lnu.sePublications
Change search
Refine search result
1234567 101 - 150 of 485
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Ebert, Achim
    et al.
    University of Kaiserslautern, Germany.
    Weber, Christopher
    University of Kaiserslautern, Germany.
    Cernea, Daniel
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Petsch, Sebastian
    University of Kaiserslautern, Germany.
    TangibleRings: Nestable Circular Tangibles2013In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, ACM Press, 2013, p. 1617-1622Conference paper (Refereed)
    Abstract [en]

    The multitouch functionality of tabletop computers is often augmented by the use of tangible objects that offer an intuitive and haptic alternative to interaction and manipulation. However, employing tangibles can also lead to less desirable effects, such as occlusion or lack of precision. In this paper we highlight the design and implementation of ring-like tangible objects: TangibleRings. They do not occlude the objects underneath them and also support the detection of touch events inside their perimeter. Additionally, multiple rings may be nested within one another in order to combine ring functionalities or produce more complex filters.

  • 102.
    El-Ahmad, Adham
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    A Study on the Relation between Software Quality & Test Quantity2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Testing is an essential phase of software development process. It helps to ensure the quality of the software by finding bugs, errors, and defects that may occur during the development or the deployment of the system. IT companies and field workers, spend a lot of efforts on testing a software. However, how far should testers go with testing? In this research, we study 80 open source real world projects, and explore how much testing code has been written in those projects, in comparison with production code. We also try to find if there is any relation between different project factors, such as: project size, number of contributors and the amount of testing that has been done in those projects. We also give some recommendations to help field workers determine the amount of testing needed for a software.

    Download full text (pdf)
    fulltext
  • 103.
    Eneman, Rasmus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Improving load time of SPAs: An evaluation of three performance techniques2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The code size of single page web applications are constantly growing which do have an negative effect on the load time. Previous research have shown that load time are important to users and that a slow application will lose potential customers even before it has loaded. In this paper three architecturally far-reaching techniques are measured to see how they can improve the load time and help to decide if an application should be built with one or more of the tested techniques which are HTTP2 push, Code Splitting and Isomorphism. The experiment shows that Isomorphism can provide a big improvement for the time to first paint and that Code Splitting can be a useful technique for large code bases on mobile phones.

    Download full text (pdf)
    fulltext
  • 104.
    Ericsson Fridlund, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    System för övervakning av pappersbanan i torkmaskin på pappersmassabruk: En JavaCV konstruktion2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this project, a surveillance system to a drying machine in a paper machine has been developed. The surveillance system shall prevent the paper in the machine from derailing its track. This happens quite frequently which result in a production stop. The surveillance system shall contain connection to cheap IP-cameras through a network, calculation methods that calculates which color is shown in the picture from the IP-camera and storage of the color value from calculation methods in a database. With the help of programming language Java and methods from the OpenCV library, a software client was created to solve the problems. The surveillance system was developed to a software client which connects to one web- or IP-cam. When the surveillance system is connected to the web- or IP-cam’s video stream, it is shown in picture from the software client. The software client contains picture and color manipulation methods which makes it possible to calculate how much white and black that are shown in the video. In the software client, it’s possible to choose in which area of the web- or IP-cam’s video the color value should be calculated. With the value of how much white and black which is shown in the picture it’s possible to determine if the paper's about to derail from its track in the drying machine. The value is updated every second by the methods and is shown continuously by a graph in picture from the software client. The software client also sends the value to a database every second where it is stored.

    Download full text (pdf)
    fulltext
  • 105.
    Ericsson, Morgan
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Olsson, Tobias
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Toll, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    A Study of the Effect of Data Normalization on Software and Information Quality Assessment2013In: Software Engineering Conference (APSEC, 2013 20th Asia-Pacific), IEEE Press, 2013, p. 55-60Conference paper (Refereed)
    Abstract [en]

    Indirect metrics in quality models define weighted integrations of direct metrics to provide higher-level quality indicators. This paper presents a case study that investigates to what degree quality models depend on statistical assumptions about the distribution of direct metrics values when these are integrated and aggregated. We vary the normalization used by the quality assessment efforts of three companies, while keeping quality models, metrics, metrics implementation and, hence, metrics values constant. We find that normalization has a considerable impact on the ranking of an artifact (such as a class). We also investigate how normalization affects the quality trend and find that normalizations have a considerable effect on quality trends. Based on these findings, we find it questionable to continue to aggregate different metrics in a quality model as we do today.

  • 106.
    Ericsson, Morgan
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Probabilistic Quality Models to Improve Communication and Actionability2015In: 2015 30th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), IEEE: IEEE Press, 2015, p. 1-4Conference paper (Refereed)
    Abstract [en]

    We need to aggregate metric values to make quality assessment actionable. However, due to properties of metric values, i.e., unknown distributions and different measurement scales, they are difficult to aggregate. We present and evaluate a method to aggregate metric values based on observed numerical distributions that are converted into cumulative density functions. We use these to determine the probability of each metric and file, and aggregate these. Our limited study suggests that the method improves correctness, communication, and the ability to take action. However, more evaluation is required.

  • 107.
    Ericsson, Morgan
    et al.
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Mining job ads to find what skills are sought after from an employers' perspective on IT graduates2014In: Proceedings of the 2014 conference on Innovation & technology in computer science education, ACM Publications, 2014, p. 354-354Conference paper (Refereed)
    Abstract [en]

    We mine job ads to discover what skills are required from an employers' perspective. Some obvious trends appear, such as skills related to web and mobile technology. We aim to uncover more detailed information as the study continues to allow course content to better match the expressed needs.

  • 108.
    Eriksson, Henry
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Arvidsson, Erik
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nerén, Jonas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Säkerhetsmedvetenhet: Hur studenter förhåller sig till säkerhet och lösenordshantering2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In todays society, passwords are a central part in the daily routine of the common man. The importance of a safe password and knowledge of what threats against information security exists, is an important part of an organization’s security. This work studied how students at the Linnaeus University handles their passwords and how aware they are of existing threats and attacks that can compromise the integrity of their password. A survey was done to collect data, and a program was created with the purpose of grading the users passwords and in an educational way teach them how to create a secure password. The results showed that students reuse their passwords frequently and that there are some differences between groups regarding their security awareness. Those who have received some sort of education concerning IT-security had greater knowledge about threats and attacks, and they also handled their passwords with a more secure manner.

    Download full text (pdf)
    fulltext
  • 109.
    Eriksson, Oskar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Implementing virtual analog synthesizers with the Web Audio API: An evaluation of the Web Audio API2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis in computer science aimed to evaluate the suitability of the Web Audio API to implement virtual analog synthesizers. In order to do so a method for producing a reference architecture for analog synthesizers and a categorization and point system for the evaluation were developed. A reference architecture were made and then implemented with the API and the evaluation were then made based on that implementation. The API were found to cover a lot of the necessary areas, but lacking in a few key components; a noise generator, a native way to automate custom numeric properties and the implementation of the oscillator were deemed too closed to support all use cases. 

    Download full text (pdf)
    fulltext
  • 110.
    Fallman, Therese
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Effektiv administration i WordPress: En studie med fokus på användbarhet och hur detta kan optimeras i ett administrationsgränssnitt2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Det stora informationsflödet på webben innebär att organisationer och företag behöver kunna nå ut med konkurrenskraftig information till sin målgrupp på ett effektivt sätt. Innehållshanteringssystem som till exempel WordPress är ett hjälpmedel för detta men det innebär även att administration kan komma att hanteras av oerfarna användare. Det här arbetet behandlar hur det går att anpassa administrationsgränssnittet i WordPress för att förbättra dess användbarhet. Arbetet redogör även för definitionen av användbarhet samt vilka metoder det finns för att verifera det. För att försöka besvara frågeställningarna har det, förutom en litteraturstudie, genomförts en kvalitativ undersökning som inkluderade observation och experiment. Resultatet påvisar att det finns modifierbara faktorer i WordPress administrationspanel, vilka genom optimering kan inbringa en högre användbarhet och bättre effektivitet för oerfarna användare. Empirin visar även att det är komplicerat att begränsa definitionen av användbarhet, vilket därför resulterar i svårigheter att dra konkreta slutsatser. 

    Download full text (pdf)
    fulltext
  • 111.
    Ferati, Mexhid
    et al.
    Oslo and Akershus University, Norway.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Interactive Institute Swedish ICT.
    Vogel, Bahtijar
    Malmö University.
    Raufi, Bujar
    South East European University, Macedonia.
    Augmenting requirements gathering for people with special needs using IoT: A position paper2016In: CHASE '16: Proceedings of the 9th International Workshop on Cooperative and Human Aspects of Software Engineering, ACM Press, 2016, p. 48-51Conference paper (Refereed)
    Abstract [en]

    Requirements gathering are an important aspect of application development, especially when users are people with special needs. Traditionally, this process is being conducted using conventional methods, such as interviews, workshops and questionnaires. These approaches, however, are unable to grasp the full context when collecting data from the communities of people with special needs, mainly because of the difficult access to participants and incomprehensiveness of the data gathered. To mitigate such issues, in this position paper, we argue that existing traditional methods could be complemented by means of Internet of Things. The immense amount of data gathered from various devices interconnected could help generate meaningful data that will complement the usually insufficient amount collected using traditional methods. This new approach is, however, associated with challenges that are discussed along with a possible scenario on how data complementing from traditional and the indirect method could be done. 

  • 112.
    Ferati, Mexhid
    et al.
    South East European University, Macedonia.
    Raufi, Bujar
    South East European University, Macedonia.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Vogel, Bahtijar
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Accessibility Requirements for Blind and Visually Impaired in a Regional Context: An Exploratory Study2014In: 2014 IEEE 2nd International Workshop on Usability and Accessibility focused Requirements Engineering (UsARE) / [ed] Shah Rukh Humayoun, Norbert Seyff, Nauman A. Qureshi, Anna Perini, Achim Ebert, David Callele, and Simone D. J. Barbosa, IEEE Press, 2014, p. 13-16Conference paper (Refereed)
    Abstract [en]

    At the time when we are debating the Internet as a human right, an access to basic online information is a challenge for blind and visually impaired community. Steps taken for their digital inclusion, such as, the Web Content Accessibility Guidelines (WCAG) are often insufficient. In this paper we present initial requirements gathered during three workshops organized with various stakeholders coming from three different countries. Initial results suggest that the context of use and the cultural dimension play a crucial role in making digital content accessible for this community. Additionally, a one-solution-fits-all model is inadequate without considering levels of visual impairment when providing customized web and mobile experience. Finally, we lay out challenges that with comprehensive requirements gathering in the future, could address various problems that blind and visually impaired face.

  • 113.
    Ferati, Mexhid
    et al.
    Oslo and Akershus University College of Applied Sciences, Norway.
    Vogel, Bahtijar
    Malmö University.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Interactive Institute Swedish ICT.
    Raufi, Bujar
    South East European University, Macedonia.
    Astals, David Salvador
    Universitat Autònoma de Barcelona, Spain.
    Web Accessibility for Visually Impaired People: Requirements and Design Issues2016In: Usability- and Accessibility-Focused Requirements Engineering: First International Workshop, UsARE 2012, Held in Conjunction with ICSE 2012, Zurich, Switzerland, June 4, 2012 and Second International Workshop, UsARE 2014, Held in Conjunction with RE 2014, Karlskrona, Sweden, August 25, 2014, Revised Selected Papers / [ed] Ebert, Achim; Humayoun, Rukh Shah; Seyff, Norbert; Perini, Anna; Barbosa, D.J. Simone, Cham: Springer, 2016, p. 79-96Chapter in book (Refereed)
    Abstract [en]

    Access to web content continues to be a challenge for the visually impaired, as the needs of such community are very diverse. The access is further hindered by the fact that designers continue to build websites non-compliant with Web Content Accessibility Guidelines (WCAG). To better understand the needs of the visually impaired community, three workshops were organized with various stakeholders coming from three different countries. The results from the workshops suggest that one-solution-fits-all model is inadequate without considering the levels of visual impairment when providing customized web experience. A set of requirements devised from the workshops guided the process of building a middleware prototype. Using eight adaptation techniques, the prototype provides the required user experience based on users level of visual impairment. Preliminary evaluation of the middleware suggests that several adaptation techniques perform better with non-WCAG compliant websites compared to those being compliant.

  • 114. Filieri, Antonio
    et al.
    Maggio, Martina
    Angelopoulos, Konstantinos
    D'Ippolito, Nicolás
    Gerostathopoulos, Ilias
    Berndt Hempel, Andreas
    Hoffmann, Henry
    Jamshidi, Pooyan
    Kalyvianaki, Evangelia
    Klein, Cristian
    Krikava, Filip
    Misailovic, Sasa
    Papadopoulos, Alessandro Vittorio
    Ray, Suprio
    Sharifloo, Amir M.
    Shevtsov, Stepan
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Ujma, Mateusz
    Vogel, Thomas
    Software engineering meets control theory2015In: Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Piscataway, NJ, USA: IEEE Press, 2015, p. 71-82Conference paper (Refereed)
    Abstract [en]

    The software engineering community has proposed numerous approaches for making software self-adaptive. These approaches take inspiration from machine learning and control theory, constructing software that monitors and modifies its own behavior to meet goals. Control theory, in particular, has received considerable attention as it represents a general methodology for creating adaptive systems. Control-theoretical software implementations, however, tend to be ad hoc. While such solutions often work in practice, it is difficult to understand and reason about the desired properties and behavior of the resulting adaptive software and its controller.

    This paper discusses a control design process for software systems which enables automatic analysis and synthesis of a controller that is guaranteed to have the desired properties and behavior. The paper documents the process and illustrates its use in an example that walks through all necessary steps for self-adaptive controller synthesis.

  • 115.
    Filieri, Antonio
    et al.
    Imperial College London, UK.
    Maggio, Martina
    Lund University.
    Angelopoulos, Konstantinos
    University of Brighton , UK.
    D'Ippolito, Nicolás Roque
    Universidad de Buenos Aires, Argentina Author.
    Gerostathopoulos, Ilias Th
    Technical University of Munich, Faculty of Informatics, Germany .
    Hempel, Andreas Berndt
    Hoffmann, Henry C.
    University of Chicago, United States.
    Jamshidi, Pooyan
    Carnegie Mellon University, United States .
    Kalyvianaki, Evangelia
    University of London, UK.
    Klein, Cristian
    Umeå University.
    Křikava, Filip
    Ceske vysoke uceni technicke v Praze, Czech .
    Misailović, Saša
    Papadopoulos, Alessandro Vittorio
    Mälardalens Högskola.
    Ray, Suprio
    University of New Brunswick, Canada .
    Molzam Sharifloo, Amir
    Universitat Duisburg-Essen, Germany .
    Shevtsov, Stepan
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Ujma, Mateusz
    University of Oxford, UK.
    Vogel, Thomas
    Hasso-Plattner-Institut fur Softwaresystemtechnik, Germany.
    Control strategies for self-adaptive software systems2017In: ACM Transactions on Autonomous and Adaptive Systems, ISSN 1556-4665, E-ISSN 1556-4703, Vol. 11, no 4, article id 24Article, review/survey (Refereed)
    Abstract [en]

    The pervasiveness and growing complexity of software systems are challenging software engineering to design systems that can adapt their behavior to withstand unpredictable, uncertain, and continuously changing execution environments. Control theoretical adaptation mechanisms have received growing interest from the software engineering community in the last few years for their mathematical grounding, allowing formal guarantees on the behavior of the controlled systems. However, most of these mechanisms are tailored to specific applications and can hardly be generalized into broadly applicable software design and development processes. This article discusses a reference control design process, from goal identification to the verification and validation of the controlled system. A taxonomy of the main control strategies is introduced, analyzing their applicability to software adaptation for both functional and nonfunctional goals. A brief extract on how to deal with uncertainty complements the discussion. Finally, the article highlights a set of open challenges, both for the software engineering and the control theory research communities.

  • 116.
    Fogelström, Linus Fogelström
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Broman, Ludwig
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Prestandapåverkan med diskkryptering2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    To protect data against offline-attacks and theft, which might be desirable, one can encrypt the filesystem. This study is a performance test of the three different encryption programs BestCrypt, BitLocker and DiskCryptor. Results of the study aims to give a pointer to which encryption program one should choose. This was clear when the tests showed that the encryption affected the response of the services Apache and Filezilla and that they were affected differently depending on which encryption program that was used.

    Download full text (pdf)
    fulltext
  • 117.
    Forsgren, Robert
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Petersson Vasquez, Erik
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    REGTEST - an Automatic & Adaptive GUI Regression Testing Tool.2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Software testing is something that is very common and is done to increase the quality of and confidence in a software. In this report, an idea is proposed to create a software for GUI regression testing which uses image recognition to perform steps from test cases. The problem that exists with such a solution is that if a GUI has had changes made to it, then many test cases might break. For this reason, REGTEST was created which is a GUI regression testing tool that is able to handle one type of change that has been made to the GUI component, such as a change in color, shape, location or text. This type of solution is interesting because setting up tests with such a tool can be very fast and easy, but one previously big drawback of using image recognition for GUI testing is that it has not been able to handle changes well. It can be compared to tools that use IDs to perform a test where the actual visualization of a GUI component does not matter; It only matters that the ID stays the same; however, when using such tools, it either requires underlying knowledge of the GUI component naming conventions or the use of tools which automatically constructs XPath queries for the components. To verify that REGTEST can work as well as existing tools a comparison was made against two professional tools called Ranorex and Kantu. In those tests, REGTEST proved very successful and performed close to, or better than the other software.

    Download full text (pdf)
    fulltext
  • 118.
    Fransson, Emma
    Linnaeus University, Faculty of Technology, Department of Physics and Electrical Engineering. Linnaeus University, Faculty of Technology, Department of Computer Science.
    High energy gamma ray emission and multi-wavelength view of the AGN PKS 0537-4412017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis describes the analysis of Very High Energy (VHE) emission from the Active Galactic Nucleus PKS 0537-441. It also aims to put the results in a wider context by implementing previous work done on this source. The data chosen for the analysis is provided by the Fermi-LAT satellite and covers the energy range between 300 MeV and 300 GeV. Initially a lightcurve of the received flux from the source was generated, containing data from August 2008 to April 2017, with a mean flux of 4∗10−8 photons per second per squared centimeter. The lightcurve contained sections of different flux intensities giving periods of special interest, such as a flaring period at August 2008 to August 2011, an enormous flare at April 2010 and a less active period between April 2013 - January 2016 that could be identified for further investigations. The differences in observed flux over time was tested and PKS 0537-441 was found to be a significantly variable source. Spectral Energy Distribution (SED) analysis was performed over both the entire period as well as over the selected subperiods and fitted against models using the tools provided by the Fermi Science Support Center (FSSC). The models used in the fitting was PowerLaw2, LogParabola and PLSuperExpCutoff and the best fit for the data was obtained from the PLSuperExpCutoff, except for the less intense period where the LogParabola gave the best fit. The result from the SED analysis was integrated with results from previous work done on the source, ranging over multiple wavelengths in order to get a SED which spanned over the entire electromagnetic spectrum. Finally, modeling of this multi wavelength SED was performed in order to obtain parameters for the physical processes involved in the creation of the radiation received from PKS 0537-441.

    Download full text (pdf)
    fulltext
  • 119.
    Fransson, Rebecca
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Driaguine, Alexandre
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Comparing Progressive Web Applications with Native Android Applications: An evaluation of performance when it comes to response time2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Web applications are often described as being cross-platform. They are accessible from a multitude of different web browsers, which in turn are running on a multitude of different operating systems. For a time now, developers have used many different tools to create cross-platform applications for mobile devices with web technologies. However, these applications fail to deliver when taken out of their native environment, and often do not feel native at all. Enter Progressive Web Applications, PWA. PWA’s are applications written for the web with web technologies, running in a browser,  but seasoned with some techniques that can make them behave like a native application when running on a mobile device. They are just ordinary web applications with native behaviour such as offline support, installability, and push notifications. The question that arises is - can this new type of web applications match Native Android Applications in performance, especially the response time when accessing the device's hardware? This report will try to answer that question

    Download full text (pdf)
    fulltext
  • 120.
    Färlind, Filip
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Ottosson, Kim
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Servervirtualisering idag: En undersökning om servervirtualisering hos offentliga verksamheter i Sverige2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    At present, there’s no summary of how server virtualization is implemented and how it works in different companies in Sweden. This work will therefore, through a survey, try to answer the question: "How is server virtualization implemented by municipality and county councils in Sweden?" Our results show that server virtualization is well implemented by municipality and county councils in Sweden. The results are also very similar between these organizations. Finalized work provides different types of companies support in planning and implementation of server virtualization.

    Download full text (pdf)
    fulltext
  • 121.
    Galster, Matthias
    et al.
    Univ Canterbury, Canterbury, New Zealand.
    Avgeriou, Paris
    Univ Groningen, NL-9700 AB Groningen, Netherlands.
    Mannisto, Tomi
    Univ Helsinki, FIN-00014 Helsinki, Finland.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Variability in software architecture: State of the art2014In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 91, p. 1-2Article in journal (Other academic)
  • 122.
    Galster, Matthias
    et al.
    University of Canterbury, New Zealand.
    Männistö, Tomi
    Helsinki University, Finland.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Avgeriou, Paris
    Groningen University, The Netherlands.
    Variability in software architecture: the road ahead2014In: Software Engineering Notes: an Informal Newsletter of The Specia, ISSN 0163-5948, E-ISSN 1943-5843, Vol. 39, no 4, p. 33-34Article in journal (Other academic)
    Abstract [en]

    Variability in a software system is reflected in and facilitated through the architecture of that system. The Third International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the 11th Working IEEE/IFIP Conference on Software Architecture 2014 in Sydney, Australia. Based on the findings from previous editions of VARSA, this edition aimed at exploring methods, technologies and tools to handle variability at the software architecture level. The workshop featured one industrial keynote talk, one academic keynote talk and five research paper presentations.

  • 123.
    Galster, Matthias
    et al.
    Univ Canterbury, New Zealand.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science. Katholieke Univ Leuven, Belgium.
    Empirical Research in Software Architecture How far have we come?2016In: 2016 13TH Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE, 2016, p. 11-20Conference paper (Refereed)
    Abstract [en]

    Context: Empirical research helps gain well-founded insights about phenomena. Furthermore, empirical research creates evidence for the validity of research results. Objective: We aim at assessing the state-of-practice of empirical research in software architecture. Method: We conducted a comprehensive survey based on the systematic mapping method. We included all full technical research papers published at major software architecture conferences between 1999 and 2015. Results: 17% of papers report empirical work. The number of empirical studies in software architecture has started to increase in 2005. Looking at the number of papers, empirical studies are about equally frequently used to a) evaluate newly proposed approaches and b) to explore and describe phenomena to better understand software architecture practice. Case studies and experiments are the most frequently used empirical methods. Almost half of empirical studies involve human participants. The majority of these studies involve professionals rather than students. Conclusions: Our findings are meant to stimulate researchers in the community to think about their expectations and standards of empirical research. Our results indicate that software architecture has become a more mature domain with regards to applying empirical research. However, we also found issues in research practices that could be improved (e.g., when describing study objectives and acknowledging limitations).

  • 124.
    Galster, Matthias
    et al.
    University of Groningen.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Avgeriou, Paris
    University of Groningen.
    Becker, Martin
    Fraunhofer Institute .
    Variability in software architecture: views and beyond2013In: Software Engineering Notes: an Informal Newsletter of The Specia, ISSN 0163-5948, E-ISSN 1943-5843, Vol. 38, no 1, p. 46-49Article in journal (Other academic)
    Abstract [en]

    Variability (the ability of a software system or software artifact to be adapted for use in a specific context) is reflected in and facilitated through the software architecture. The Second International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the Joint 10th Working IEEE/IFIP Conference on Software Architecture & 6th European Conference on Software Architecture 2012 in Helsinki, Finland. The workshop aimed at exploring current and emerging methods, languages, notations, technologies and tools to model, implement, and manage variability in the software architecture. It featured one industrial talk, five research paper presentations, and three working group discussions. Working groups discussed topics that emerged during the workshop. This report summarizes the themes of the workshop and presents the results of the working group discussions.

    Download full text (pdf)
    fulltext
  • 125.
    Galster, Matthias
    et al.
    Univ Canterbury.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Tofan, Dan
    Univ Groningen.
    Michalik, Bartosz
    Avgeriou, Paris
    Univ Groningen.
    Variability in Software Systems-A Systematic Literature Review2014In: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520, Vol. 40, no 3, p. 282-306Article, review/survey (Refereed)
    Abstract [en]

    Context: Variability (i.e., the ability of software systems or artifacts to be adjusted for different contexts) became a key property of many systems. Objective: We analyze existing research on variability in software systems. We investigate variability handling in major software engineering phases (e.g., requirements engineering, architecting). Method: We performed a systematic literature review. A manual search covered 13 premium software engineering journals and 18 premium conferences, resulting in 15,430 papers searched and 196 papers considered for analysis. To improve reliability and to increase reproducibility, we complemented the manual search with a targeted automated search. Results: Software quality attributes have not received much attention in the context of variability. Variability is studied in all software engineering phases, but testing is underrepresented. Data to motivate the applicability of current approaches are often insufficient; research designs are vaguely described. Conclusions: Based on our findings we propose dimensions of variability in software engineering. This empirically grounded classification provides a step towards a unifying, integrated perspective of variability in software systems, spanning across disparate or loosely coupled research themes in the software engineering community. Finally, we provide recommendations to bridge the gap between research and practice and point to opportunities for future research.

  • 126.
    Garcia Perez, David
    Linnaeus University, Faculty of Technology, Department of Computer Science. Universitat Autònoma de Barcelona.
    Simulation of AssistiveSystems for Elderly People2014Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Aging population is becoming a problem in a lot of countries, being Swedenone of them, and that is leading society to a lack of the necessary peopleto take care of all the elderly people. The CareIP device, an alarm systemfor the elderly people, with which they are able to ask for assistive help incase they need it, has been used all over Sweden for a while now. In thisthesis, a simulation model has been built in order to study how this caregiving system works in the specic case of Vaxjo. This model can be usedto simulate real situations and prevent certain problems as it could be thelack or excess of resources, long waiting times or unexpected increase on thenumber of alarms, which could lead to critical situations on a emergencyhealthcare system.

    Download full text (pdf)
    Master_Thesis
  • 127.
    Gederin, Ruslan
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mazepa, Viktor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Emulator for complex sensor-based IT system2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Developing and testing complex information technology (IT) systems is a difficult task. This is even more difficult if parts of the system, no matter if hard- or software, are not available when needed due to delays or other reasons. The architecture and design cannot be evaluated and existing parts cannot be reliably tested. Thus the whole concept of the system cannot be validated before all parts are in place.

    To solve this problem in an industrial project, where the development of the server-side should be finished and tested (clear for production) while the hardware sensors where designed but not implemented, we developed an emulator (software) for the hardware sensors meeting the exact specification as well as parts of the server solution.

    This allowed proceeding with the server-side development, testing, and system validation without the hardware sensors in place. Following the exact specification should allow replacing the emulator with the real sensors without complications, once they are available. In the end, being able to develop hard- and software in parallel the project can be in production much earlier than performing the development in sequence.

    Download full text (pdf)
    fulltext
  • 128.
    Geier, Florian
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    The differences between SSD and HDD technology regarding forensic investigations2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the past years solid state disks have developed drastically and are now gaining increased popularity compared to conventional hard drives. While hard disk drives work predictable, transparent SSD routines work in the background without the user’s knowledge.

    This work describes the changes to the everyday life for forensic specialists; a forensic investigation includes data recovery and the gathering of a digital image of each acquired memory that provides proof of integrity through a checksum. Due to the internal routines, which cannot be stopped, checksums are falsified. Therefore the images cannot prove integrity of evidence anymore. The report proves the inconsistence of checksums of SSD and shows the differences in data recovery through high recovery rates on hard disk drives while SSD drives scored no recovery or very poor rates.

    Download full text (pdf)
    The differences between SSD and HDD technology regarding forensic investigations Author
  • 129.
    Geisler, Markus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    A Machine Learning Component for an Optimized Context-Aware Web Service Selection based on Decision Trees for a Future Service Market2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    5DV01E_MasterThesis_MarkusGeisler
  • 130.
    Geisler, Markus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Optimized context-aware Webservice selection within a future service market based on machine learning methods2013Student paper first term, 10 credits / 15 HE creditsStudent thesis
  • 131.
    Gerasimou, Simos
    et al.
    University of York, UK.
    Calinescu, Radu
    University of York, UK.
    Shevtsov, Stepan
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Katholieke Univ Leuven, Belgium.
    UNDERSEA: An Exemplar for EngineeringSelf-Adaptive Unmanned Underwater Vehicles2017In: 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), IEEE, 2017, p. 83-89Conference paper (Refereed)
    Abstract [en]

    Recent advances in embedded systems and underwater communications raised the autonomy levels in unmanned underwater vehicles (UUVs) from human-driven and scripted to adaptive and self-managing. UUVs can execute longer and more challenging missions, and include functionality that enables adaptation to unexpected oceanic or vehicle changes. As such, the simulated UUV exemplar UNDERSEA introduced in our paper facilitates the development, evaluation and comparison of self-adaptation solutions in a new and important application domain. UNDERSEA comes with predefined oceanic surveillance UUV missions, adaptation scenarios, and a reference controller implementation, all of which can easily be extended or replaced.

  • 132.
    Gerdzhikov, Petko
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Behaviour of Port-knocking authentication mechanism2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Port-knocking is a security mechanism used in computer systems to hide available network services. Its operation relies on a drop policy firewall setting in order to make impossible for port-scanning attacks to occur. This project researches the impact of implementing such a software solution. Furthermore, it looks into the behavior of three chosen implementations and make conclusions on the benefits and disadvantages that they bring. In addition, the surrounding implications related to both user and administrator are explored. This thesis includes tests on the resource consumption of the implementations as well as records of the added delay of using the mechanism when initiating a SSH session. There has not been such research performed in this field and the results of it could be beneficial to those who are involved in computer science and network security in particular. Finally, the product of this study state that port-knocking is overlooked and has great benefits in preventing zero-day exploits and hacker tools relying on exposed network services.

    Download full text (pdf)
    fulltext
  • 133.
    Ghazi, Ahmad Nauman
    et al.
    Blekinge Institute of Technology, Sweden.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Torkar, Richard
    Chalmers University of Technology, Sweden.
    Petersen, Kai
    Blekinge Institute of Technology, Sweden.
    Börstler, Jörgen
    Blekinge Institute of Technology, Sweden.
    Information Sources and Their Importance to Prioritize Test Cases in the Heterogeneous Systems Context2014In: Systems, Software and Services Process Improvement / [ed] Barafort, Béatrix; O'Connor, Rory. V.; Poth, Alexander; Messnarz, Richard, Springer, 2014, Vol. 425, p. 86-98Chapter in book (Refereed)
    Abstract [en]

    Context: Testing techniques proposed in the literature rely on various sources of information for test case selection (e.g., requirements, source code, system structure, etc.). The challenge of test selection is amplified in the context of heterogeneous systems, where it is unknown which information/data sources are most important.

    Contribution: (1) Achieve in-depth understanding of test processes in heterogeneous systems; (2) Elicit information sources for test selection in the context of heterogeneous systems. (3) Capture the relative importance of the identified information sources.

    Method: Case study research is used for the elicitation and understanding of which information sources are relevant for test case privatization, followed by an exploratory survey capturing the relative importance of information sources for testing heterogeneous systems.

    Results: We classified different information sources that play a vital role in the test selection process, and found that their importance differs largely for the different test levels observed in heterogeneous testing. However, overall all sources were considered essential in test selection for heterogeneous systems.

    Conclusion: Heterogeneous system testing requires solutions that take all information sources into account when suggesting test cases for selection. Such approaches need to be developed and compared with existing solutions.

  • 134.
    Ghotb khosrowshahi, seyedeh parastou
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Barakpour, kamran
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Is a graph-based interface more efficient than a traditional one for channel discovery?2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There are several applications which make it possible for users to search and find their favorite channels; these channels could be anything such as TV channels, radio channels, blogs, websites, etc. Is a graph-based interface more efficient than a traditional one for channel discovery? The aim of this thesis is to answer the question by developing a new browsing method in a graphical user-friendly interface and compare it with a traditional hierarchical method. A graphical application is a graph-based application, in which the nodes (or vertices) represent channels and the edges represent the links among channels. The graphical application is built with the newest Hypertext Markup Language Standard (HTML5) and Cascading Style Sheets (CSS3). A large part of the graphical application is built using the JavaScript library Sigma.js. The resulting graphical application is tested with users and compared with the traditional hierarchical user interface. A questionnaire is provided for end-users to gather feedback. After analyzing the participant‟s feedback, the results were surprising and interesting. A majority of participants enjoyed interacting with graphical application, and they were interested to use it in the future. The final result is merged into the thesis report. This thesis includes all the work of creating graphical and hierarchical user interfaces, testing the hierarchical and graphical user interfaces, and analyzing the user‟s feedback.

    Download full text (pdf)
    fulltext
  • 135.
    Gil de la Iglesia, Didac
    et al.
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Calderón, Juan Felipe
    Pontificia Universidad de Chile, Chile.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Milrad, Marcelo
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Nussbaum Voehl, Miguel
    Pontificia Universidad de Chile, Chile.
    A Self-Adaptive Multi-Agent System Approach for Collaborative Mobile Learning2015In: IEEE Transactions on Learning Technologies, ISSN 1939-1382, E-ISSN 1939-1382, Vol. 8, no 2, p. 158-172Article in journal (Refereed)
    Abstract [en]

    Mobile technologies have emerged as facilitators in the learning process, extending traditional classroom activities. However, engineering mobile learning applications for outdoor usage poses severe challenges. The requirements of these applications are challenging, as many different aspects need to be catered, such as resource access and sharing, communication between peers, group management, activity flow, etc. Robustness is particularly important for learning scenarios to guarantee undisturbed and smooth user experiences, pushing the technological aspects in the background. Despite significant research in the field of mobile learning, very few efforts have focused on collaborative mobile learning requirements from a software engineering perspective. This paper focuses on aspects of the software architecture, aiming to address the challenges related to resource sharing in collaborative mobile learning activities. This includes elements such as autonomy for personal interactive learning, richness for large group collaborative learning (indoor and outdoor), as well as robustness of the learning system. Additionally, we present self-adaptation as a solution to mitigate risks of resource unavailability and organization failures that arise from environment and system dynamism. Our evaluation provides indications regarding the system correctness with respect to resource sharing and collaboration concerns, and offers qualitative evidence of self-adaptation benefits for collaborative mobile learning applications.

  • 136.
    Gil de la Iglesia, Didac
    et al.
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Guaranteeing Robustness in a Mobile Learning Application using Formally Verified MAPE Loops2013In: Proceedings of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, New York: IEEE Press, 2013, , p. 10p. 83-92Conference paper (Refereed)
    Abstract [en]

    Mobile learning applications support traditional indoor lectures with outdoor activities using mobile devices. An example scenario is a team of students that use triangulation techniques to learn properties of geometrical figures. In previous work, we developed an agent-based mobile learning application in which students use GPS-enabled phones to calculate distances between them. From practical experience, we learned that the required level of GPS accuracy is not always guaranteed, which undermines the use of the application. In this paper, we explain how we have extended the existing application with a selfadaptation layer, making the system robust to degrading GPS accuracy. The self-adaptive layer is conceived as a set of interacting MAPE loops (Monitor-Analysis-Plan-Execute), distributed over the phones. To guarantee the robustness requirements, we formally specify the self-adaptive behaviors using timed automata, and the required properties using timed computation tree logic. We use the Uppaal tool to model the self-adaptive system and verify the robustness requirements. Finally, we discuss how the formal design supported the implementation of the selfadaptive layer on top of the existing application.

    Download full text (pdf)
    fulltext
  • 137.
    Gil de la Iglesia, Didac
    et al.
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    MAPE-K Formal Templates to Rigorously Design Behaviors for Self-Adaptive Systems2015In: ACM Transactions on Autonomous and Adaptive Systems, ISSN 1556-4665, E-ISSN 1556-4703, Vol. 10, no 3, article id 15Article in journal (Refereed)
    Abstract [en]

    Designing software systems that have to deal with dynamic operating conditions, such as changing availability of resources and faults that are dificult to predict, is complex. A promising approach to handle such dynamics is self-adaptation that can be realized by a MAPE-K feedback loop (Monitor-Analyze-Plan-Execute plus Knowledge). To provide evidence that the system goals are satisfied, given the changing conditions, the state of the art advocates the use of formal methods. However, little research has been done on consolidating design knowledge of self-adaptive systems. To support designers, this paper contributes with a set of formally specified MAPE-K templates that encode design expertise for a family of self-adaptive systems. The templates comprise: (1) behavior specification templates for modeling the different components of a MAPE-K feedback loop (based on networks of timed automata), and (2) property specification templates that support verification of the correctness of the adaptation behaviors (based on timed computation tree logic). To demonstrate the reusability of the formal templates, we performed four case studies in which final-year Masters students used the templates to design di↵erent self-adaptive systems.

  • 138.
    Gil de la Iglesia, Didac
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Media Technology.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    SA-MAS: Self-Adaptation to Enhance Software Qualities in Multi-Agent Systems2013In: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems (AAMAS 2013) / [ed] Ito, Jonker, Gini, Shehory, The International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2013, , p. 2p. 1159-1160Conference paper (Refereed)
    Abstract [en]

    Engineering multi-agent systems (MAS) is known to be a complex task. One of the reasons lays in the complexity to combine multiple concerns that a MAS has to address, such as system functionality, coordination, robustness, etc. A well-recognized approach to manage system complexity is the use of self-adaptation (SA). Self-adaptation extends a system with support to monitor and adapt itself to realize a concern of interest (optimization, fault-tolerance, etc.). We present SA-MAS, an architectural approach that integrates MAS with SA. We present a reference model for SA-MAS and illustrate it with an excerpt from our research.

    Download (pdf)
    abstract
  • 139.
    Gilis, Matteus
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hörnsten, David
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Larsson, David
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Filöverföring i modern tid: En jämförelse av SMTP, SFTP och HTTP2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Transferring and receiving computer files are something most of us do on a regularbasis whether it is for private purposes or if it is work related. FTP is a protocolused for this very purpose which was launched during a time when personal computerswere growing increasingly popular in both home and workplace environments.Since then, more protocols have been introduced and today there are a number ofoptions available bringing new and common features alike to the market. The SMTPprotocol, extended with the MIME standard, is currently a widely used alternative tothe pure file transfer protocols due to the user familiarity and past experiences withthese mail services. Sending and receiving files through e-mail does however implysome limitations together with the fact that some security aspects need to be takeninto consideration, particularly for company users handling sensitive data. In thisthesis, three different file transfer protocols (SMTP, SFTP and HTTP) have all beenevaluated in account of their user friendliness as well as their security features. Theresults indicate that HTTP(S) combined with the WebDAV extension can be considereda viable alternative for organizations due to its user friendliness and security.The remaining protocols, SMTP and SFTP, also have their uses where SFTP wouldseem to be an appealing option for advanced users and where SMTP remains a passablealternative for private usage by regular users under the right conditions.

    Download full text (pdf)
    fulltext
  • 140.
    Glazunov, Vladimir
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Quality assessment of a large real world industry project2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Quality Monitor is application, which automatically analyzes software projects forquality and makes quality assessment reports. This thesis project aims to instantiate Quality Monitor for a large real-world .Net project and to extend Quality Monitor by considering other data sources than just source code. This extended analysis scope includes bug reports, features, and time reports besides .Net assemblies (code) as artifacts. Different tools were investigated for the analysis of code, bug reports, features and time reports.

    The analysis of .Net assemblies was implemented as none of the existing tools under evaluation met all requirements. The analysis of .Net assemblies was successfully completed; it allows the extraction data necessary for creating Call and Control Flow graphs. These graphs are used for calculating additional metrics allowing for an improved assessment of quality of the project. Implementation of .Net assembly reader was tested using large real world industrial project.

    Other data sources were analyzed theoretically, but excluded for further implementation. Altogether the thesis includes an analysis of possible Quality Monitor extensions including their requirements, design, and (partially) their implementation and evaluation.

    Download full text (pdf)
    fulltext
  • 141.
    Golub, Koraljka
    et al.
    Linnaeus University, Faculty of Arts and Humanities, Department of Cultural Sciences.
    Hansson, Joacim
    Linnaeus University, Faculty of Arts and Humanities, Department of Cultural Sciences.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Milrad, Marcelo
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    LNU as a Unique iSchool2016Other (Other academic)
    Download (pdf)
    poster
  • 142.
    Golub, Koraljka
    et al.
    Linnaeus University, Faculty of Arts and Humanities, Department of Cultural Sciences.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Overview of Centre for Data Intensive Sciences in Applications at Linnaeus University: invited talk2017In: A Calculus of Culture : Circumventing the Black Box of Culture Analytics, Guangxi University, China, March 21-23, 2017, 2017Conference paper (Other academic)
  • 143.
    Golub, Koraljka
    et al.
    Linnaeus University, Faculty of Arts and Humanities, Department of Cultural Sciences.
    Tyrkkö, Jukka
    Linnaeus University, Faculty of Arts and Humanities, Department of Languages.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Jusufi, Ilir
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Media Technology.
    Ardö, Anders
    Lund University, Sweden.
    Automatic subject classification for improving retrieval in a Swedish repository2017In: ISKO UK Conference 2017: Knowledge Organization: what's the story?, 11 – 12 September 2017, London, 2017Conference paper (Refereed)
    Abstract [en]

    The recent adoption of the Dewey Decimal Classification (DDC) in Sweden has ignited discussions about automated subject classification especially for digital collections, which generally seem to lack subject indexing from controlled vocabularies. This is particularly problematic in the context of academic resource retrieval tasks, which require an understanding of discipline-specific terminologies and the narratives behind their internal ontologies. The currently available experimental classification software have not been adequately tested and their usefulness is unproven especially for Swedish language resources. We address these issues by investigating a unifying framework of automatic subject indexing for the DDC, including an analysis of suitable interactive visualisation features for supporting these aims. We will address the disciplinary narratives behind the DDC in selected subject areas and the preliminary results will include an analysis of the data collection and a breakdown of the methodology. Major visualisation possibilities in support of the classification process are also outlined. The project will contribute significantly to Swedish information infrastructure by improving the findability of Swedish research resources by subject searching, one of the most common yet the most challenging types of searching.

    Download full text (pdf)
    Poster
  • 144.
    Gridina, Kateryna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Developing Reusable iOS Components2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Companies often create apps in the same problem domain with similar features.

    Implementing these features over and over again is inefficient, time consuming, and error

    prone. This leads to high costs for the developing company and prices which are not

    competitive on the market.

    To address these problems we identify reusable features and implement them in a library

    which is well tested and allows frequent reuse. Features include navigation patterns, lists,

    menus, animated components, shared components, gallery and so on.

    With the help of these features programmers can easily create various applications with

    good design and functionality, reducing the time spent on development and allowing

    competitive prices for related services and products.

    Download full text (pdf)
    MasterThesis_kg222ck
  • 145.
    Griffith, Ioseff
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Generation, evaluation, and optimisation of procedural 2D tile-based maps in turn-based tactical video games2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In modern times, procedural content generation sees frequent use in video games, producing anything from graphics to maps and quests. This study focuses on how these techniques can be used to produce forest maps for tactical role-playing games, and how this is applied in particular to Starshard, one such game. The main points addressed are how well the forestry growth simulation algorithm previously implemented in Starshard compares to algorithms based on other popular techniques, how to utilise evaluation and optimisation to produce correct and strategically interesting maps without human interference, and whether or not players can easily perceive a difference between procedural maps and maps designed by humans. With high demand for new algorithms to automate content generation in order to help smaller teams of developers and maintain interest in content post release, there is much value in delving further into less frequently explored aspects such as tile-based maps or player perception of procedural content. In order to answer the research problems, a controlled experiment comparing four forestry generation algorithms was performed, in addition to a study of literature to implement evaluation and optimisation algorithms, and a survey to gauge player reactions to the produced maps. Ultimately, the growth simulation proves to be more successful than alternative algorithms in reducing number of errors in maps. In addition, the results of the survey showed that while players are capable of reliably picking out human created maps, their ratings for procedurally generated maps were not much lower than these and they could frequently mistake procedural maps as being produced by humans.

    Download full text (pdf)
    Ioseff_Griffith_BSc_Thesis_2016
  • 146.
    Großkopf, Heiko
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Challenges of Service Interchange in a cross cloud SOA Environment2015Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This Master’s Thesis examines and documents challenges related to the flexible interchange of web services within a cross-cloud Service Oriented Computing scenario (SOC).Starting with a theoretical approach, hypotheses are defined and processed to create testing scenarios for a practical examination. Both examinations are used to identify possible challenges. Next, encountered challenges are described, discussed and classified. Lastly, solution approaches to identified challenges are presented. The solution approaches concern related topics, such as service standardization, semantic methods, heuristics, and security/trust mechanisms. Several approaches to different challenges are reviewed in this particular context, to present an overview for future research on the subject.It is remarkable that there will be more service standardization in the future, but to achieve full automation it will be, on the long run, necessary to evolve and adopt more sophisticated solution approaches such as semantic methods or heuristics.This work is embedded into the framework of a research co-operation between the Linnaeus University Växjö and the University of Applied Sciences Karlsruhe. Results however are also applicable to other research scenarios.

    Download full text (pdf)
    Masters_Thesis_Heiko_Grosskopf
  • 147.
    Guillaume, Fumeaux
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Public Software as a Service a Business-Driven Guidance for Risk Control2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Because cloud computing adoption grows day-by-day, it is essential for theexecutives of a company to be able to rely on a risks management guidanceto fully grasp all the aspects concerning cloud computing security.The concerns of the industry, the security standards, the official guidelines,and the European laws about the security when using cloud serviceshave been analyzed. The risks, the measures, and the obligations have beengathered. This paper, with all these information collected, describes how torun a risk management for public SaaS security keeping a business-drivenmindset. While running the risk assessment, the management should look atthe impact a threat may have on company activities, image, and finances. Itwill decide on the measures that should be implemented by the administrationor the IT.Following this guidance should minimize the risk of using public SaaScloud computing and allowing a company to align its security goals with itsbusiness goals.

    Download full text (pdf)
    fulltext
  • 148.
    Gustafsson, Adam
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    An Analysis of Platform Game Design: Implementation Categories and Complexity Measurements2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis addresses design and development associated problems identified within theplatform-game genre. The problem described originates from the fluctuating curve ofinterest towards the platform-game genre that can be observed between the 1980’s andtoday. The problem stated in this thesis is that modern platform-game developers mayoften overlook and –or deprioritize important design and gameplay related componentsthat we find reoccurring in previously popular games within the genre.This thesis strives to address such problems by decomposing the developmentprocess of a platform game into a light framework titled Implementation categories. Allincluded categories represent a set of design and development related platform-gamecomponents – primarily identified through previous research in the field. In order tocreate an understanding of each category’s complexity - as well as account for thepossibilities to use the categories as a guideline when developing a platform game - aprototype game was developed. The Implementation categories included in theprototype was then measured with a set of software complexity metrics. This thesis willmotivate and explain the selection of implementation categories, account for the usageof software complexity metrics as well as present a detailed documentation of theprototype development.The result of this thesis is a thorough presentation of the Implementation categories -attached with complexity examples for each category as well as a complete gameprototype. The complete results of this thesis will hopefully be of assistance in smallscale,independent or academic game projects in regard of design, decision making,prioritization and time planning.

    Download full text (pdf)
    an-analysis-of-platform-game-design
  • 149.
    Gustav, Rosenlund
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Johan, Holmberg
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Vidareutveckling av AppCMS2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this essay we will follow the continuous development of the company Softwerk´s Content Management System (CMS) called AppCMS. AppCMS currently includes the following platforms, iOS, Android and Windows Phone. The customers of Softwerk have expressed the need of also being able to reach their customers with a web based as well as a pdf version. AppCMS’s export format have therefore been analyzed to evaluate the possibility of reusing the existing format from AppCMS for these platforms as well. The examination confirmed that the existing format could be reused for the new solutions and that the implementation phase could begin. This work resulted in an addition to AppCMS in the shape of a web and pdf based version. The essay describes the problem we encountered, how we handled them as well as the decisions taken in the process.

    Download full text (pdf)
    fulltext
  • 150.
    Gutzmann, Tobias
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Benchmarking Points-to Analysis2013Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Points-to analysis is a static program analysis that, simply put, computes which objects created at certain points of a given program might show up at which other points of the same program. In particular, it computes possible targets of a call and possible objects referenced by a field. Such information is essential input to many client applications in optimizing compilers and software engineering tools.

    Comparing experimental results with respect to accuracy and performance is required in order to distinguish the promising from the less promising approaches to points-to analysis. Unfortunately, comparing the accuracy of two different points-to analysis implementations is difficult, as there are many pitfalls in the details. In particular, there are no standardized means to perform such a comparison, i.e, no benchmark suite - a set of programs with well-defined rules of how to compare different points-to analysis results - exists. Therefore, different researchers use their own means to evaluate their approaches to points-to analysis. To complicate matters, even the same researchers do not stick to the same evaluation methods, which often makes it impossible to take two research publications and reliably tell which one describes the more accurate points-to analysis.

    In this thesis, we define a methodology on how to benchmark points-to analysis. We create a benchmark suite, compare three different points-to analysis implementations with each other based on this methodology, and explain differences in analysis accuracy.

    We also argue for the need of a Gold Standard, i.e., a set of benchmark programs with exact analysis results. Such a Gold Standard is often required to compare points-to analysis results, and it also allows to assess the exact accuracy of points-to analysis results. Since such a Gold Standard cannot be computed automatically, it needs to be created semi-automatically by the research community. We propose a process for creating a Gold Standard based on under-approximating it through optimistic (dynamic) analysis and over-approximating it through conservative (static) analysis. With the help of improved static and dynamic points-to analysis and expert knowledge about benchmark programs, we present a first attempt towards a Gold Standard.

    We also provide a Web-based benchmarking platform, through which researchers can compare their own experimental results with those of other researchers, and can contribute towards the creation of a Gold Standard.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
1234567 101 - 150 of 485
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf