lnu.sePublications
Change search
Refine search result
1234567 151 - 200 of 913
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151. Dinnus, Christian
    et al.
    Jansen, Marc
    University of Applied Sciences.
    Schulze, Robert
    Simons, Christian
    IT-Organisationen wirksam verändern: Innovative KVP-Praxis: Mit kleinen Schritten zu nachhaltigem Erfolg2013Book (Refereed)
    Abstract [de]

    In jedem Unternehmen gibt es Stellen, an denen es nicht rund läuft. In manchen Organisationseinheiten ist Sand im Getriebe, es knirscht und knackt – schon bereits bei der Zusammenarbeit mit anderen Abteilungen. Was kann man tun? Eine Möglichkeit besteht darin, ein großes Veränderungsprojekt aufzusetzen und alle Mitarbeiter und Führungskräfte ins kalte Wasser zu werfen. Doch viele dieser großen Veränderungsprojekte scheitern. Hauptgrund ist, dass Führungskräfte von der Notwendigkeit der Änderungen nicht überzeugt sind. Die Autoren dieses Buchs haben daher einen anderen Ansatz entwickelt: Veränderung ja, aber in kleinen, nachhaltigen Schritten. In einem solchen kontinuierlichen Veränderungsprozess geht es darum, nach und nach stabil laufende Prozesse einzuführen bzw. bestehende Prozesse zu optimieren. Mit dieser Methode wird die Akzeptanz der Mitarbeiter erreicht. Sie bietet Führungskräften die Möglichkeit, Veränderungen und Prozesse mitzugestalten und sich im Rahmen ihrer Linienverantwortung gezielt einzubringen.

  • 152.
    Dogan, Oguzhan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Defining a Software Analysis Framework2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Nowadays, assessing software quality and making predictions about the software are not

    possible. Software metrics are useful tools for assessing software quality and for making

    predictions. But currently the interpretation of the measured values is based on personal

    experience. In order to be able to assess software quality, quantitative data has to be

    obtained.

    VizzAnalyzer is a program for analyzing open source Java Projects. It can be used

    for collecting quantitative data for defining thresholds that can support the interpretation

    of the measurement values. It helps to assess software quality by calculating over 20

    different software metrics. I define a process for obtaining, storing and maintaining

    software projects. I have used the defined process to analyze 60-80 software projects

    delivering a large database with quantitative data.

  • 153. Dokulil, Jirí
    et al.
    Bajrovic, Enes
    Pllana, Sabri
    University of Vienna.
    Sandrieser, Martin
    Bachmayer, Beverly
    High-level Support for Hybrid Parallel Execution of C++ Applications Targeting Intel® Xeon Phi™ Coprocessors2013In: Procedia Computer Science, Elsevier, 2013, p. 2508-2511Conference paper (Refereed)
    Abstract [en]

    The introduction of Intel® Xeon Phi™ coprocessors opened up new possibilities in development of highly parallel applications. Even though the architecture allows developers to use familiar programming paradigms and techniques, high-level development of programs that utilize all available processors (host+coprocessors) in a system at the same time is a challenging task.

    In this paper we present a new high-level parallel library construct which makes it easy to apply a function to every member of an array in parallel. In addition, it supports the dynamic distribution of work between the host CPUs and one or more coprocessors. We describe associated runtime support and use a physical simulation example to demonstrate that our library can facilitate the creation of C++ applications that benefit significantly from hybrid execution. Experimental results show that a single optimized source code is sufficient to simultaneously exploit all of the host's CPU cores and coprocessors efficiently.

  • 154.
    Dorina, Dibra
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Real-time interactive visualization aiding pronunciation of English as a second language2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Computer assisted language learning (CALL) comprises a wide range of information technologies that aim to broaden the context of teaching by getting advantages of IT. For example, a few efforts have been put on including a combination of voice and its visual representation for language learning, and some studies are reporting positive outcomes. However, more research is needed in order to assess the impact caused by specific visualization styles such as: highlighting syllables and/or wave of sound. In order to explore this issue, we focused at measuring the potential impact that two distinct visualization styles and its combination can have on teaching children the pronunciation of English as a second language. We built a prototype which was designed to assist students while learning pronunciation of syllables. This system was employing two different real-time interactive visualization styles. One of these visualization styles utilizes audio capturing and processing, using a recent technology development: Web Audio API.We evaluated the effect of our prototype with an experiment with children aged from 9 to 11years old. We followed an experimental approach with a control group and three experimental groups. We tested our hypothesis that states that the use of a combined visualization style can have greater impact at learning pronunciation in comparison with traditional learning approach.Initial descriptive analyses were suggesting promising results for the group that used the combined visualization prototype. However, additional statistical analyses were carried out in order to measure the effect of prototype as accurately as possible within the constraints of our study. Further analyses provided evidence that our combined visualizations prototype has positively affected the learning of pronunciation. Nonetheless, the difference was not big comparing to the system that employed only wave of sound visualization. Ability to perceive visual information differs among individuals. Therefore, further research with different sample division is needed to determine whether is the combination of visualizations that does the effect, or is the wave in itself. Slitting groups based on this characteristic and perform the testing will be considered for the future research.Eventually, we can be confident to continue exploring further the possibility of integrating our proposed combination of two visualization styles in teaching practices of second language learning, due to positive outcomes that our current research outlined. In addition, from a technological perspective, our work is at the forefront of exploring the use of tools such as Web Audio API for CALL.

  • 155.
    Dragomoiris, Lampros
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Visualizing complex data: A use case evaluating an interactive visualization about food purchases2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Complex data are being stored daily in databases in an unstructured way. Visualizations techniques can be used to present complex data in a user friendly and understandable way. This thesis presents the implementation of a visualization interactive tool called Eco Donuts. It is part of a set of tools created to visualize complex food data called Ekopanelen. The feature Eco Donuts presents time-dependent food data which are ordered in categories. It gives the opportunity to users to explore their data over time by performing simple interactions. This thesis documents an exploratory study on how this visualization tool can be used to enhance the user experience and provide insights of complex data. The visualization feature was implemented and evaluated with ten participants. The participants were asked to evaluate the visualization tool by accomplishing nine different tasks. The sessions were recorded using a log system as well as video recording. This study shows that the proposed tool can be used to visualize complex information in a user friendly and presentable way.

  • 156.
    Du, Xiaoshan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Data Mining Analysis and Modeling for Marketing Based on Attributes of Customer Relationship2006Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With the rapid growing marketing business, Data Mining technology is playing a more and more important role in the demands of analyzing and utilizing the large scale information gathered from customers. To predict the consequent business strategy by using Data Mining, the Customer Relationship Management (CRM) nowadays is required to evaluate the customer performance, discover the trends or patterns in customer behavior, and understand the factual value of their customers to their company. In this paper, we present an effective model to apply Data Mining to the CRM problem of categorizing the customers in marketing to search for potential clients based on their properties by (1) computing Distance in Cluster Analysis and Life in Association Rules according to the Attributes of Customer Relationship (ACR) including Self-Reliance Index, Impact Index and Matrix for customer value, and (2) in the Data Mining modeling theory, constructing the Regression Model in the ACR and implementing the corresponding algorithm to mine the most profitable customer group.

  • 157.
    Durakovic, Mirza
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Web application and WAF vulnerabilities2017Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    With the growth of the internet, web pages evolved from being simple static information providers to web sites and nowadays to web apps. Symbiotically, flaws in security followed this development which in its turn could cause devastating damages to many areas of our lives. This report researches vulnerabilities that exist in web apps nowadays, in addition to the lack of proper protection that WAFs should offer. Selected web applications and WAFs with default rulesets were put through the tests for SQLi and XSS attacks. The conclusion that was derived was that the WAFs in question were not secure enough and that in fact there are issues with out-of-the-box rules that come with Web Application Firewalls in general.

  • 158.
    Ebert, Achim
    et al.
    University of Kaiserslautern, Germany.
    Weber, Christopher
    University of Kaiserslautern, Germany.
    Cernea, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Petsch, Sebastian
    University of Kaiserslautern, Germany.
    TangibleRings: Nestable Circular Tangibles2013In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, ACM Press, 2013, p. 1617-1622Conference paper (Refereed)
    Abstract [en]

    The multitouch functionality of tabletop computers is often augmented by the use of tangible objects that offer an intuitive and haptic alternative to interaction and manipulation. However, employing tangibles can also lead to less desirable effects, such as occlusion or lack of precision. In this paper we highlight the design and implementation of ring-like tangible objects: TangibleRings. They do not occlude the objects underneath them and also support the detection of touch events inside their perimeter. Additionally, multiple rings may be nested within one another in order to combine ring functionalities or produce more complex filters.

  • 159.
    Eberwein, Jan
    et al.
    Institut Informatik Hochschule Ruhr West.
    Nurhas, Irawan
    Institut Informatik Hochschule Ruhr West.
    Eberwein, Stefan
    Institut Informatik Hochschule Ruhr West.
    Jansen, Marc
    Institut Informatik Hochschule Ruhr West.
    Evaluation der Akzeptanz mobiler Lernszenarien auf Basis plattformunabhängiger Webtechnologien.2014In: Proceedings der 12ten e-Learning Fachtagung der Informatik (DeLFI 2014): co-located with 12th e-Learning Conference of the German Computer Society (DeLFI 2014), Freiburg, Germany, September 15, 2014 / [ed] Christoph Rensing, Stephan Trahasch, 2014, p. 213-220Conference paper (Refereed)
    Abstract [en]

    In den letzten Jahren nahm die Nutzung mobiler Geräte stark zu, wasauch zu einer Verbreitung mobiler Geräte in mobilen Lernszenarien geführt hat.Aufgrund der Heterogenität der am Markt befindlichen mobilen Geräte wird zurSoftwareentwicklung häufig ein plattformunabhängiger Ansatz gewählt. Hierzugibt es im Wesentlichen zwei unterschiedliche Ansätze, die beide aufWebtechnologien basieren. Entweder es werden Applikationen mit spezifischen UIFrameworks für mobile Geräte oder mit responsive Ansätzen, parallel für mobileund stationäre Geräte, entwickelt. Um beide Ansätze vergleichen zu können, stelltdieses Papier eine Evaluation der Akzeptanz mobiler Lernszenarien auf Basisplattformunabhängiger Webtechnologien dar.

  • 160.
    Edvinsson, Marcus
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Parallelized Program Analysis2010Doctoral thesis, monograph (Other academic)
    Abstract [en]

    This thesis presents a framework for parallelized program analysis. It uses available parallel processing power in standard desktop computers to speed up static program analysis.

    Today, processor chip manufacturers produce single processor chips containing multiple cores, each with a processing power of previous single-core processors. Major processor suppliers have released processors with 2, 4, and 6 cores and are currently working on processors with 8 and 16 cores, and are expected to produce processors with a few hundred cores in the near future.

    Static program analysis finds programs’ runtime properties at compile time. It is time-consuming to produce results of high quality, which is necessary for the results to be useful. One way to reduce analysis time is to take advantage of the processing power of multi-core processors.

    The presented framework supports sequences of static program analyses, each producing partial results. In this thesis, the framework is instantiated with points-to analysis, reachability analysis, and escape analysis. Points-to analysis calculates object references in a program and provides the input for subsequent analyses. Reachability analysis calculates reachable methods and provides further input to the escape analysis, which finds object and method lifetimes. It is possible to implement other data-flow analyses using the same parallelized approach by choosing different analysis value types and transfer functions. The framework also facilitates the implementation of static analyses that automatically benefit from the parallelized approaches that the framework offers.

    The framework shortens the analysis time for static program analysis based on points-to analysis in two ways: using a parallelized approach for points-to analysis, and using parallelized approaches for analyses relying on points-to analysis results. It is also possible to shorten the development time of other analyses when reusing the functionality of the framework.

    To further improve the usefulness of the framework, requirements for additional static analysis should be captured, and the framework should be extended accordingly. It should also facilitate to perform independent client analyses in parallel, rather than in sequence. These challenges are part of our future work.

  • 161.
    Edvinsson, Marcus
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Towards a Framework for Static Analysis Based on Points-to Information2007Licentiate thesis, monograph (Other academic)
    Abstract [en]

    Static analysis on source code or binary code retrieves information about a software program. In object-oriented languages, static points-to analysis retrieves information about objects and how they refer to each other. The result of the points-to analysis is traditionally used to perform optimizations in compilers, such as static resolution of polymorphic calls, and dead-code elimination. More advanced optimizations have been suggested specifically for Java, such as synchronization removal and stack-allocation of objects. Recently, software engineering tools using points-to analysis have appeared aiming to help the developer to understand and to debug software. Altogether, there is a great variety of tools that use or could use points-to analysis, both from academia and from industry.

    We aim to construct a framework that supports the development of new and the improvement of existing clients to points-to analysis result. We present two client analyses and investigate the similarities and differences they have. The client analyses are the escape analysis and the side-effects analysis. The similarities refer to data structures and basic algorithms that both depend on. The differences are found in the way the two analyses use the data structures and the basic algorithms. In order to reuse these in a framework, a specification language is needed to reflect the differences. The client analyses are implemented, with shared data-structures and basic algorithms, but do not use a separate specification language.

    The framework is evaluated against three goal criteria, development speed, analysis precision, and analysis speed. The development speed is ranked as most important, and the two latter are considered equally important. Thereafter we present related work and discuss it with respect to the goal criteria.

    The evaluation of the framework is done in two separate experiments. The first experiment evaluates development speed and shows that the framework enables higher development speed compared to not using the framework. The second experiment evaluates the precision and the speed of the analyses and it shows that the different precisions in the points-to analysis are reflected in the precisions of the client analyses. It also shows that there is a trade-off between analysis precision and analysis speed to consider when choosing analysis precision.

    Finally, we discuss four alternative ways to continue the research towards a doctoral thesis.

  • 162.
    Edvinsson, Marcus
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Lundberg, Jonas
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Löwe, Welf
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Parallel Data-Flow Analysis for Multi-Core Machines2011Conference paper (Refereed)
    Abstract [en]

    Static program analysis supporting software development is often part of edit-compile-cycles, and precise program analysis is time consuming. Points-to analysis is a data-flow-based static program analysis used to find object references in programs. Its applications include test case generation, compiler optimizations and program understanding, etc. Recent increases in processing power of desktop computers comes mainly from multiple cores. Parallel algorithms are vital for simultaneous use of multiple cores. An efficient parallel points-to analysis requires sufficient work for each processing unit.

    The present paper presents a parallel points-to analysis of object-oriented programs. It exploits that (1) different target methods of polymorphic calls and (2) independent control-flow branches can be analyzed in parallel. Carefully selected thresholds guarantee that each parallel thread has sufficient work to do and that only little work is redundant with other threads. Our experiments show that this approach achieves a maximum speed-up of 4.5.

  • 163.
    Edvinsson, Marcus
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Lundberg, Jonas
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Löwe, Welf
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Parallel Reachability and Escape Analysis2010In: 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM), IEEE Press, 2010, p. 125-134Conference paper (Refereed)
    Abstract [en]

    Static program analysis usually consists of a number of steps, each producing partial results. For example, the points-to analysis step, calculating object references in a program, usually just provides the input for larger client analyses like reachability and escape analyses. All these analyses are computationally intense and it is therefore vital to create parallel approaches that make use of the processing power that comes from multiple cores in modern desktop computers.

    The present paper presents two parallel approachesto increase the efficiency of reachability analysis and escape analysis, based on a parallel points-to analysis. The experiments show that the two parallel approaches achieve a speed-up of 1.5 for reachability analysis and 3.8 for escape analysis on 8 cores for a benchmark suite of Java programs.

     

  • 164.
    Edvinsson, Marcus
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Löwe, Welf
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    A Multi-Threaded Approach for Data-Flow Analysis2010Conference paper (Refereed)
    Abstract [en]

    Program analysis supporting software development is often part of edit-compile-cycles, and precise program analysis is time consuming. With the availability of parallel processing power on desktop computers, parallelization is a way to speed up program analysis. This requires a parallel data-flow analysis with sufficient work for each processing unit. The present paper suggests such an approach for object-oriented programs analyzing the target methods of polymorphic calls in parallel. With carefully selected thresholds guaranteeing sufficient work for the parallel threads and only little redundancy between them, this approach achieves a maximum speed-up of 5 (average 1.78) on 8 cores for the benchmark programs.

  • 165.
    Edvinsson, Marcus
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    Löwe, Welf
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    A Parallel Approach for Solving Data Flow Analysis Problems2008In: The 20th IASTED International Conference on Parallel and Distributed Computing and Systems: PDCS 2008, Acta Press, Calgary , 2008Conference paper (Refereed)
    Abstract [en]

    Program analysis supporting software development is often part of edit-compile-cycles and precise program analysis is time consuming. With the availability parallel processing power on desktop computers, parallelization is a way to speed up program analysis. This paper introduces a parallelization schema for program analysis that can be translated to parallel machines using standard scheduling techniques. First benchmarks analyzing a number of Java programs indicate that the schema scales well for up to 8 processors, but not very well for 128 processors. These results are a first step towards more precise program analysis in Integrated Development Environments utilizing the computational power of today’s custom computers.

  • 166.
    Eidegård, Anna
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Project factors - A possible way to create a data bank of project experience.2007Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this master thesis I investigate how to make projects more efficient. I did my thesis at the airborne radar division at Ericsson Microwave Systems (EMW). Their projects often cost more than estimated and they also tend to last longer than estimated.

    The airborne radar division wants to know why the final result, in most cases exceed the budget and time plan. Their goal is to learn from the experience in previous projects and to gather all that experience in an experience base.

    They gave me the task to start the process towards an experience base. The theory I base my result and conclusions on is The Experience Factory. The Experience Factory is an example of an experience base that was developed primarily for software projects. I started investigating projects at the airborne radar division trying to find common denominators (factors). I found some factors that I believe have a major impact on the projects. The projects really have to rely on these factors to be able to reach the goal of the projects. These factors are the first step towards an experience base. Starting a process towards an experience base is a work that takes many years especially at a company of this size. My thesis is a start towards the goal and in my result I present the factors I found and in the conclusions I give suggestions for the continuing work towards an experience base.

  • 167. Einsfeld, Katja
    et al.
    Ebert, Achim
    Kerren, Andreas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Deller, Matthias
    Knowledge Generation Through Human-Centered Information Visualization2009In: Information Visualization, ISSN 1473-8716, E-ISSN 1473-8724, Vol. 8, no 3, p. 180-196Article in journal (Refereed)
    Abstract [en]

    One important intention of human-centered information visualization is to represent huge amounts of abstract data in a visual representation that allows even users from foreign application domains to interact with the visualization, to understand the underlying data, and finally, to gain new, application-related knowledge. The visualization will help experts as well as non-experts to link previously or isolated knowledge-items in their mental map with new insights.Our approach explicitly supports the process of linking knowledge-items with three concepts. At first, the representation of data items in an ontology categorizes and relates them. Secondly, the use of various visualization techniques visually correlates isolated items by graph-structures, layout, attachment, integration, or hyperlink techniques. Thirdly, the intensive use of visual metaphors relates a known source domain to a less known target domain. In order to realize a scenario of these concepts, we developed a visual interface for non-experts to maintain complex wastewater treatment plants. This domain-specific application is used to give our concepts a meaningful background.

  • 168.
    Eisenmann, André
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Stream and system management for networked audio devices2008Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The paper deals with the development of a remote management solution for embedded audio devices. The creation of a development environment for the embedded ARM target is discussed as well as several available solutions for remote system management. The creation of a service for stream and system management using SNMP is discussed as well as several changes to the SNMP standard to improve performance using multicast. The implementation of a proof-of-concept cross-platform user interface for the client side is described as well.

  • 169.
    Ekelund, Marcus
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Larsson, Andreas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Web Services: A Comparative Study2004Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This Master thesis enhances an existing library search system with a new dynamic web interface and introduces the ability to perform remote searches by using Web Services. The remote search functionality also includes the ability to compress SOAP-messages, this functionality is optional. The system is implemented using the Microsoft.NET Framework with Visual Studio C#. A library needs to store information about articles and we have chosen to use a Sybase Adaptive Server Anywhere database.

    The practical part of this thesis describes the architecture of our implementation and the design process.

    The theoretical part is a comparative study between dynamically created web pages and static pages, SOAP-compression versus no compression, SOAP-optimization versus no optimisation and the use of Web Services locally versus local classes.

  • 170.
    Eklund, Per
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Forsman, Olof
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Personuppgiftslagens efterlevnad i samband med IT-övervakning: En studie av medelstora callcenterverksamheter2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the 2003:3 and 2005:3 reports issued by the Swedish Data Inspection Board, the authority examined the treatment of personal data related to employer surveillance of employees. The reports indicated flaws occurring in regard to the Personal Data Act in several of the examined businesses.

    In reference to this, a case study of a mid-sized call center was conducted to examine, from a technical point of view, the degree of compliance with the Personal Data Act regarding the company's surveillance of its employees. Based upon flaws found in the case study, a minor survey of similar companies was conducted in an attempt to measure the degree of generalizability of the identified flaws.

    The flaws identified in the case study are mainly related to unsatisfactory routines for sorting out personal data during e-mail surveillance and lack of information given to employees about the conducting of checks related to this. A need to update the company's corporate IT policy and a need for a web surveillance solution were also noted.

    The survey has indicated that similar flaws regarding screening routines and lack of information also might occur at other mid-sized call center companies.

    The conclusion of the study is that several of the flaws the Swedish Data Inspection Board discovered five years ago still seem to be applicable among some mid-sized call center companies.

  • 171. Elmqvist, Niklas
    et al.
    Vande Moere, Andrew
    Jetter, Hans-Christian
    Cernea, Daniel
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Reiterer, Harald
    Jankun-Kelly, TJ
    Fluid Interaction for Information Visualization2011In: Information Visualization, ISSN 1473-8716, E-ISSN 1473-8724, Vol. 10, no 4, p. 327-340Article in journal (Refereed)
    Abstract [en]

    Despite typically receiving little emphasis in visualization research, interaction in visualization is the catalyst for the user’s dialogue with the data, and, ultimately, the user’s actual understanding and insight into these data. There are many possible reasons for this skewed balance between the visual and interactive aspects of a visualization. One reason is that interaction is an intangible concept that is difficult to design, quantify, and evaluate. Unlike for visual design, there are few examples that show visualization practitioners and researchers how to design the interaction for a new visualization in the best manner. In this article, we attempt to address this issue by collecting examples of visualizations with ‘best-in-class’ interaction and using them to extract practical design guidelines for future designers and researchers. We call this concept fluid interaction, and we propose an operational definition in terms of the direct manipulation and embodied interaction paradigms, the psychological concept of ‘flow’, and Norman’s gulfs of execution and evaluation.

  • 172.
    Elovaara, Pirjo
    et al.
    Teknovetenskapliga Studier, Blekinge Tekniska Högskola.
    Mörtberg, Christina
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Carthographic Mapping - Participative Methods2010In: PDC 2010 Participation:: the Challenge Proceedings of the 11th Biennial Participatory Design Conference / [ed] Bødker, K., Brattetetig, T. Loi, D, & Robertson, T., New York, NY, USA: ACM Press, 2010, p. 171-174Conference paper (Refereed)
  • 173.
    Elwing, Malin
    University of Kalmar, School of Communication and Design.
    Betalsystem på webben för utvecklaren2009Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report deals with online Payment Service Providers (PSPs) from the developer's point of view. Two companies that were in or in close connection to the process of developing a web shop were interviewed and compared to the suppöy of payment options at a number of different payment PSPs. The interviews has shown a result which is probable that a new developer will get in contact with in the beginning. The position could be either as a web developer or as an owner of a web shop. It was also possible to establish that there were a number of PSPs suitable for different levels of knowledge within the field. Professional help such as advices and implementation is not necessary in order to be able to set up a relatively advanced web shop.

  • 174.
    Eneman, Rasmus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Improving load time of SPAs: An evaluation of three performance techniques2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The code size of single page web applications are constantly growing which do have an negative effect on the load time. Previous research have shown that load time are important to users and that a slow application will lose potential customers even before it has loaded. In this paper three architecturally far-reaching techniques are measured to see how they can improve the load time and help to decide if an application should be built with one or more of the tested techniques which are HTTP2 push, Code Splitting and Isomorphism. The experiment shows that Isomorphism can provide a big improvement for the time to first paint and that Code Splitting can be a useful technique for large code bases on mobile phones.

  • 175.
    Ericsson, Morgan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    The Effects of XML Compression on SOAP Performance2007In: World Wide Web: Internet and Web Information Systems, ISSN 1386-145x, Vol. 10, no 3, p. 279-307Article in journal (Other (popular science, discussion, etc.))
    Abstract [en]

    ML is the foundation of the SOAP protocol, and in turn, Web Service communication. This self-descriptive textual format for structured data is renowned to be verbose. This verbosity can cause problems due to communication and processing overhead in resource-constrained environments (e.g., small wireless devices). In this paper, we compare different binary representations of XML documents. To this end, we propose a multifaceted and reusable test suite based on real-world scenarios. Our main result is that only simple XML compression methods are suitable for a wide range of scenarios. While these simple methods do not match the compression ratios of more specialized ones, they are still competitive in most scenarios. We also show that there are scenarios that none of the evaluated methods can deal with efficiently.

  • 176.
    Ericsson, Morgan
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Olsson, Tobias
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Toll, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    A Study of the Effect of Data Normalization on Software and Information Quality Assessment2013In: Software Engineering Conference (APSEC, 2013 20th Asia-Pacific), IEEE Press, 2013, p. 55-60Conference paper (Refereed)
    Abstract [en]

    Indirect metrics in quality models define weighted integrations of direct metrics to provide higher-level quality indicators. This paper presents a case study that investigates to what degree quality models depend on statistical assumptions about the distribution of direct metrics values when these are integrated and aggregated. We vary the normalization used by the quality assessment efforts of three companies, while keeping quality models, metrics, metrics implementation and, hence, metrics values constant. We find that normalization has a considerable impact on the ranking of an artifact (such as a class). We also investigate how normalization affects the quality trend and find that normalizations have a considerable effect on quality trends. Based on these findings, we find it questionable to continue to aggregate different metrics in a quality model as we do today.

  • 177.
    Eriksson, Henry
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Arvidsson, Erik
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nerén, Jonas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Säkerhetsmedvetenhet: Hur studenter förhåller sig till säkerhet och lösenordshantering2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In todays society, passwords are a central part in the daily routine of the common man. The importance of a safe password and knowledge of what threats against information security exists, is an important part of an organization’s security. This work studied how students at the Linnaeus University handles their passwords and how aware they are of existing threats and attacks that can compromise the integrity of their password. A survey was done to collect data, and a program was created with the purpose of grading the users passwords and in an educational way teach them how to create a secure password. The results showed that students reuse their passwords frequently and that there are some differences between groups regarding their security awareness. Those who have received some sort of education concerning IT-security had greater knowledge about threats and attacks, and they also handled their passwords with a more secure manner.

  • 178.
    Eriksson, Oskar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Implementing virtual analog synthesizers with the Web Audio API: An evaluation of the Web Audio API2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis in computer science aimed to evaluate the suitability of the Web Audio API to implement virtual analog synthesizers. In order to do so a method for producing a reference architecture for analog synthesizers and a categorization and point system for the evaluation were developed. A reference architecture were made and then implemented with the API and the evaluation were then made based on that implementation. The API were found to cover a lot of the necessary areas, but lacking in a few key components; a noise generator, a native way to automate custom numeric properties and the implementation of the oscillator were deemed too closed to support all use cases. 

  • 179.
    Eriksson, Per
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Wiklund, William
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    El-Hajj, Elie
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Analys och utvärdering av trådlösa nätverk i Kalmar: En säkerhetsundersökning2010Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:

    - Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?

    - Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?

    - Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?

    Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.

    Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.

  • 180. Eryigit, Gülsen
    et al.
    Nivre, Joakim
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    Oflazer, Kemal
    Dependency Parsing of Turkish2008In: Computational Linguistics, ISSN 0891-2017, Vol. 34, no 3, p. 357-389Article in journal (Refereed)
  • 181.
    Evertsson, Jens
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Vilken standardkryptering är mest varaktig?: - Tester avseende några mobila operativsystems kryptering av filer och innehåll2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Is it possible to trust a smartphone running Android, iOS or Windows Phone, that it will keep the information protected if the unit is stolen or lost? This work is about if the provided encryptions for protecting files and its content on systems like Android, iOS or Windows Phone is enough secure or not.

    An investigation where the result showed that all tested systems are fairly secure, if the right conditions are met. The result also showed that the most enduring encryptions is held by Windows Phone with its HMACSHA1 and HMACSHA256 encryptions.

  • 182.
    Evertsson, Jens
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Är HTML 5 redo för användning?: - Fokus på funktionalitet gällande utvecklingsspråkets nya taggar och attribut2011Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This essay is about html 5 and its tags/attributes can be used right now, even if years like 2022 or 2014 has been talked about for dates when the new language can be completely done. The interest behind the essay arose when I’ve studied in a computer course named “Webbteknisk Introduktion” at the Linnaeus University the autumn of 2009, inside the program: “Webbprogrammerare-programmet”. The course was mainly about html, but at one point we’ve also got to have our hands on the new thing – html 5. It was said at the same point in the course, that html 5 was more or less ready to use. Which caught my interest and wanted to get evidence about it. New tags/attributes have in this work been tested with JavaScript towards the latest web browsers (as of May 2011 and August 2011) consisting of: Internet Explorer, Opera, Mozilla Firefox, Apple Safari and Google Chrome. On top of Mac OS X Server 10.6.7 and Windows 7 Professional (x86). According to the final results, it shows that the tested browsers had about 80 to 90 percent support for the new tags, even if the attributes may vary. The final conclusion about the completed tests would then be that it’s more or less a choice of the things in the language he/she wants, or need to use, and so on.

  • 183.
    Fallman, Therese
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Effektiv administration i WordPress: En studie med fokus på användbarhet och hur detta kan optimeras i ett administrationsgränssnitt2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Det stora informationsflödet på webben innebär att organisationer och företag behöver kunna nå ut med konkurrenskraftig information till sin målgrupp på ett effektivt sätt. Innehållshanteringssystem som till exempel WordPress är ett hjälpmedel för detta men det innebär även att administration kan komma att hanteras av oerfarna användare. Det här arbetet behandlar hur det går att anpassa administrationsgränssnittet i WordPress för att förbättra dess användbarhet. Arbetet redogör även för definitionen av användbarhet samt vilka metoder det finns för att verifera det. För att försöka besvara frågeställningarna har det, förutom en litteraturstudie, genomförts en kvalitativ undersökning som inkluderade observation och experiment. Resultatet påvisar att det finns modifierbara faktorer i WordPress administrationspanel, vilka genom optimering kan inbringa en högre användbarhet och bättre effektivitet för oerfarna användare. Empirin visar även att det är komplicerat att begränsa definitionen av användbarhet, vilket därför resulterar i svårigheter att dra konkreta slutsatser. 

  • 184.
    Febles Trujillo, Ivan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    E-Patient Telemedicine Project2006Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim of this thesis is to develop a Java web application with MySql that provides a useful tool for those people that have to handle with diabetes in their normal life.

    The idea is that both patients and doctors will use this prototype for exchanging useful information and thus reduce some of the multiple inconvenient that this disease has.

    The solution proposed in this project can be generalized to cover other aspects of the communication between the patient and the doctor.

  • 185.
    Felizardo, Katia Romero
    et al.
    Federal Technological University of Paraná, Brazil.
    Barbosa, Ellen Francine
    University of São Paulo, Brazil.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Valle, Pedro Henrique Dias
    University of São Paulo, Brazil.
    Maldonado, José Carlos
    University of São Paulo, Brazil.
    Visual Text Mining: Ensuring the Presence of Relevant Studies in Systematic Literature Reviews2015In: International journal of software engineering and knowledge engineering, ISSN 0218-1940, Vol. 25, no 5, p. 909-928Article in journal (Refereed)
    Abstract [en]

    One of the activities associated with the Systematic Literature Review (SLR) process is the selection review of primary studies. When the researcher faces large volumes of primary studies to be analyzed, the process used to select studies can be arduous. In a previous experiment, we conducted a pilot test to compare the performance and accuracy of PhD students in conducting the selection review activity manually and using Visual Text Mining (VTM) techniques. The goal of this paper is to describe a replication study involving PhD and Master students. The replication study uses the same experimental design and materials of the original experiment. This study also aims to investigate whether the researcher's level of experience with conducting SLRs and research in general impacts the outcome of the primary study selection step of the SLR process. The replication results have con¯rmed the outcomes of the original experiment, i.e., VTM is promising and can improve the performance of the selection review of primary studies. We also observed that both accuracy and performance increase in function of the researcher's experience level in conducting SLRs. The use of VTM can indeed be beneficial during the selection review activity.

  • 186.
    Felizardo, Katia Romero
    et al.
    University of São Paulo, Brazil.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Maldonadon, José Carlos
    University of São Paulo, Brazil.
    Lopes, Alneu de Andrade
    University of São Paulo, Brazil.
    Minghim, Rosane
    University of São Paulo, Brazil.
    Content based visual mining of document collections using ontologies2009In: II Workshop on Web and Text Intelligence (WTI) 2009, 2009Conference paper (Refereed)
    Abstract [en]

    Document collections are important data sets in many applications. It has been shown that content based visual mappings of documents can be done effectively through projection and point placement strategies. An important step in this process is the creation of a vector space model, in which terms selected from the text and weighted are used as attributes for the vector space. That step in many cases impairs the quality of the projection due to the existence, in the data set, of many terms that are frequent but do not represent important concepts in the user's particular context. This paper proposes and evaluates the use of ontologies for content based visual analysis of textual data sets as a means to improve the displays for the analysis of the collection. The results show that when the ontology effectively represents the data domain it increases quality of maps.

  • 187.
    Felizardo, Katia Romero
    et al.
    University of São Paulo, Brazil.
    Salleh, Norsaremah
    International Islamic University, Malaysia.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Mendes, Emilia
    University of Auckland, New Zealand.
    MacDonell, Stephen G.
    University of Auckland, New Zealand.
    Maldonado, José Carlos
    University of São Paulo, Brazil.
    Using visual text mining to support the study selection activity in systematic literature reviews2011In: 2011 Fifth International Symposium on Empirical Software Engineering and Measurement, ESEM 2011: Proceedings, Washington: IEEE Computer Society, 2011, p. 77-86Conference paper (Refereed)
    Abstract [en]

    Background: A systematic literature review (SLR) is a methodology used to aggregate all relevant existing evidence to answer a research question of interest. Although crucial, the process used to select primary studies can be arduous, time consuming, and must often be conducted manually.

    Objective: We propose a novel approach, known as 'Systematic Literature Review based on Visual Text Mining' or simply SLR-VTM, to support the primary study selection activity using visual text mining (VTM) techniques. Method: We conducted a case study to compare the performance and effectiveness of four doctoral students in selecting primary studies manually and using the SLR-VTM approach. To enable the comparison, we also developed a VTM tool that implemented our approach. We hypothesized that students using SLR-VTM would present improved selection performance and effectiveness.

    Results: Our results show that incorporating VTM in the SLR study selection activity reduced the time spent in this activity and also increased the number of studies correctly included.

    Conclusions: Our pilot case study presents promising results suggesting that the use of VTM may indeed be beneficial during the study selection activity when performing an SLR.

  • 188.
    Ferati, Mexhid
    et al.
    Oslo and Akershus University College of Applied Sciences, Norway.
    Vogel, Bahtijar
    Malmö University.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of Computer Science. Interactive Institute Swedish ICT.
    Raufi, Bujar
    South East European University, Macedonia.
    Astals, David Salvador
    Universitat Autònoma de Barcelona, Spain.
    Web Accessibility for Visually Impaired People: Requirements and Design Issues2016In: Usability- and Accessibility-Focused Requirements Engineering: First International Workshop, UsARE 2012, Held in Conjunction with ICSE 2012, Zurich, Switzerland, June 4, 2012 and Second International Workshop, UsARE 2014, Held in Conjunction with RE 2014, Karlskrona, Sweden, August 25, 2014, Revised Selected Papers / [ed] Ebert, Achim; Humayoun, Rukh Shah; Seyff, Norbert; Perini, Anna; Barbosa, D.J. Simone, Cham: Springer, 2016, p. 79-96Chapter in book (Refereed)
    Abstract [en]

    Access to web content continues to be a challenge for the visually impaired, as the needs of such community are very diverse. The access is further hindered by the fact that designers continue to build websites non-compliant with Web Content Accessibility Guidelines (WCAG). To better understand the needs of the visually impaired community, three workshops were organized with various stakeholders coming from three different countries. The results from the workshops suggest that one-solution-fits-all model is inadequate without considering the levels of visual impairment when providing customized web experience. A set of requirements devised from the workshops guided the process of building a middleware prototype. Using eight adaptation techniques, the prototype provides the required user experience based on users level of visual impairment. Preliminary evaluation of the middleware suggests that several adaptation techniques perform better with non-WCAG compliant websites compared to those being compliant.

  • 189. Filieri, Antonio
    et al.
    Maggio, Martina
    Angelopoulos, Konstantinos
    D'Ippolito, Nicolás
    Gerostathopoulos, Ilias
    Berndt Hempel, Andreas
    Hoffmann, Henry
    Jamshidi, Pooyan
    Kalyvianaki, Evangelia
    Klein, Cristian
    Krikava, Filip
    Misailovic, Sasa
    Papadopoulos, Alessandro Vittorio
    Ray, Suprio
    Sharifloo, Amir M.
    Shevtsov, Stepan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Ujma, Mateusz
    Vogel, Thomas
    Software engineering meets control theory2015In: Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Piscataway, NJ, USA: IEEE Press, 2015, p. 71-82Conference paper (Refereed)
    Abstract [en]

    The software engineering community has proposed numerous approaches for making software self-adaptive. These approaches take inspiration from machine learning and control theory, constructing software that monitors and modifies its own behavior to meet goals. Control theory, in particular, has received considerable attention as it represents a general methodology for creating adaptive systems. Control-theoretical software implementations, however, tend to be ad hoc. While such solutions often work in practice, it is difficult to understand and reason about the desired properties and behavior of the resulting adaptive software and its controller.

    This paper discusses a control design process for software systems which enables automatic analysis and synthesis of a controller that is guaranteed to have the desired properties and behavior. The paper documents the process and illustrates its use in an example that walks through all necessary steps for self-adaptive controller synthesis.

  • 190.
    Fong, Cheng
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Användarvänlig sökfunktionalitet och resultatvisning på webben2011Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I detta arbete undersöks hur man konstruerar en sökfunktion och hur sökresultatvisningen görs på bästa sätt. Sökfunktionen är oftast en central del på en webbsida idag och fyller en viktig roll för om en webbsida skall bli framgångsrik eller inte. Om informationen inte går att hitta på ett enkelt sätt kan webbsidan tappa sina användare ganska snabbt. Även presentationen av sökresultaten kan vara en vital del där logik, design och layout är viktiga aspekter som inte får förbises. Det finns således en hel del faktorer att ta hänsyn till som webbutvecklare.

    Rapporten går igenom några utvalda best-practice metoder från områden som layout, sökfält, sökresultat och paginering med syftet att identifiera viktiga och användbara metoder. En analys av 10 webbsidor samt en enkätundersökning genomfördes för att undersöka om metoderna tillämpades i verkligheten samt om det var metoder som användare efterfrågar. Arbetet resulterade i en sammanställning av viktiga faktorer som rekommenderas vid konstruktion av en användarvänlig sökfunktion och presentation av sökresultat.

  • 191.
    Fonseca, David
    et al.
    La Salle, Universitat Ramon Llull, Barcelona, Spain.
    Zabulis, Xenophon
    Foundation for Research and Technolgy, Crete, Greece.
    Ramzan, Naeem
    Queen Mary University of London, London, United Kingdom.
    Kurti, Arianit
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Pileggi, Salvatore Flavio
    Universidad Politécnica de Valencia, Valencia, Spain.
    Ko, Heedong
    Image Media Research Center, Seoul, South Korea.
    1st international ACM workshop on user experience in e-learning and augmented technologies in education2012In: MM'12 Proceedings of the 20th ACM international conference on Multimedia, ACM Press, 2012, p. 1519-1520Conference paper (Refereed)
    Abstract [en]

    UXeLATE2012 is the 1st International ACM Workshop on User Experience in e-Learning and Augmented Technologies in Education in conjunction with the ACM International Multimedia Conference (MM'12) at Nara, Japan. The workshop has a half day program, with a selection of six papers, and one keynote talk of a recognized expert in the field of usability, mobile technology and education.

  • 192.
    Forsman, Erik
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Skoglund, Andreas
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Wi-Fi protected setup (WPS), a protocol used to configure wireless clients, isflawed in regard to the design of the authentication procedure for the PIN-code used to connect a new device. This flaw can be exploited by an attackerto perform a brute force attack to identify the code. This report presentsmethods to counteract brute force attacks performed against the WPS-protocol. The study has been performed by practical experiments where thecountermeasures have been evaluated and their performance has beenmeasured. With simple means, such as a third party acting on the routersbehalf in implementing countermeasures against the attacker, the attack canbe counteracted.

    The conclusion is that the most effective way of countering the WPS-bruteforce attack presented is to automatically replace the PIN-code with arandomly generated one when an attack is detected.

  • 193.
    Fransson, Rebecca
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Driaguine, Alexandre
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Comparing Progressive Web Applications with Native Android Applications: An evaluation of performance when it comes to response time2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Web applications are often described as being cross-platform. They are accessible from a multitude of different web browsers, which in turn are running on a multitude of different operating systems. For a time now, developers have used many different tools to create cross-platform applications for mobile devices with web technologies. However, these applications fail to deliver when taken out of their native environment, and often do not feel native at all. Enter Progressive Web Applications, PWA. PWA’s are applications written for the web with web technologies, running in a browser,  but seasoned with some techniques that can make them behave like a native application when running on a mobile device. They are just ordinary web applications with native behaviour such as offline support, installability, and push notifications. The question that arises is - can this new type of web applications match Native Android Applications in performance, especially the response time when accessing the device's hardware? This report will try to answer that question

  • 194.
    Franzén, Jesper
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Svensson, Mikael
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Analys av intern nätverkssäkerhet på en gymnasieskola2010Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Detta examensarbete beskriver dator- och nätverkssäkerhet. Syftet med detta examensarbete är att undersöka den interna nätverkssäkerheten på en gymnasieskola. Speciellt viktigt att undersöka är de kriterier skolan har, om kriterierna uppfylls och på vilket sätt dessa kan testas. Tester utfördes gällande säkerhetsprogramvaran för att säkerställa att den verkligen var säker mot intrång. Tester genomfördes även för att kontrollera att elevdatorerna hade ett BIOS-lösenord närvarande, att eleverna hade lagringsutrymme på servern men inte kunde överskrida lagringskvoten, och att eleverna var lokala administratörer på en bärbar klientdator. Ansvarig IT-tekniker på gymnasieskolan tillhandahöll information om hur nätverket var tänkt att se ut utifrån klientanvändarnas perspektiv. En experimentell metod användes för att fastställa om skolans interna nätverk var skyddat mot interna hot. Referenser från internet, såsom artiklar och databaser, har använts. Även böcker och muntlig kommunikation har använts som referenser. Efter vår analys av gymnasieskolans interna nätverkssäkerhet, konstateras att eleverna inte kan utföra otillåtna åtgärder inom det interna datornätverket som resultat av felkonfigurationer eller sårbarheter som har upptäckts av denna analys. En genomgång av den fysiska säkerheten gällande gymnasieskolans datornätverk och en genomgång av den externa säkerheten i nätverket föreslås.

  • 195.
    Fröderberg, Håkan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Komprimering av e-post2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    E-mails are something that most of us use. How we use it is different from one person to another. We have identified several different ways of usage, for example sending text, attach a file or send a funny picture. In this report different ways of using compression to decrease the volume of an e-mail and also the time it takes to deliver it is being studied. Caslon Analythics predict that 2005 around 236 billion e-mails will be sent. A reduction of messages sizes will have a positive effect on the network load. A plugin that uses Qualcomm Eudora have been created to show what can be done to reduce size and time. It uses a compression library called zlib and Eudora API for plugins. With the plugin and some tests it is shown that it can decrease the amount of storage needed by up to 70 percent when text and/or uncompressed files are attached. Large gain can therefore be made in both time and space.

  • 196.
    Färlind, Filip
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Ottosson, Kim
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Servervirtualisering idag: En undersökning om servervirtualisering hos offentliga verksamheter i Sverige2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    At present, there’s no summary of how server virtualization is implemented and how it works in different companies in Sweden. This work will therefore, through a survey, try to answer the question: "How is server virtualization implemented by municipality and county councils in Sweden?" Our results show that server virtualization is well implemented by municipality and county councils in Sweden. The results are also very similar between these organizations. Finalized work provides different types of companies support in planning and implementation of server virtualization.

  • 197.
    Galindo, Noel
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Adaptive code based in Aspect Oriented Programming paradigm2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 198.
    Gallardo Salas, Carlos
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Extremera Sánchez, Adrián
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Web Development Frameworks: Ruby on Rails VS Google Web Toolkit2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Web programming is getting more and more important every day and as a consequence, many new tools are created in order to help developers design and construct applications quicker, easier and better structured. Apart from different IDEs and Technologies, nowadays Web Frameworks are gaining popularity amongst users since they offer a large range of methods, classes, etc. that allow programmers to create and maintain solid Web systems.This research focuses on two different Web Frameworks: Ruby on Rails and Google Web Toolkit and within this document we will examine some of the most important differences between them during a Web development.

  • 199.
    Galster, Matthias
    et al.
    Univ Canterbury, New Zealand.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science. Katholieke Univ Leuven, Belgium.
    Empirical Research in Software Architecture How far have we come?2016In: 2016 13TH Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE, 2016, p. 11-20Conference paper (Refereed)
    Abstract [en]

    Context: Empirical research helps gain well-founded insights about phenomena. Furthermore, empirical research creates evidence for the validity of research results. Objective: We aim at assessing the state-of-practice of empirical research in software architecture. Method: We conducted a comprehensive survey based on the systematic mapping method. We included all full technical research papers published at major software architecture conferences between 1999 and 2015. Results: 17% of papers report empirical work. The number of empirical studies in software architecture has started to increase in 2005. Looking at the number of papers, empirical studies are about equally frequently used to a) evaluate newly proposed approaches and b) to explore and describe phenomena to better understand software architecture practice. Case studies and experiments are the most frequently used empirical methods. Almost half of empirical studies involve human participants. The majority of these studies involve professionals rather than students. Conclusions: Our findings are meant to stimulate researchers in the community to think about their expectations and standards of empirical research. Our results indicate that software architecture has become a more mature domain with regards to applying empirical research. However, we also found issues in research practices that could be improved (e.g., when describing study objectives and acknowledging limitations).

  • 200.
    Galster, Matthias
    et al.
    Univ Canterbury.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Tofan, Dan
    Univ Groningen.
    Michalik, Bartosz
    Avgeriou, Paris
    Univ Groningen.
    Variability in Software Systems-A Systematic Literature Review2014In: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520, Vol. 40, no 3, p. 282-306Article, review/survey (Refereed)
    Abstract [en]

    Context: Variability (i.e., the ability of software systems or artifacts to be adjusted for different contexts) became a key property of many systems. Objective: We analyze existing research on variability in software systems. We investigate variability handling in major software engineering phases (e.g., requirements engineering, architecting). Method: We performed a systematic literature review. A manual search covered 13 premium software engineering journals and 18 premium conferences, resulting in 15,430 papers searched and 196 papers considered for analysis. To improve reliability and to increase reproducibility, we complemented the manual search with a targeted automated search. Results: Software quality attributes have not received much attention in the context of variability. Variability is studied in all software engineering phases, but testing is underrepresented. Data to motivate the applicability of current approaches are often insufficient; research designs are vaguely described. Conclusions: Based on our findings we propose dimensions of variability in software engineering. This empirically grounded classification provides a step towards a unifying, integrated perspective of variability in software systems, spanning across disparate or loosely coupled research themes in the software engineering community. Finally, we provide recommendations to bridge the gap between research and practice and point to opportunities for future research.

1234567 151 - 200 of 913
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf