lnu.sePublications
Change search
Refine search result
1234567 1 - 50 of 447
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Architectural reasoning for dynamic software product lines2013In: Proceedings of the 17th International Software Product Line Conference co-located workshops, ACM Press, 2013, 117-124 p.Conference paper (Refereed)
    Abstract [en]

    Software quality is critical in today's software systems. A challenge is the trade-off situation architects face in the design process. Designers often have two or more alternatives, which must be compared and put into context before a decision is made. The challenge becomes even more complex for dynamic software product lines, where domain designers have to take runtime variations into consideration as well. To address the problem we propose extensions to an architectural reasoning framework with constructs/artifacts to define and model a domain's scope and dynamic variability. The extended reasoning framework encapsulates knowledge to understand and reason about domain quality behavior and self-adaptation as a primary variability mechanism. The framework is demonstrated for a self-configuration property, self-upgradability on an educational product-line.

  • 2.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Architectural Reasoning Support for Product-Lines of Self-adaptive Software Systems: A Case Study2015In: Software Architecture: 9th European Conference, ECSA 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 201 / [ed] Danny Weyns, Raffaela Mirandola, Ivica Crnkovic, 2015, 20-36 p.Conference paper (Refereed)
    Abstract [en]

    Software architecture serves as a foundation for the design and development of software systems. Designing an architecture requires extensive analysis and reasoning. The study presented herein focuses on the architectural analysis and reasoning in support of engineering self-adaptive software systems with systematic reuse. Designing self-adaptive software systems with systematic reuse introduces variability along three dimensions; adding more complexity to the architectural analysis and reasoning process. To this end, the study presents an extended Architectural Reasoning Framework with dedicated reasoning support for self-adaptive systems and reuse. To evaluate the proposed framework, we conducted an initial feasibility case study, which concludes that the proposed framework assists the domain architects to increase reusability, reduce fault density, and eliminate differences in skills and experiences among architects, which were our research goals and are decisive factors for a system's overall quality.

  • 3.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Harnessing Variability in Product-lines of Self-adaptive Software Systems2015In: Proceedings of the 19th International Conference on Software Product Line: SPLC '15, ACM Press, 2015, 191-200 p.Conference paper (Refereed)
    Abstract [en]

    This work studies systematic reuse in the context of self-adaptive software systems. In our work, we realized that managing variability for such platforms is different compared to traditional platforms, primarily due to the run-time variability and system uncertainties. Motivated by the fact that recent trends show that self-adaptation will be used more often in future system generation and that software reuse state-of-practice or research do not provide sufficient support, we have investigated the problems and possibly resolutions in this context. We have analyzed variability for these systems, using a systematic reuse prism, and identified a research gap in variability management. The analysis divides variability handling into four activities: (1) identify variability, (2) constrain variability, (3) implement variability, and (4) manage variability. Based on the findings we envision a reuse framework for the specific domain and present an example framework that addresses some of the identified challenges. We argue that it provides basic support for engineering self-adaptive software systems with systematic reuse. We discuss some important avenues of research for achieving the vision.

  • 4.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Iftikhar, Muhammad Usman
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Rigorous architectural reasoning for self-adaptive software systems2016In: Proceedings: First Workshop on Qualitative Reasoning abut Software Architectures, QRASA 2016 / [ed] Lisa O'Conner, IEEE, 2016, 11-18 p.Conference paper (Refereed)
    Abstract [en]

    Designing a software architecture requires architectural reasoning, i.e., activities that translate requirements to an architecture solution. Architectural reasoning is particularly challenging in the design of product-lines of self-adaptive systems, which involve variability both at development time and runtime. In previous work we developed an extended Architectural Reasoning Framework (eARF) to address this challenge. However, evaluation of the eARF showed that the framework lacked support for rigorous reasoning, ensuring that the design complies to the requirements. In this paper, we introduce an analytical framework that enhances eARF with such support. The framework defines a set of artifacts and a series of activities. Artifacts include templates to specify domain quality attribute scenarios, concrete models, and properties. The activities support architects with transforming requirement scenarios to architecture models that comply to required properties. Our focus in this paper is on architectural reasoning support for a single product instance. We illustrate the benefits of the approach by applying it to an example client-server system, and outline challenges for future work. © 2016 IEEE.

  • 5.
    Abraham, Erika
    et al.
    RWTH Aachen University, Germany.
    Bekas, Costas
    IBM Research, Switzerland.
    Brandic, Ivona
    Vienna University of Technology, Austria.
    Genaim, Samir
    Complutense University of Madrid, Spain.
    Johnsen, Einar
    University of Oslo, Norway.
    Kondov, Ivan
    Karlsruhe Institute of Technology, Germany.
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Streit, Achim
    Karlsruhe Institute of Technology, Germany.
    Preparing HPC Applications for Exascale: Challenges and Recommendations2015In: Proceedings: 2015 18th International Conference on Network-Based Information Systems, NBiS 2015 / [ed] Barolli, L; Takizawa, M; Hsu, HH; Enokido, T; Xhafa, F, IEEE conference proceedings, 2015, 401-406 p.Conference paper (Refereed)
    Abstract [en]

    While the HPC community is working towards the development of the first Exaflop computer (expected around 2020), after reaching the Petaflop milestone in 2008 still only few HPC applications are able to fully exploit the capabilities of Petaflop systems. In this paper we argue that efforts for preparing HPC applications for Exascale should start before such systems become available. We identify challenges that need to be addressed and recommend solutions in key areas of interest, including formal modeling, static analysis and optimization, runtime analysis and optimization, and autonomic computing. Furthermore, we outline a conceptual framework for porting HPC applications to future Exascale computing systems and propose steps for its implementation.

  • 6.
    Adegoke, Adekunle
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Osimosu, Emmanuel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Service Availability in Cloud Computing: Threats and Best Practices2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model. This allows organizations to focus on core business goals instead of managing in-house IT infrastructure.                    

    However, as more business critical applications and data are moved to the cloud, service availability is becoming a growing concern. A number of recent cloud service disruptions have questioned the reliability of cloud environments to host business critical applications and data. The impact of these disruptions varies, but, in most cases, there are financial losses and damaged reputation among consumers.        

    This thesis aims to investigate the threats to service availability in cloud computing and to provide some best practices to mitigate some of these threats. As a result, we identified eight categories of threats. They include, in no particular order: power outage, hardware failure, cyber-attack, configuration error, software bug, human error, administrative or legal dispute and network dependency. A number of systematic mitigation techniques to ensure constant availability of service by cloud providers were identified. In addition, practices that can be applied by cloud customers and users of cloud services, to improve service availability were presented.

  • 7.
    Aflaki, Kamyar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Penetration And Security Testing As A Mean To Securing Universal Web Applications2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The domain of Information Technology has been discussed focusing the security of in-formation based on web application. The main purpose of the paper is to pinpoint andexplain the main attacks on web applications. In the study the I have used real world webapplication to demonstrate different types of attacks and the ways of prevention againstthem. Cyber criminals are using certain tactics to gather sensitive information throughweb applications, thus it is important to study this domain of IT. Experiment has beenconducted to demonstrate the concept and achieved outcomes have been explained. It hasbeen concluded that the most of the web application vulnerabilities come from a bad de-sign, according to Microsoft Developer Network (MSDN) Design Guidelines for SecureWeb Applications, and most of the threats can be prevented by considering basics of webapplication security while designing the application.

  • 8.
    Ahlstedt, Sebastian
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Granath Karlsson, David
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Diskkrypteringsprestanda i GNU/Linux2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.

    The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.

    It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.

    An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal.

  • 9.
    Ahltorp, Magnus
    et al.
    Stockholm.
    Skeppstedt, Maria
    Linnaeus University, Faculty of Technology, Department of Computer Science. Gavagai, Stockholm.
    Kitajima, Shiho
    Hokkaido Univ, Japan.
    Henriksson, Aron
    Stockholm University.
    Rzepka, Rafal
    Hokkaido Univ, Japan.
    Araki, Kenji
    Hokkaido Univ, Japan.
    Expansion of medical vocabularies using distributional semantics on Japanese patient blogs2016In: Journal of Biomedical Semantics, ISSN 2041-1480, E-ISSN 2041-1480, Vol. 7, 58Article in journal (Refereed)
    Abstract [en]

    Background: Research on medical vocabulary expansion from large corpora has primarily been conducted using text written in English or similar languages, due to a limited availability of large biomedical corpora in most languages. Medical vocabularies are, however, essential also for text mining from corpora written in other languages than English and belonging to a variety of medical genres. The aim of this study was therefore to evaluate medical vocabulary expansion using a corpus very different from those previously used, in terms of grammar and orthographics, as well as in terms of text genre. This was carried out by applying a method based on distributional semantics to the task of extracting medical vocabulary terms from a large corpus of Japanese patient blogs. Methods: Distributional properties of terms were modelled with random indexing, followed by agglomerative hierarchical clustering of 3x100 seed terms from existing vocabularies, belonging to three semantic categories: Medical Finding, Pharmaceutical Drug and Body Part. By automatically extracting unknown terms close to the centroids of the created clusters, candidates for new terms to include in the vocabulary were suggested. The method was evaluated for its ability to retrieve the remaining n terms in existing medical vocabularies. Results: Removing case particles and using a context window size of 1 + 1 was a successful strategy for Medical Finding and Pharmaceutical Drug, while retaining case particles and using a window size of 8 + 8 was better for Body Part. For a 10n long candidate list, the use of different cluster sizes affected the result for Pharmaceutical Drug, while the effect was only marginal for the other two categories. For a list of top n candidates for Body Part, however, clusters with a size of up to two terms were slightly more useful than larger clusters. For Pharmaceutical Drug, the best settings resulted in a recall of 25 % for a candidate list of top n terms and a recall of 68 % for top 10n. For a candidate list of top 10n candidates, the second best results were obtained for Medical Finding: a recall of 58 %, compared to 46 % for Body Part. Only taking the top n candidates into account, however, resulted in a recall of 23 % for Body Part, compared to 16 % for Medical Finding. Conclusions: Different settings for corpus pre-processing, window sizes and cluster sizes were suitable for different semantic categories and for different lengths of candidate lists, showing the need to adapt parameters, not only to the language and text genre used, but also to the semantic category for which the vocabulary is to be expanded. The results show, however, that the investigated choices for pre-processing and parameter settings were successful, and that a Japanese blog corpus, which in many ways differs from those used in previous studies, can be a useful resource for medical vocabulary expansion.

  • 10.
    Ahmad, Tanvir
    et al.
    Linnaeus University, Faculty of Engineering and Technology, Department of Computer Science.
    Haider, Muhammad Ashfaq
    Linnaeus University, Faculty of Engineering and Technology, Department of Computer Science.
    A Systematic Literature Review on Claims and supporting Evidence for Self-Adaptive Systems2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 11.
    Alfalahi, Alyaa
    et al.
    Stockholm University.
    Skeppstedt, Maria
    Linnaeus University, Faculty of Technology, Department of Computer Science. Gavagai AB, Sweden.
    Ahlblom, Rickard
    Stockholm University.
    Baskalayci, Roza
    Stockholm University.
    Henriksson, Aron
    Stockholm University.
    Asker, Lars
    Stockholm University.
    Paradis, Carita
    Lund University.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Expanding a Dictionary of Marker Words for Uncertainty and Negation Using Distributional Semantics2015In: Proceedings of the 6th International Workshop on Health Text Mining and Information Analysis (Louhi '15): Short Paper Track / [ed] Cyril Grouin, Thierry Hamon, Aurélie Névéol, and Pierre Zweigenbaum, Association for Computational Linguistics , 2015, 90-96 p.Conference paper (Refereed)
    Abstract [en]

    Approaches to determining the factuality of diagnoses and findings in clinical text tend to rely on dictionaries of marker words for uncertainty and negation. Here, a method for semi-automatically expanding a dictionary of marker words using distributional semantics is presented and evaluated. It is shown that ranking candidates for inclusion according to their proximity to cluster centroids of semantically similar seed words is more successful than ranking them according to proximity to each individual seed word. 

  • 12.
    Ali, Amjad
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Migration from Internet Protocol Version 4 To Internet Protocol Version 62014Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    IPv4 has played it big role in spreading Internet and Internet based applications for more than 20 years. Now it will hand over the stage to its more powerful successor IPv6. IP is an important component of the TCP/IP protocol suit and the Internet is built on it.

             IPv6 is a new generation protocol suite which has been proposed by the Internet Engineering Task Force (IETF) which uses the 128-bit address instead of IPv4 32-bit address. Moving to the next generation of Internet Protocol became an issue to solve many problems in the current generation.

             Unfortunately IPv4 and IPv6 are incompatible with each other. It is necessary to create smooth transition mechanisms that a transition mechanism is required during the time of migration from IPv4 to IPv6 networks. This paper aims to supplement this by presenting the design and implementation of IPv4 to IPv6 Transition Scenarios. This paper very clearly illustrates the transition of IPv4-to-IPv6 Transition mechanisms along with how to execute IPv6 commands.

  • 13.
    Alkhars, Abeer
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mahmoud, Wasan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-Platform Desktop Development (JavaFX vs. Electron)2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, there are many technologies available for developing cross-platform desktop apps. JavaFX is a software platform based on the Java language. It has a set of features that play a role in its success. On the other hand, Electron is a new framework that allows developers to employ web technologies (JavaScript, HTML, and CSS) to create cross-platform desktop applications. This thesis describes and compares between these two frameworks. The purpose of this report is to provide guidance in choosing the right technique for a particular cross-platform desktop application. Simple cross-platform desktop applications have been developed to compare both approaches as well as find the advantages and disadvantages. The results show that both apps satisfied the functional and nonfunctional requirements. Each framework architecture has its own advantage in building particular apps. Both frameworks have rich APIs as well as rich GUI components for building desktop apps. Electron has good documentation and community help, but it cannot be compared to JavaFX. The Electron app gives faster execution time and less memory usage than JavaFX app. However, the implementation of OOP concepts in Electron using JavaScript has some concerns in terms of encapsulation and inheritance. 

  • 14.
    Alm, Anton
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Björling, Joakim
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Prestandautvärdering av firmwares baserade på öppen källkod för routrar/brandväggar på MIPS-arkitektur: Jämförelse mellan Open-WRT, DD-WRT och Tomato firmware2014Independent thesis Basic level (university diploma), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    This investigation compares the performance of three different open-source firmwares. DD-WRT, Open-WRT and Tomato Firmware with MIPS architecture. The test follows two RFC that describes the process of how to perform a performance analysis of network interconnected devices.

    The summarized results show a winner which has generally performed better throughout all the tests and this was Tomato firmware. These results are gathered from three different tests, which is throughput, latency and concurrent sessions test.

    The survey also shows that the performance in general is very equal across all firmwares in the various tests. An important aspect is that there are no outstanding winner, which depends on for example how consistent the results have been. This also concerns a possible conclusion where the firmwares perform various well depending on the type of task involved.

    As further work on this investigation we recommend a performance and function analysis of the tools that the firmware contains. Although a survey of the interface for each firmware would be interesting.

  • 15.
    Al-Ogaili, Rasha
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Al-Ogaili, Zaid
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    A Study on the Transition of the Adaptive into Responsive Web Design Methods on Smart Devices2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the fast-paced technological revolution, technology has formed itself differently to facilitate the way to users to get their needs. As a matter of fact, people nowadays rely to a great extent on the smart devices as one of the essential creations of technology. They tend to access any website or web-application(s) through these devices fast and easily. Thus, paying enough attention to the design of any website or web-application is a major issue. This thesis project discusses the Responsive and Adaptive Design Methods as two important methods in terms of Websites and Web-Design. The methods have been theoretically discussed and explained to present the essential differences between them. Moreover, MyMusiC website has been implemented to show the differences between these methods practically. The prominent difference between the Responsive and Adaptive de-signs of the website makes it easy for the users to figure out the difference between the two design methods in terms of accessibility and ease of navigation. The results showed that the Responsive design is more user-friendly and more preferred by the users than the Adaptive design, as the users tend to use their smart devices first when they want to access a website than the computers.

  • 16.
    Amatya, Suyesh
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-Platform Mobile Development: An Alternative to Native Mobile Development2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Mobile devices and mobile computing have made tremendous advances and become ubiquitous in the last few years. As a result, the landscape has become seriously fragmented which brings lots of challenges for the mobile development process. Whilst native approach of mobile development still is the predominant way to develop for a particular mobile platform, recently there is shifting towards cross-platform mobile development as well.

    In this thesis, a survey of the literature has been performed to see the trends in cross-platform mobile development over the last few years. With the result of the survey, it is argued that the web-based approach and in particular, hybrid approach, of mobile development serves the best for cross-platform development. Using the hybrid approach, a prototype application has also been developed and built into native application for different platforms. This has helped to get a better insight about the domain of cross-platform mobile development and its main advantage of the unification of the development and testing process.

    The results of this work indicate that even though cross platform tools are not fully matured they show great potential and reduce the cost associated in developing native mobile applications. Cross-platform mobile development is equally suitable for rapid development of high-fidelity prototypes of the mobile application as well as fairly complex, resource intensive mobile applications on its own right. As the upcoming future trends and the evolution of HTML5 continues to redefine the web, allowing its growth as a software platform, there remains great opportunities for cross-platform mobile development and hence provides an attractive alternative for the native mobile development.

  • 17.
    Amatya, Suyesh
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-Platform Mobile Development: Challenges and Opportunities2013In: ICT Innovations 2013: ICT Innovations and Education / [ed] Vladimir Trajkovik and Misev Anastas, Springer, 2013, 1, 219-229 p.Chapter in book (Refereed)
    Abstract [en]

    Mobile devices and mobile computing have made tremendous advances and become ubiquitous in the last few years. As a result, the landscape has become seriously fragmented which brings lots of challenges for the mobile development process. Whilst native approach of mobile development still is the predominant way to develop for a particular mobile platform, recently there is shifting towards cross-platform mobile development as well. In this paper, we have performed a survey of the literature to see the trends in cross-platform mobile development over the last few years. With the result of the survey, we argue that the web-based approach and in particular,hybrid approach, of mobile development serves the best for cross-platform development. The results of this work indicate that even though cross platform tools are not fully matured they show great potential. Thus we consider that cross-platform development offers great opportunities for rapid development of high-fidelity prototypes of the mobile application.

  • 18.
    Andersson, Jesper
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Caporuscio, Mauro
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Aligning Architectures for Sustainability2016In: ACM Proccedings of the 10th European Conference on Software Architecture Workshops (ECSA-W) / [ed] Rami Bahsoon and Rainer Weinreich, ACM Press, 2016, 13Conference paper (Refereed)
    Abstract [en]

    The digitization of industry has drastically changed the competitive landscape by requiring a higher degree of specialization and shorter time to delivery that affect the design properties a software platform should satisfy. The platform architecture must sustain continuous and rapid change to the organizational architecture, which in turn is affected by external forces: i.e., forces drive the velocity of change. In this paper, we explore the effects of digitization, characterizing internal and external forces that impact on business strategies and trigger the continuous realignment of the platform, and outline a research agenda to mitigate the effects.

  • 19.
    Andersson, Jessica
    et al.
    Gothenburg Univ, Sweden.
    Larsson, Sofia
    Gothenburg Univ, Sweden.
    Ericsson, Morgan
    Gothenburg Univ, Sweden.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science. Linnaeus Univ, Vaxjo, Sweden..
    A Study of Demand-Driven Documentation in Two Open Source Projects2015In: 2015 48th Hawaii International Conference on System Sciences (HICSS), 2015, 5271-5279 p.Conference paper (Refereed)
    Abstract [en]

    We investigate how demand-driven documentation is used by open source projects. Our study relies on questions and answers (i.e., demand-driven documentation) posted to Stack Overflow and focuses on two projects: Apache POI and Fennec (Firefox for Android). We find that the demand-driven documentation provided by respective community is of good quality and contributions are made within an acceptable amount of time. We conclude that demand-driven documentation can be suitable as a primary information source if other resources accompany it, e.g., websites. However, the suitability is closely related to size and activity of the project's community. We also investigate whether the type of project (e.g., API, application, product, etc.) matters, and find that given the nature of a forum, projects where the intended users are developers have larger and more active communities and are thus better suited for demand-driven documentation.

  • 20.
    Andersson, Jessica
    et al.
    Chalmers University of Technology.
    Larsson, Sofia
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Quality of Demand-Driven Documentation2014In: Proceedings of the 37th Information Systems Research Seminar in Scandinavia / [ed] Ahmad Ghazawneh, Jacob Nørbjerg and Jan Pries-Heje, 2014Conference paper (Refereed)
    Abstract [en]

    In this case study we investigate how demand-driven documentation can be used in open source projects. The study relied on questions and answers (demand-driven documenta- tion) posted on Stack Overflow and studied two open source projects, Apache POI and Firefox for Android, in depth. We found that the demand driven documentation provided by the respec- tive community is in general of good quality and contributed within an acceptable amount of time. We conclude that demand driven documentation can be suitable as a primary information source if other resources accompany it. However, the suitability is closely related to the size and activity of the project’s community. 

  • 21.
    Andersson, Pär
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nylund, Robin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bring Your Own Device i kommun- och landstingsnätverk: En undersökning om dess utbredd2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    An ongoing question which have been brought into consideration lately is whether employees should be given the permission to bring their own devices to their jobs or not. The numbers of people using smartphones and laptops have been growing and with that, the will to make use of those devices at work. That phenomenon is called Bring Your Own Device and the implementation of it can cause network security related problems. This essay was written with the intentions to find out how many of the municipalities and counties that have allowed people to bring their own devices. The intentions was also to investigate which security actions that have been taken into consideration when securing the rest of the network from the brought devices. This was performed by sending out a survey. The result that the survey gave proves that BYOD have often been taking into consideration among the organizations. It also proves that many have chosen to not implement the phenomenon because of reasons like problem with the security, the costs, and the lack of resources. An overrepresented majority of the organizations who have chosen to implement it have decided to have the private devices in a separate network to secure the rest of the network infrastructure.

  • 22.
    Andersson, Rikard
    et al.
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mining Relations from Git Commit Messages: an Experience Report2014In: Proceedings of the Fifth Swedish Language Technology Conference, 2014Conference paper (Refereed)
  • 23.
    Andersson, Tobias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hedlund, Victor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kommunikationslösningar i molnet: Examensarbete angående olika nätverkslösningar i WAN2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    To connect networks across geographically diverse sites has become increasingly common in todays society. This report will highlight the various WAN solutions to make this possible. The different solutions that will be highlighted in this report is rent own fiber , Layer 2 link, MPLS , and VPN. There will be comparisons between these solutions in terms of cost, safety , speed and reliability. This has been done with scientific articles and interviews , but the report also includes a practical laboration.

  • 24.
    Anton, Andersson
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Runbert, Johan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-platform Mobile Development and Internet of Things: Developing a cross-platform mobile application using web technologies to interact with smart things2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today more and more objects in our daily lives are getting connected to the Internet. This phenomenon is called the Internet of Things and is a way for physical things such as cars, buildings or even bus stations to get access and communicate with other objects using the Internet. The problem is that for every Internet of Things device, an application is often needed in order to communicate with these devices. Developing mobile applications in a separate programming language for each operating system can be an expensive and time consuming task.

    In this thesis, we implement and evaluate a cross-platform mobile solution for users to interact with smart things using the advantages of web technologies. To compare previous findings in this area, two literature reviews has been performed to find out which is the state of the art on cross-platform mobile development frameworks and smart-things technologies used for interacting with physical objects. The result is a mobile application developed using PhoneGap and jQuery Mobile that interacts with iBeacons, where students inside a university building can get directions and schedules for different rooms.

    The application received good results from a couple of usability studies, and performed well when measuring its performance. The outcome shows that web technologies that exist today are a viable solution to native mobile applications in terms of interacting with smart things such as tagging technologies.

  • 25.
    Anton, Mösenbacher
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Develop Mobile Hybrid Application with Ionic and Angular.js: Suitable for further development?2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report presents a proof-of-concept regarding hybrid mobile application development and mobile phones. Regarding the background of a desire to simplify and modernize of how hot work is carried out in in industry. A conclusion on future developments regarding a hybrid or native options will also be deducted. Keywords: native, hybrid, mobile application, future development, Agile, Scrum.

  • 26.
    Arvidsson, Martin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Granskning av regeringens digitaliseringsstrategi: - programmering i grundskolan, vilka problem finns?2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den Svenska skolan ska digitaliseras och en strategi för hur digitaliseringen kan ske skulle tas fram av Skolverket. Flertalet lärare lyfte fram problem med förslaget som presenterades av Skolverket men inga större förändringar genomfördes. Strategin ska börja gälla, men problemen kvarstår. Vilka problem ser existerande lärare inom Teknik samt Matematik med strategin, hur kan dessa åtgärdas för att underlätta för de berörda lärarna? En undersökning skickades ut till lärare runt om i Sverige med målet att kartlägga vilka problem som lärarna såg med strategin, var det samma problem som hördes i medierna? De flesta lärare ansåg att det kommer bli en kompetensbrist, samt att det kommer bli väldigt tungt belastade scheman. De slutsatser som kan dras av studien är att någon form av kompetensutveckling inom de verktyg som lärarna ska använda sig av för att lära ut programmering krävs. Samt att ett stort ansvar även hamnar på skolans kommun, att resurserna som krävs måste hinnas tillföras.

  • 27.
    Asparuhov, Lachezar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    BYOD - Risks, Solutions and Guidelines2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.

  • 28.
    Aspernäs, Andreas
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nensén, Mattias
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Container Hosts as Virtual Machines: A performance study2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Virtualization is a technique used to abstract the operating system from the hardware. The primary gains of virtualization is increased server consolidation, leading to greater hardware utilization and infrastructure manageability. Another technology that can be used to achieve similar goals is containerization. Containerization is an operating-system level virtualization technique which allows applications to run in partial isolation on the same hardware. Containerized applications share the same Linux kernel but run in packaged containers which includes just enough binaries and libraries for the application to function. In recent years it has become more common to see hardware virtualization beneath the container host operating systems. An upcoming technology to further this development is VMware’s vSphere Integrated Containers which aims to integrate management of Linux Containers with the vSphere (a hardware virtualization platform by VMware) management interface. With these technologies as background we set out to measure the impact of hardware virtualization on Linux Container performance by running a suite of macro-benchmarks on a LAMP-application stack. We perform the macro-benchmarks on three different operating systems (CentOS, CoreOS and Photon OS) in order to see if the choice of container host affects the performance. Our results show a decrease in performance when comparing a hardware virtualized container host to a container hosts running directly on the hardware. However, the impact on containerized application performance can vary depending on the actual application, the choice of operating system and even the type of operation performed. It is therefore important to consider these three items before implementing container hosts as virtual machines.

  • 29.
    Aspernäs, Andreas
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Simonsson, Thommy
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    IDS on Raspberry Pi: A Performance Evaluation2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to  handle network traffic while acting as an intrusion detection system. To examine this a testing environment was set up containing two workstation computers connected to a Raspberry Pi, each computer hosting a virtual machine. Tests measuring the network throughput as well as the CPU and memory usage were performed on each of the Raspberry Pi devices. Two models of Raspberry Pis were used; Raspberry Pi model B+ and Raspberry Pi 2 model B; each of them running the operating system Arch Linux ARM. The results of these tests were that both of the Raspberry Pis could be used as an intrusion detection system but has some limitations that could impede usage depending on the requirements of the user. Raspberry Pi 2 model B show benefits of its updated hardware by suffering lower throughput degradation than Raspberry Pi model B+, while using less of it's total CPU and memory capacity.

  • 30.
    Aster, Maximilian
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Repackaging Web Pages2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Current trends in the market of Web-enabled devices are moving the focus from desktop web pages to pages optimised for a set of other devices like smartphones or tablets. Within this thesis an approach is introduced, able to adapt and automatically transform web pages and even the web applications logic flow into a new kind of representation, specifically for a certain target group. Therefore a general process is defined to describe the various phases that have to be gone through to transform or repackage a website. It serves as the basis for the solution, which was built as part of this thesis, and incorporates state of the art concepts and methods from various fields of Web Science. The implemented artefacts demonstrate how an appropriate architecture looks like and what additional possibilities open up.

  • 31.
    Ata-Ul-Nasar, Mansoor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Modeling Intel® Cilk™ Plus Programs with Unified Modeling Languages2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Recently multi-core processors have become very popular in computer systems. It allows multiple threads to be executed simultaneously. The advantage of multi-core comes by parallelizing codes to expand the work across hardware. Furthermore, this can be done by using a parallel environment developed by M.I.T. called Intel Cilk Plus, which is design to provide an easy and well-structured parallel programming approach.

         Intel Cilk Plus is an extension of C and C++ programming languages that describes data parallelism. This extension is very helpful and easy to use among other languages in this field. It has different features including keywords, reducers and array notations etc. In general, this article describes Intel Cilk Plus and its features. In addition, Unified Modelling Language, activity diagrams are used in term of graphical modelling of Intel Cilk Plus by describing the process of a system, capturing the dynamic behaviour of it and representing the flow from one activity to another using control flow. Later on Intel Cilk Plus keywords and UML diagrams tools will be evaluated, a comparison of different UML modelling tools will also be provided.

  • 32.
    Axelsson, Jakob
    et al.
    Swedish Inst Comp Sci, Kista, Sweden ; Mälardalen Univ.
    Papatheocharous, Efi
    Swedish Inst Comp Sci, Kista.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Characteristics of software ecosystems for Federated Embedded Systems: A case study2014In: Information and Software Technology, ISSN 0950-5849, Vol. 56, no 11, 1457-1475 p.Article in journal (Refereed)
    Abstract [en]

    Context: Traditionally, Embedded Systems (ES) are tightly linked to physical products, and closed both for communication to the surrounding world and to additions or modifications by third parties. New technical solutions are however emerging that allow addition of plug-in software, as well as external communication for both software installation and data exchange. These mechanisms in combination will allow for the construction of Federated Embedded Systems (FES). Expected benefits include the possibility of third-party actors developing add-on functionality; a shorter time to market for new functions; and the ability to upgrade existing products in the field. This will however require not only new technical solutions, but also a transformation of the software ecosystems for ES. Objective: This paper aims at providing an initial characterization of the mechanisms that need to be present to make a FES ecosystem successful. This includes identification of the actors, the possible business models, the effects on product development processes, methods and tools, as well as on the product architecture. Method: The research was carried out as an explorative case study based on interviews with 15 senior staff members at 9 companies related to ES that represent different roles in a future ecosystem for FES. The interview data was analyzed and the findings were mapped according to the Business Model Canvas (BMC). Results: The findings from the study describe the main characteristics of a FES ecosystem, and identify the challenges for future research and practice. Conclusions: The case study indicates that new actors exist in the FES ecosystem compared to a traditional supply chain, and that their roles and relations are redefined. The business models include new revenue streams and services, but also create the need for trade-offs between, e.g., openness and dependability in the architecture, as well as new ways of working. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.orgilicensesiby/3.0/).

  • 33.
    Baan, Willem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science. ASTRON, NL-7990 AA Dwingeloo, Netherlands ; Shanghai Astron Observ, Shanghai 23000, Peoples R China.
    Loenen, A. F.
    ASTRON, NL-7990 AA Dwingeloo, Netherlands ; Kapteyn Astron Inst, NL-9700 AV Groningen, Netherlands.
    Spaans, M.
    Kapteyn Astron Inst, NL-9700 AV Groningen, Netherlands.
    Multimolecular studies of Galactic star-forming regions2014In: Monthly notices of the Royal Astronomical Society, ISSN 0035-8711, E-ISSN 1365-2966, Vol. 445, no 4, 3331-3344 p.Article in journal (Refereed)
    Abstract [en]

    Molecular emission-line observations of isolated Galactic star-forming regions are used to model the physical properties of the molecular interstellar medium in these systems. Observed line ratios are compared with the results predicted by models that incorporate gas-phase chemistry and the heating by stellar radiation and non-radiative feedback processes. The line ratios of characteristic tracer molecules may be interpreted using the contributions of two distinct components: a cold (40-50 K) and high-density (105-105.5 cm(-3)) photon-dominated region (PDR) with a nominal UV flux density and a warm (similar to 300 K) mechanical heating-dominated region (MHDR) with a slightly lower density (10(4.5)-10(5) cm(-3)). The relative contributions of these structural components are used to model the observed line ratios. Ionized species may be better modelled by adopting an increase of the cosmic ray flux towards the Galactic Centre and the sulphur abundance should depleted by a factor of 200-400 relative to solar values. The line ratios of the Galactic sample are found to be very similar to those of the integrated signature of prominent (ultra) luminous IR Galaxies. The PDRs and MHDRs in the isolated Galactic regions may be modelled with slightly higher mean densities than in extragalactic systems and a higher MHDR temperature resulting from non-radiative mechanical heating. Multimolecular studies are effective in determining the physical and chemical properties of star formation regions by using characteristic line ratios to diagnose their environment. The addition of more molecular species will reduce the existing modelling redundancy.

  • 34.
    Bagheri, Maryam
    et al.
    Sharif University Of Technology, Iran.
    Akkaya, Ilge
    University of California at Berkeley, USA.
    Khamespanah, Ehsan
    University of Tehran, Iran ; Reykjavik University, Iceland.
    Khakpour, Narges
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Sirjani, Marjan
    Reykjavik University, Iceland ; Mälardalen University.
    Movaghar, Ali
    Sharif University Of Technology, Iran.
    Lee, Edward A.
    University of California at Berkeley, USA.
    Coordinated actors for reliable self-adaptive systems2017In: FACS 2016 : Formal Aspects of Component Software: International Workshop on Formal Aspects of Component Software, Springer, 2017, 241-259 p.Conference paper (Refereed)
    Abstract [en]

    Self-adaptive systems are systems that automatically adapt in response to environmental and internal changes, such as possible failures and variations in resource availability. Such systems are often realized by a MAPE-K feedback loop, where Monitor, Analyze, Plan and Execute components have access to a runtime model of the system and environment which is kept in the Knowledge component. In order to provide guarantees on the correctness of a self-adaptive system at runtime, the MAPE-K feedback loop needs to be extended with assurance techniques. To address this issue, we propose a coordinated actor-based approach to build a reusable and scalable model@runtime for self-adaptive systems in the domain of track-based traffic control systems. We demonstrate the approach by implementing an automated Air Traffic Control system (ATC) using Ptolemy tool.We compare different adaptation policies on the ATC model based on performance metrics and analyze combination of policies in different configurations of the model. We enriched our framework with runtime performance analysis such that for any unexpected change, subsequent behavior of the model is predicted and results are used for adaptation at the change-point. Moreover, the developed framework enables checking safety properties at runtime. © Springer International Publishing AG 2017.

  • 35.
    Batangouna, Steve Jehu
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Effektiv presentation av information inom underhållsarbete2014Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den här studien har granskat och analyserat på vilka sätt information kan rapporteras direkt från operatören, med hjälp av handdatorer, till underhållspersonalen och produktionschefen utan att fördröjas. Studien har genomförts med tanke på att, i dagsläget, finns det en del viktig information som inte visualiseras och rapporteras inom företagen i tid och på ett bra sätt. Denna situation bidrar till att olika mätningar som genomförs inom företaget grundas på felaktiga informationer som inte är baserade på tidsaktuella och kvalitativa data, och inte baserad på analys av de verkliga aktiviteterna som sker på verksamhetsgolvet. I samband med användningen av Internet och introduktion av konceptet e-underhåll inom industrin, har operatörens roll ändrat från att vara passiv till att bli en aktiv aktör. Den här studien baserar på artiklar och böcker som först och främst handlar om IT, informationsteknologi och e-underhåll, men också på en fallstudie där observationer och intervjuer gjordes på plats på företaget CC Pack i Tibro. Studien har efter analys av det sätt på vilket informationen överförs idag inom företaget, kommit till ett nytt sätt att överföra och rapportera informationen mellan operatörerna, underhållspersonalen och produktionschefen. Detta betyder att informationen, med hjälp av det nya digitala formuläret som kommer att finnas i handdatorer, kommer att rapporteras i realtid när felen inträffar på maskinen. Detta kommer vidare att leda till att informationen ska medverka till att bestämma vilken maskin som ska prioriteras vid underhållsarbete. Det nya sättet att visualisera information med hjälp av handdatorer kommer därtill att minska beslutstid inom underhåll. Produktionschefen kommer att få in i systemet alla stopptider från maskiner i produktionen. E-underhåll är ett relativt nytt område som har flera fördelar men som företagen inte har hunnit utnyttja på ett bra sätt eftersom de resurser som finns inte används på ett effektivt sätt.

  • 36.
    Battiato, Sebastiano
    et al.
    Università di Catania.
    Coquillart, SabineInria/ZIRST.Laramee, Robert S.Swansea University.Kerren, AndreasLinnaeus University, Faculty of Technology, Department of Computer Science.Braz, JoséEscola Superior de Tecnologia do IPS.
    Computer Vision, Imaging and Computer Graphics - Theory and Applications: International Joint Conference, VISIGRAPP 2013, Barcelona, Spain, February 21-24, 2013, Revised Selected Papers2014Conference proceedings (editor) (Refereed)
  • 37.
    Battiato, Sebastiano
    et al.
    Università di Catania, Italy.
    Coquillart, SabineInria/ZIRST, France.Pettré, JulienINRIA-Rennes/MimeTIC Team, France.Laramee, Robert S.Swansea University, UK.Kerren, AndreasLinnaeus University, Faculty of Technology, Department of Computer Science.Braz, JoséEscola Superior de Tecnologia do IPS, Portugal.
    Computer Vision, Imaging and Computer Graphics - Theory and Applications: International Joint Conference, VISIGRAPP 2014, Lisbon, Portugal, January 5-8, 2014, Revised Selected Papers2015Collection (editor) (Refereed)
  • 38.
    Bengtsson, Andreas
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kindstrand, Johan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Persson, Stefan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bayesisk filtrering i syfte att motverka spam: En studie om bayesisk filtrering i olika programvaror2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Ett konstant problem med e-post är mängden skräppost som skickas dagligen och bidrar till en osäkerhet bland hemanvändare samt medför stora kostnader för företag. Att kunna skydda sig och filtrera bort skräppost är av stor vikt. Vad är egentligen skräppost?Programvaror mot skräppost använder flera metoder för att lösa problemet.Arbetet behandlar en av dessa metoder och hur effektivt den används i olika programvaror. Den metod som arbetet fokuserar på är bayesisk filtrering och programvarornas förmåga att utnyttja den. I studien kommer en analys huruvida Spamassassin och GFI MailEssentials utnyttjar bayesisk filtrering utföras. Tester kommer att genomföras med samma förutsättningar på de två programvarorna, det vill säga alla filter och skydd kommer att vara inaktiverade förrutom bayesisk filtrering. Testerna kommer att ge resultat som sedan analyseras där effektiviteten av filtret visar sig.

  • 39.
    Bergman, Johannes
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Torsson, Markus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Migrering till Linux för inbyggda system: En förstudie gjord på företag Low VisionInternational2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Användningen av Linux i inbyggda system fortsätter att öka för varje år.

    Öppen källkod och nya verktyg för utvecklandet av Linux för inbyggda

    system har inte bara gjort Linux till ett kostnadseffektivt val, utan även ett

    tidseffektivt val. Målet med den här undersökningen har varit att åt LVI

    undersöka en möjlig migration av operativsystem i deras inbäddade system

    från Windows XP Embedded till ett inbyggt Linuxbaserat operativsystem för

    ARM-processorer med stöd för OCR-behandling. Linux och öppen källkod

    till inbyggda system för med sig en hel del fördelar. Några av dessa

    inkluderar låg kostnad, full kontroll över ditt inbyggda system samt

    möjligheten att testa och utvärdera mjukvara helt gratis. För att komma fram

    till ett resultat har vi undersökt vilka alternativ som finns och om det finns

    stöd för de funktioner som LVI använder sig av. Resultatet av den här

    undersökningen är en redovisning av de val man står inför och vad som kan

    lämpa sig bäst för LVI. Vi har främst undersökt Yocto Project och Buildroot i

    denna undersökning och anser att Yocto Project är ett bra val för LVI. Två

    enklare applikationer har även skrivits där bildhantering och maskinläsning

    uppvisas. Applikationerna har utvecklats i C++ med hjälp av OpenCV och

    Tesseract-ocr.

  • 40.
    Bexell, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Comparing functional to imperative Java: with regards to readability, complexity and verbosity2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Java has recently become a multi paradigm language, with the functional paradigmnow made available alongside the traditional, imperative, one. Programming in thefunctional paradigm may be considered complicated or hard to read, and there maybe concerns that the code it produces may become hard to maintain because ofcomplexity or readability issues. On the other hand, proponents of the functionalparadigm promises smaller amounts of less complex code, as the framework takeson a larger responsibility. This Bachelor’s thesis closely examines the differences be-tween effectively equal code written in functional and imperative Java, respectively,from the aspects of readability, complexity and verbosity, and shows that while codewritten in the functional paradigm is smaller and less complex, it is not harder to read.

  • 41.
    Binder, Walter
    et al.
    University of Lugano .
    Bodden, EricTechnische Universität Darmstadt .Löwe, WelfLinnaeus University, Faculty of Technology, Department of Computer Science.
    Software Composition: 12th International Conference, SC 2013, Budapest, Hungary, June 19, 20132013Conference proceedings (editor) (Refereed)
  • 42.
    Blixt, Daniel
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nilsson, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Control systems on inexpensive hardware: Supporting Raspberry Pi in an existingdevelopment environment2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report aims to describe our bachelor degree projectin computer engineeringat Linnaeus university in Växjö. The project has been carried out on behalf of Danfoss whoapproached us with an interest in making it possible to use Raspberry Pi as an internal and external research platform, compatiblewith their development environment PLUS+1 GUIDE.We were therefore given the task to develop support for Raspberry Pi in PLUS+1 GUIDE. This would enable use of PLUS+1 GUIDE software without the use of Danfoss hardware. This report describes theimplementation of a Raspberry Pi support librarywhich had to be designed to be compatible with the PLUS+1 GUIDE software. It also describes the creation of acustomLinux distributionusing the YoctoProject, a comparison between existing solutionsand a usability test on thePLUS+1 GUIDEsoftware using the developedRaspberry Pi support library.The resultof this workis fully functioning support forRaspberry Pi packaged as a plugin that when installed in PLUS+1 GUIDE allows creation of applications for this platform in the same manner as fortheirother control systems.

  • 43.
    Borgo, Rita
    et al.
    Kings College London, UK.
    Lee, Bongshin
    Microsoft Research, USA.
    Bach, Benjamin
    Microsoft Research - Inria, France.
    Fabrikant, Sara
    University of Zurich, Switzerland.
    Jianu, Radu
    City University London, UK.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kobourov, Stephen
    University of Arizona, USA.
    McGee, Fintan
    Luxembourg Institute of Science and Technology, Luxembourg.
    Micallef, Luana
    Helsinki Institute for Information Technology, Finland.
    von Landesberger, Tatiana
    Darmstadt University, Germany.
    Ballweg, Katrin
    Darmstadt University, Germany.
    Diehl, Stephan
    University Trier, Germany.
    Simonetto, Paolo
    Swansea University, UK.
    Zhou, Michelle
    Juji, USA.
    Crowdsourcing for Information Visualization: Promises and Pitfalls2017In: Evaluation in the Crowd: Crowdsourcing and Human-Centered Experiments / [ed] Daniel Archambault, Helen Purchase, and Tobias Hoßfeld, Springer Publishing Company, 2017, 96-138 p.Chapter in book (Refereed)
    Abstract [en]

    Crowdsourcing offers great potential to overcome the limitations of controlled lab studies. To guide future designs of crowdsourcing-based studies for visualization, we review visualization research that has attempted to leverage crowdsourcing for empirical evaluations of visualizations. We discuss six core aspects for successful employment of crowdsourcing in empirical studies for visualization – participants, study design, study procedure, data, tasks, and metrics & measures. We then present four case studies, discussing potential mechanisms to overcome common pitfalls. This chapter will help the visualization community understand how to effectively and efficiently take advantage of the exciting potential crowdsourcing has to offer to support empirical visualization research.

  • 44. Braz, José
    et al.
    Kerren, AndreasLinnaeus University, Faculty of Technology, Department of Computer Science.Linsen, Lars
    Proceedings of the 6th International Conference on Information Visualization Theory and Applications, IVAPP 2015, Berlin, Germany, March 11-14, 20152015Conference proceedings (editor) (Refereed)
  • 45.
    Braz, José
    et al.
    Escola Superior de Tecnologia de Setúbal, Portugal.
    Laramee, Robert S.Swansea University, U.K..Kerren, AndreasLinnaeus University, Faculty of Technology, Department of Computer Science.
    Proceedings of the 5th International Conference on Information Visualization Theory and Applications, IVAPP 2014, Lisbon, Portugal, 5-8 January, 20142014Conference proceedings (editor) (Refereed)
  • 46.
    Braz, José
    et al.
    Escola Superior de Tecnologia do IPS, Portugal.
    Pettré, JulienINRIA-Rennes/MimeTIC Team, France.Richard, PaulUniversity of Angers, France.Kerren, AndreasLinnaeus University, Faculty of Technology, Department of Computer Science.Linsen, LarsJacobs University, Denmark.Battiato, SebastianoUniversità di Catania, Italy.Imai, FranciscoCanon U.S.A. Inc, USA.
    Computer Vision, Imaging and Computer Graphics - Theory and Applications: International Joint Conference, VISIGRAPP 2015, Berlin, Germany, March 11-14, 2015, Revised Selected Papers2016Collection (editor) (Refereed)
  • 47.
    Bures, Tomas
    et al.
    Charles University Prague, Czech Republic.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science. Katholieke Universiteit Leuven, The Netherlands.
    Berger, Christisian
    Gothenburg University.
    Biffl, Stefan
    Technical University Vienna, Austria.
    Daun, Marian
    Universität Duisburg-Essen, Germany.
    Gabor, Thomas
    LMU München, Germany.
    Garlan, David
    Carnegie Mellon University, USA.
    Gerostathopoulos, Ilias
    Charles University Prague, Czech Republic.
    Julien, Christine
    University of Texas, USA.
    Krikava, Filip
    Czech Technical University, Czech Republic.
    Pronios, Nikos
    Innovate, UK.
    Software Engineering for Smart Cyber-Physical Systems - Towards a Research Agenda: Report on the First International Workshop on Software Engineering for Smart CPS2015In: Software Engineering Notes: an Informal Newsletter of The Specia, ISSN 0163-5948, E-ISSN 1943-5843, Vol. 40, no 6, 28-32 p.Article in journal (Other academic)
    Abstract [en]

    Cyber-Physical Systems (CPS) are large interconnected softwareintensivesystems that influence, by sensing and actuating, thephysical world. Examples are traffic management and power grids.One of the trends we observe is the need to endow such systemswith the “smart” capabilities, typically in the form of selfawarenessand self-adaptation, along with the traditional qualitiesof safety and dependability. These requirements combined withspecifics of the domain of smart CPS – such as large scale, the roleof end-users, uncertainty, and open-endedness – render traditionalsoftware engineering (SE) techniques not directly applicable; makingsystematic SE of smart CPS a challenging task. This paperreports on the results of the First International Workshop on SoftwareEngineering of Smart Cyber-Physical Systems (SEsCPS2015), where participants discussed characteristics, challenges andopportunities of SE for smart CPS, with the aim to outline anagenda for future research in this important area.

  • 48.
    Bures, Tomás
    et al.
    Charles University Prague, Czech Republic.
    Weyns, DannyLinnaeus University, Faculty of Technology, Department of Computer Science.Klein, MarkSEI, Carnegie Mellon University, USA.Haber, Rodolfo ESpanish Council for Scientific Research, Spain.
    7th IEEE International Conference on  Software Engineering (ICSE), 2015 IEEE/ACM 3 (Volume:2 )2015Conference proceedings (editor) (Refereed)
    Abstract [en]

    Cyber-physical system (CPS) have been recognized as a top-priority in research and development. The innovations sought for CPS demand them to deal effectively with dynamicity of their environment, to be scalable, adaptive, tolerant to threats, etc. -- i.e. they have to be smart. Although approaches insoftware engineering (SE) exist that individually meet these demands, their synergy to address the challenges of smart CPS (sCPS) in a holistic manner remains an open challenge. The workshop focuses on software engineering challenges for sCPS. The goals are to increase the understanding of problems of SE for sCPS, study foundational principles for engineering sCPS, and identify promising SE solutions for sCPS. Based on these goals, the workshop aims to formulate a research agenda for SE of sCPS.

  • 49.
    Bytyçi, Eliot
    et al.
    University of Prishtina, Kosovo.
    Ahmedi, Lule
    University of Prishtina, Kosovo.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of Computer Science. Interactive Institute Swedish ICT.
    Association Rule Mining with Context Ontologies: An Application to Mobile Sensing of Water Quality2016In: Metadata and Semantics Research: 10th International Conference, MTSR 2016, Göttingen, Germany, November 22-25, 2016, Proceedings / [ed] Garoufallou, E., Subirats Coll, I., Stellato, A., Greenberg, J, Cham: Springer, 2016, 67-78 p.Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) applications by means of wireless sensor networks (WSN) produce large amounts of raw data. These data might formally be defined by following a semantic IoT model that covers data, meta-data, as well as their relations, or might simply be stored in a database without any formal specification. In both cases, using association rules as a data mining technique may result into inferring interesting relations between data and/or metadata. In this paper we argue that the context has not been used extensively for added value to the mining process. Therefore, we propose a different approach when it comes to association rule mining by enriching it with a context-aware ontology. The approach is demonstrated by hand of an application to WSNs for water quality monitoring. Initially, new ontology, its concepts and relationships are introduced to model water quality monitoring through mobile sensors. Consequently, the ontology is populated with quality data generated by sensors, and enriched afterwards with context. Finally, the evaluation results of our approach of including context ontology in the mining process are promising: new association rules have been derived, providing thus new knowledge not inferable when applying association rule mining simply over raw data.

  • 50.
    Cakir, Ece
    Linnaeus University, Faculty of Engineering and Technology, Department of Computer Science.
    Single Sign-On: Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Main concern of this thesis is to help design a secure and reliable network system which keeps growing in complexity due to the interfaces with multiple logging sub-systems and to ensure the safety of the network environment for everyone involved. The parties somewhat involved in network systems are always in need of developing new solutions to security problems and striving to have a secure access into a network so as to fulfil their job in safe computing environments. Implementation and use of SSO (Single Sign-On) offering secure and reliable network in complex systems has been specifically defined for the overall security aspects of enterprises.

    The information to be used within and out of organization was structured layer by layer according to the organizational needs to define the sub-systems. The users in the enterprise were defined according to their role based profiles. Structuring the information layer by layer was shown to improve the level of security by providing multiple authentication mechanisms. Before implementing SSO system necessary requirements are identified. Thereafter, user identity management and different authentication mechanisms were defined together with the network protocols and standards to insure a safe exchange of information within and outside the organization. A marketing research was conducted in line of the SSO solutions. Threat and risk analysis was conducted according to ISO/IEC 27003:2010 standard. The degree of threat and risk were evaluated by considering their consequences and possibilities. These evaluations were processed by risk treatments.

    MoDAF (Ministry of Defence Architecture Framework) used to show what kind of resources, applications and the other system related information are needed and exchanged in the network. In essence some suggestions were made concerning the ideas of implementing SSO solutions presented in the discussion and analysis chapter.

1234567 1 - 50 of 447
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf