration.

  • 38.
    Andersson, Tommy
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Torkelsson, Mattis
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Wärlinge, Gustav
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    3DES, AES i hårdvara - Förmåga att skala i en växande miljö2010Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report describes the work and studies carried out in the field of encryption and VPN. The focus is on how well the encryption algorithms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) perform in a predetermined environment. The main focus has been to answer the question: Which of the encryption algorithms AES and 3DES requires less system resources. During the period  of studies, lectures and literature have several times claimed the 3DES algorithm to require more resources of encryption devices, compared to AES. This report tries to find if it is a fact and if so how big is the difference between the algorithms. To seek  answers to the questions, a number of experiments was performed. These experiments were intended to demonstrate or refute the above claims about 3DES and AES. The results of the performed experiments shows no major differences between 3DES and AES. This differs from what have been publicly accepted concerning facts regarding encryption algorithms 3DES and AES.

  • 39.
    Ankarberg, Alexander
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Samkörning av databaser-Är lagen ett hinder?2006Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Title:Comparison of databases – Is the law an obstacle?

    Authors:Alexander Ankarberg, Applied Information Science.

    Tutors:Lars- Eric Ljung

    Problem: Cross running databases is getting more and more significant during the development of the information flow. There are huge benefits if we start to use the technique that already exists. The law is today an obstacle, so what would happen if the law wasn’t so stern. My question is:” why don’t we cross run databases more efficient between parts of institutions”

    Aim:The purpose of this essay is to evaluate why institutions does not cross run databases and start a discussion. There are possibilities that we today does not use. One aim is also to find solutions so that we can start to use the techniques. The essay will explain the fundamentals and discuss both the advantages and the disadvantages in depth.

    Method:The author has approached the problem from two ways. From induction and deduction which combined is abduction. The author hopes that this results in as many points of angles as possible. And the answers will be as complete as possible. The essay also includes an inquiry which is based on interview with ordinary people.

    Conclusions:The law is not up to date nor made for today’s technique. It is in some ways an obstacle for a more efficient system and it could save enormous amounts of money for both the government and common man. There is hope though, and small revolutions happen every day. There is also ways to go around the law and make things possible and make the system more efficient. That is with agreement from the person that the information is about. There is also one possibility with safety classes, to put a number on information.

  • 40.
    Annerstedt, Gunnar
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Landerhjelm, Madeleine
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Samtidighetskontroll i applikationer utvecklade med ASP.NET Web Forms och traditionell ADO.NET2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Samtidighetskonflikt, även känt under den engelska termen concurrency conflict, uppstår när två eller flera processer försöker uppdatera samma information i en databas vid samma tidpunkt. Processen som sparar ändringarna sist blir de ändringar som gäller och på så sätt kan viktigt information försvinna. Det finns flera tillvägagångssätt för att förhindra dessa problem med olika typer av samtidighetskontroller som kan ske i applikationen eller redan på databasnivå via lagrade procedurer.

    Metoden som används för att undersöka problemområdet har utgått från ett praktiskt arbete med en utökning av en existerande applikation, webbutiken RoyalDesign, skriven i ASP.NET (ASP-dotnet) Web Forms. Utökningen kräver samtidighetskontroll där användaren ska informeras av eventuella konflikter. Undersökningen avser att granska hur samtidighetskontroll implementeras och hanteras i applikationen. Resultatet av undersökningen visar databasen gör den största delen av arbetet, fångar samtidighetskonflikter samt kastar ett undantag som sedan applikationen fångar och hanterar. 

  • 41.
    Arvidsson, Martin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Granskning av regeringens digitaliseringsstrategi: - programmering i grundskolan, vilka problem finns?2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den Svenska skolan ska digitaliseras och en strategi för hur digitaliseringen kan ske skulle tas fram av Skolverket. Flertalet lärare lyfte fram problem med förslaget som presenterades av Skolverket men inga större förändringar genomfördes. Strategin ska börja gälla, men problemen kvarstår. Vilka problem ser existerande lärare inom Teknik samt Matematik med strategin, hur kan dessa åtgärdas för att underlätta för de berörda lärarna? En undersökning skickades ut till lärare runt om i Sverige med målet att kartlägga vilka problem som lärarna såg med strategin, var det samma problem som hördes i medierna? De flesta lärare ansåg att det kommer bli en kompetensbrist, samt att det kommer bli väldigt tungt belastade scheman. De slutsatser som kan dras av studien är att någon form av kompetensutveckling inom de verktyg som lärarna ska använda sig av för att lära ut programmering krävs. Samt att ett stort ansvar även hamnar på skolans kommun, att resurserna som krävs måste hinnas tillföras.

  • 42.
    Asano, Masanari
    et al.
    Tokyo University of Science.
    Basieva, Irina
    Linnaeus University, Faculty of Technology, Department of Mathematics.
    Khrennikov, Andrei
    Linnaeus University, Faculty of Technology, Department of Mathematics.
    Ohya, Masanori
    Tokyo University of Science.
    Tanaka, Yoshiharu
    Tokyo University of Science.
    Yamato, I.
    Tokyo University of Science.
    Lamarckian Evolution of Epigenome from Open Quantum Systems and Entanglement2014In: Quantum Interaction: 7th International Conference, QI 2013, Leicester, UK, July 25-27, 2013. Selected Papers / [ed] Harald Atmanspacher, Emmanuel Haven, Kirsty Kitto, Derek Raine, Springer, 2014, 324-334 p.Conference paper (Refereed)
    Abstract [en]

    We develop a quantum-like (QL) model of cellular evolution based on the theory of open quantum systems and entanglement between epigenetic markers in a cell. This approach is applied to modeling of epigenetic evolution of cellular populations. We point out that recently experimental genetics discovered numerous phenomena of cellular evolution adaptive to the pressure of the environment. In such phenomena epigenetic changes are fixed in one generation and, hence, the Darwinian natural selection model cannot be applied. A number of prominent genetists stress the Lamarckian character of epigenetic evolution. In quantum physics the dynamics of the state of a system (e.g. electron) contacting with an environment (bath) is described by the theory of open quantum systems. Therefore it is natural to apply this theory to model adaptive changes in the epigenome. Since evolution of the Lamarckian type is very rapid – changes in the epigenome have to be inherited in one generation – we have to find a proper mathematical description of such a speed up. In our model this is the entanglement of different epigenetic markers.

  • 43.
    Asparuhov, Lachezar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    BYOD - Risks, Solutions and Guidelines2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.

  • 44.
    Aspernäs, Andreas
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nensén, Mattias
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Container Hosts as Virtual Machines: A performance study2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Virtualization is a technique used to abstract the operating system from the hardware. The primary gains of virtualization is increased server consolidation, leading to greater hardware utilization and infrastructure manageability. Another technology that can be used to achieve similar goals is containerization. Containerization is an operating-system level virtualization technique which allows applications to run in partial isolation on the same hardware. Containerized applications share the same Linux kernel but run in packaged containers which includes just enough binaries and libraries for the application to function. In recent years it has become more common to see hardware virtualization beneath the container host operating systems. An upcoming technology to further this development is VMware’s vSphere Integrated Containers which aims to integrate management of Linux Containers with the vSphere (a hardware virtualization platform by VMware) management interface. With these technologies as background we set out to measure the impact of hardware virtualization on Linux Container performance by running a suite of macro-benchmarks on a LAMP-application stack. We perform the macro-benchmarks on three different operating systems (CentOS, CoreOS and Photon OS) in order to see if the choice of container host affects the performance. Our results show a decrease in performance when comparing a hardware virtualized container host to a container hosts running directly on the hardware. However, the impact on containerized application performance can vary depending on the actual application, the choice of operating system and even the type of operation performed. It is therefore important to consider these three items before implementing container hosts as virtual machines.

  • 45.
    Aspernäs, Andreas
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Simonsson, Thommy
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    IDS on Raspberry Pi: A Performance Evaluation2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to  handle network traffic while acting as an intrusion detection system. To examine this a testing environment was set up containing two workstation computers connected to a Raspberry Pi, each computer hosting a virtual machine. Tests measuring the network throughput as well as the CPU and memory usage were performed on each of the Raspberry Pi devices. Two models of Raspberry Pis were used; Raspberry Pi model B+ and Raspberry Pi 2 model B; each of them running the operating system Arch Linux ARM. The results of these tests were that both of the Raspberry Pis could be used as an intrusion detection system but has some limitations that could impede usage depending on the requirements of the user. Raspberry Pi 2 model B show benefits of its updated hardware by suffering lower throughput degradation than Raspberry Pi model B+, while using less of it's total CPU and memory capacity.

  • 46.
    Ata-Ul-Nasar, Mansoor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Modeling Intel® Cilk™ Plus Programs with Unified Modeling Languages2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Recently multi-core processors have become very popular in computer systems. It allows multiple threads to be executed simultaneously. The advantage of multi-core comes by parallelizing codes to expand the work across hardware. Furthermore, this can be done by using a parallel environment developed by M.I.T. called Intel Cilk Plus, which is design to provide an easy and well-structured parallel programming approach.

         Intel Cilk Plus is an extension of C and C++ programming languages that describes data parallelism. This extension is very helpful and easy to use among other languages in this field. It has different features including keywords, reducers and array notations etc. In general, this article describes Intel Cilk Plus and its features. In addition, Unified Modelling Language, activity diagrams are used in term of graphical modelling of Intel Cilk Plus by describing the process of a system, capturing the dynamic behaviour of it and representing the flow from one activity to another using control flow. Later on Intel Cilk Plus keywords and UML diagrams tools will be evaluated, a comparison of different UML modelling tools will also be provided.

  • 47.
    Axelsson, Jakob
    et al.
    Swedish Inst Comp Sci, Kista, Sweden ; Mälardalen Univ.
    Papatheocharous, Efi
    Swedish Inst Comp Sci, Kista.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Characteristics of software ecosystems for Federated Embedded Systems: A case study2014In: Information and Software Technology, ISSN 0950-5849, Vol. 56, no 11, 1457-1475 p.Article in journal (Refereed)
    Abstract [en]

    Context: Traditionally, Embedded Systems (ES) are tightly linked to physical products, and closed both for communication to the surrounding world and to additions or modifications by third parties. New technical solutions are however emerging that allow addition of plug-in software, as well as external communication for both software installation and data exchange. These mechanisms in combination will allow for the construction of Federated Embedded Systems (FES). Expected benefits include the possibility of third-party actors developing add-on functionality; a shorter time to market for new functions; and the ability to upgrade existing products in the field. This will however require not only new technical solutions, but also a transformation of the software ecosystems for ES. Objective: This paper aims at providing an initial characterization of the mechanisms that need to be present to make a FES ecosystem successful. This includes identification of the actors, the possible business models, the effects on product development processes, methods and tools, as well as on the product architecture. Method: The research was carried out as an explorative case study based on interviews with 15 senior staff members at 9 companies related to ES that represent different roles in a future ecosystem for FES. The interview data was analyzed and the findings were mapped according to the Business Model Canvas (BMC). Results: The findings from the study describe the main characteristics of a FES ecosystem, and identify the challenges for future research and practice. Conclusions: The case study indicates that new actors exist in the FES ecosystem compared to a traditional supply chain, and that their roles and relations are redefined. The business models include new revenue streams and services, but also create the need for trade-offs between, e.g., openness and dependability in the architecture, as well as new ways of working. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.orgilicensesiby/3.0/).

  • 48. Ayguadé, Eduard
    et al.
    Pnevmatikatos, DionisiosEigenmann, RudolfLuján, MikelPllana, Sabri
    Topic 11: Multicore and Manycore Programming2012Conference proceedings (editor) (Refereed)
    Abstract [en]

    Modern multicore and manycore systems enjoy the benefits of technology scaling and promise impressive performance. However, harvesting this potential is not straightforward. While multicore and manycore processors alleviate several problems that are related to single-core processors – known as memory-, power-, or instruction-level parallelism-wall – they raise the issue of the programmability and programming effort. This topic focuses on novel solutions for multicore and manycore programmability and efficient programming in the context of generalpurpose systems.

  • 49.
    Aziz, Yunus Emre
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Improving The Programming Logic of Children by Creating Computer Games on Greenfoot Framework2011Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In our modern time, age of education is decreasing day by day. People have started tolearn more advanced things at earlier ages. This fact is also true for children. They arelearning more advanced thing now because they are facing new technology in everyaspect of life.

    Today, one of the most popular subject is computer programming so it is also one ofthe most popular technologies to investigate, inevitably. One reason to such popularity isthat computer programming is very important in every field of life or business and itseems that this importance will improve with time. Certain levels of logic and synthesisare needed for programming. It is crucial to improve these skills.

    This master thesis tries to improve and tame the programming abilities of childrenand strengthen the knowledge about the basic concepts of mathematics and physics,which are related to the computer science by creating simple computer games usingGreenfoot Framework.

    In this project, tutorials like approach was used. Designs of the games was studied astutorials and at the end of the last tutorial, two tests and a survey were applied.

    According to the results, purpose about improving and taming the programmingabilities of children is achieved. For the other purposes, these are increases around 8%and 16%. Since they are not dramatic increases and the target number is 6 I can not sayclearly that these purposes are also achieved.

  • 50.
    Barkmann, Henrike
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Quantitative Evaluation of Software Quality Metrics in Open-Source Projects2009Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The validation of software quality metrics lacks statistical significance. One reason for this is that the data collection requires quite some effort. To help solve this problem, we develop tools for metrics analysis of a large number of software projects (146 projects with ca. 70.000 classes and interfaces and over 11 million lines of code). Moreover, validation of software quality metrics should focus on relevant metrics, i.e., correlated metrics need not to be validated independently. Based on our statistical basis, we identify correlation between several metrics from well-known objectoriented metrics suites. Besides, we present early results of typical metrics values and possible thresholds.

1234567 1 - 50 of 859
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf