lnu.sePublikasjoner
Endre søk
Begrens søket
2345678 201 - 250 of 1054
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 201.
    Ennals, Richard
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för fysik och elektroteknik (IFE).
    Eight legs good, two legs bad? (review of three books)2018Inngår i: AI & Society: The Journal of Human-Centred Systems and Machine Intelligence, ISSN 0951-5666, E-ISSN 1435-5655, Vol. 33, nr 4, s. 645-646Artikkel, omtale (Annet vitenskapelig)
    Abstract [en]

    Review of:

    1. Common Sense, The Turing Test and the Quest for Real AI Hector J Levesque Cambridge MA, The MIT Press 2017 ISBN:978-0-262-03604-7

    2. The Digital Mind: How Science is Redefining Humanity Arlindo Oliveira Cambridge MA, The MIT Press 2017 ISBN: 978-0-262-03603-0

    3. Other Minds: The Octopus and the Evolution of Intelligent Life Peter Godfrey-Smith London, William Collins 2017 ISBN: 978-0-00-822627-5

  • 202.
    Ericsson, Morgan
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen. Datalogi.
    The Effects of XML Compression on SOAP Performance2007Inngår i: World Wide Web: Internet and Web Information Systems, ISSN 1386-145x, Vol. 10, nr 3, s. 279-307Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    ML is the foundation of the SOAP protocol, and in turn, Web Service communication. This self-descriptive textual format for structured data is renowned to be verbose. This verbosity can cause problems due to communication and processing overhead in resource-constrained environments (e.g., small wireless devices). In this paper, we compare different binary representations of XML documents. To this end, we propose a multifaceted and reusable test suite based on real-world scenarios. Our main result is that only simple XML compression methods are suitable for a wide range of scenarios. While these simple methods do not match the compression ratios of more specialized ones, they are still competitive in most scenarios. We also show that there are scenarios that none of the evaluated methods can deal with efficiently.

  • 203.
    Ericsson, Morgan
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Löwe, Welf
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Olsson, Tobias
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Toll, Daniel
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Wingkvist, Anna
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    A Study of the Effect of Data Normalization on Software and Information Quality Assessment2013Inngår i: Software Engineering Conference (APSEC, 2013 20th Asia-Pacific), IEEE Press, 2013, s. 55-60Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Indirect metrics in quality models define weighted integrations of direct metrics to provide higher-level quality indicators. This paper presents a case study that investigates to what degree quality models depend on statistical assumptions about the distribution of direct metrics values when these are integrated and aggregated. We vary the normalization used by the quality assessment efforts of three companies, while keeping quality models, metrics, metrics implementation and, hence, metrics values constant. We find that normalization has a considerable impact on the ranking of an artifact (such as a class). We also investigate how normalization affects the quality trend and find that normalizations have a considerable effect on quality trends. Based on these findings, we find it questionable to continue to aggregate different metrics in a quality model as we do today.

  • 204.
    Eriksson, Henry
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Arvidsson, Erik
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Nerén, Jonas
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Säkerhetsmedvetenhet: Hur studenter förhåller sig till säkerhet och lösenordshantering2013Independent thesis Basic level (university diploma), 5 poäng / 7,5 hpOppgave
    Abstract [sv]

    I dagens samhälle är lösenord en central del av var människas vardag. Medvetenheten om vikten av ett säkert lösenord och vilka hot mot informationssäkerheten som existerar är en viktig del av en organisations säkerhetsarbete. Arbetet undersökte hur studenter på Linnéuniversitetet hanterar sina lösenord samt hur medvetna de är om existerande hot och attacker som kan äventyra lösenordets integritet. För att samla in data genomfördes en enkätundersökning. Ett program skapades med syfte att betygsätta användarnas lösenord och på ett pedagogiskt vis utbilda dem i hur ett säkert lösenord skapas. Resultaten visade att studenter i hög grad återanvänder lösenord och att det finns skillnader mellan olika grupper i graden av säkerhetsmedvetenhet. De som mottagit någon form av utbildning inom IT-säkerhet har större kunskap om hot och attacker, samt hanterade sina lösenord på ett mer säkert sätt.

    Fulltekst (pdf)
    fulltext
  • 205.
    Eriksson, Oskar
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Implementing virtual analog synthesizers with the Web Audio API: An evaluation of the Web Audio API2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This thesis in computer science aimed to evaluate the suitability of the Web Audio API to implement virtual analog synthesizers. In order to do so a method for producing a reference architecture for analog synthesizers and a categorization and point system for the evaluation were developed. A reference architecture were made and then implemented with the API and the evaluation were then made based on that implementation. The API were found to cover a lot of the necessary areas, but lacking in a few key components; a noise generator, a native way to automate custom numeric properties and the implementation of the oscillator were deemed too closed to support all use cases. 

    Fulltekst (pdf)
    fulltext
  • 206.
    Eriksson, Per
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Wiklund, William
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    El-Hajj, Elie
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Analys och utvärdering av trådlösa nätverk i Kalmar: En säkerhetsundersökning2010Independent thesis Basic level (university diploma), 5 poäng / 7,5 hpOppgave
    Abstract [sv]

    Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:

    - Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?

    - Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?

    - Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?

    Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.

    Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.

    Fulltekst (pdf)
    FULLTEXT01
  • 207.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Abbas, Qaisar
    Uppsala University.
    Nordström, Jan
    Linköping University.
    A stable and conservative method for locally adapting the design order of finite difference schemes2011Inngår i: Journal of Computational Physics, ISSN 0021-9991, E-ISSN 1090-2716, Vol. 230, nr 11, s. 4216-4231Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    A procedure to locally change the order of accuracy of finite difference schemes is developed. The development is based on existing Summation-By-Parts operators and a weak interface treatment. The resulting scheme is proven to be accurate and stable.

    Numerical experiments verify the theoretical accuracy for smooth solutions. In addition, shock calculations are performed, using a scheme where the developed switching procedure is combined with the MUSCL technique.

  • 208.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Abbas, Qaisar
    Uppsala University.
    Nordström, Jan
    Uppsala University ; University of the Witvatersrand, South Africa ; FOI, The Swedish Defence Research Agency .
    A stable and conservative method of locally adapting the design order of finite difference schemes2010Inngår i: Proceedings of the 7th South African Conference on Computational and Applied Mechanics / [ed] S. Kok, D. Wilke & H. Inglis, South African Association for Theoretical and Applied Mechanics , 2010, s. 128-136Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    A procedure to switch the order of accuracy of finite difference schemes is developed. The development is based on existing Summation-By-Parts operators and a weak interface treatment. The resulting scheme is proven to be stable and accurate.

    Numerical experiments verify the theoretical accuracy for smooth solutions. In addition shock calculations is performed, using a scheme where the developed switching procedure is combined with the MUSCL technique for shock capturing.

    Fulltekst (pdf)
    FULLTEXT01
  • 209.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Law, Craig
    Gong, Jing
    Uppsala University.
    Nordström, Jan
    Uppsala University.
    Shock Calculations using a Very High Order Accurate Euler and Navier-Stokes Solver2009Inngår i: Proceedings of the Sixth South African Conference on Computational and Applied Mechanics, South African Association for Theoretical and Applied Mechanics , 2009, s. 63-73Konferansepaper (Annet vitenskapelig)
  • 210.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Nordström, Jan
    FOI, Swedish Defence Research Agency.
    Analysis of mesh and boundary effects on the accuracy of node-centered finite volume schemes2009Inngår i: 19th AIAA Computational Fluid Dynamics Conference, American Institute of Aeronautics and Astronautics, 2009, artikkel-id 3651Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The accuracy of the node-centered finite volume method in one-dimension is analyzed. Numerical simulations and analysis are performed for both a hyperbolic and a elliptic case, for various types of grids. The results from the simulations agree with the analysis. The boundary conditions are implemented weakly using penaly technique. For the hyperbolic case we see that the type of grid has large impact on the order of accuracy, whereas the choice of penaly parameter only affect the error constant. For the elliptic case the grid has less impact on the order of accuracy. For both the hyperbolic and elliptic problem we show that the error contribution from the primal and dual grid can be treated separately.

  • 211.
    Eriksson, Sofia
    et al.
    Uppsala University .
    Nordström, Jan
    Uppsala University ; The Swedish Defence Research Agency.
    Analysis of the order of accuracy for node-centered finite volume schemes2009Inngår i: Applied Numerical Mathematics, ISSN 0168-9274, E-ISSN 1873-5460, Vol. 59, nr 10, s. 2659-2676Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The order of accuracy of the node-centered finite volume methods is analyzed, and the analysis is based on an exact derivation of the numerical errors in one dimension. The accuracy for various types of grids are considered. Numerical simulations and analysis are performed for both a hyperbolic and a elliptic case, and the results agree. The impact of weakly imposed boundary conditions is analyzed and verified numerically. We show that the error contribution from the primal and dual grid can be treated separately.

  • 212.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Nordström, Jan
    Uppsala University.
    Analysis of the order of accuracy for node-centered finite volume schemes2009Rapport (Annet vitenskapelig)
    Abstract [en]

    The order of accuracy of the node-centered finite volume methods is analyzed, and the analysis is based on an exact derivation of the numerical errors in one dimension. The accuracy for various types of grids are considered. Numerical simulations and analysis are performed for both a hyperbolic and a eliptic case, and the results agree. The impact of weakly imposed boundary conditions is analyzed and verified numerically. We show that the error contribution from the primal and dual grid can be treated separately.

  • 213.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Svärd, Magnus
    Nordström, Jan
    Uppsala University.
    Simulations of Ground Effects on Wake Vortices at Runways2009Inngår i: Proceedings of the Sixth South African Conference on Computational and Applied Mechanics, South African Association for Theoretical and Applied Mechanics , 2009, s. 101-108Konferansepaper (Fagfellevurdert)
  • 214.
    Eriksson, Sofia
    et al.
    Uppsala University.
    Svärd, Magnus
    University of Oslo.
    Nordström, Jan
    Uppsala University.
    Simulations of Ground Effects on Wake Vortices at Runways2007Rapport (Annet vitenskapelig)
    Abstract [en]

    n this paper the interaction between two counter-rotating vortices is examined, and the performance of a newly developed finite difference code is discussed. The Reynolds numbers considered are low to medium, and the flow is compressible. Most of the computations are performed in a two dimensional domain, with different grid sizes, Reynolds number and order of accuracy of the scheme. Finally, a three dimensional computation is made in order to examine the relevance of the two dimensional model.

  • 215. Eryigit, Gülsen
    et al.
    Nivre, Joakim
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen. Datalogi.
    Oflazer, Kemal
    Dependency Parsing of Turkish2008Inngår i: Computational Linguistics, ISSN 0891-2017, Vol. 34, nr 3, s. 357-389Artikkel i tidsskrift (Fagfellevurdert)
  • 216.
    Espadoto, Mateus
    et al.
    University of São Paulo, Brazil.
    Martins, Rafael Messias
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap och medieteknik (DM).
    Kerren, Andreas
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap och medieteknik (DM).
    Hirata, Nina S. T.
    University of São Paulo, Brazil.
    Telea, Alexandru C.
    Utrecht University, The Netherlands.
    Towards a Quantitative Survey of Dimension Reduction Techniques2019Inngår i: IEEE Transactions on Visualization and Computer Graphics, ISSN 1077-2626, E-ISSN 1941-0506Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Dimensionality reduction methods, also known as projections, are frequently used in multidimensional data exploration in machine learning, data science, and information visualization. Tens of such techniques have been proposed, aiming to address a wide set of requirements, such as ability to show the high-dimensional data structure, distance or neighborhood preservation, computational scalability, stability to data noise and/or outliers, and practical ease of use. However, it is far from clear for practitioners how to choose the best technique for a given use context. We present a survey of a wide body of projection techniques that helps answering this question. For this, we characterize the input data space, projection techniques, and the quality of projections, by several quantitative metrics. We sample these three spaces according to these metrics, aiming at good coverage with bounded effort. We describe our measurements and outline observed dependencies of the measured variables. Based on these results, we draw several conclusions that help comparing projection techniques, explain their results for different types of data, and ultimately help practitioners when choosing a projection for a given context. Our methodology, datasets, projection implementations, metrics, visualizations, and results are publicly open, so interested stakeholders can examine and/or extend this benchmark.

  • 217.
    Evertsson, Jens
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Vilken standardkryptering är mest varaktig?: - Tester avseende några mobila operativsystems kryptering av filer och innehåll2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Är det möjligt att förlita sig på att de smarta mobiler som utnyttjar operativsystem bestående av Android, iOS eller Windows Phone, håller informationen skyddad från spridning om enheten blir stulen eller förläggs? Det här arbetet innefattar undersökandet av medföljande krypteringar för skydd av filer och dess innehåll på ett antal smarta mobiler som kör något av operativsystemen Android, iOS eller Windows Phone.

    En undersökning där resultatet blev att samtliga testade system är tämligen säkra utifall rätt förutsättningar finns tillhands, samt att mest varaktigast krypteringsalgoritmer innehas av Windows Phone i form av algoritmerna HMACSHA1 och HMACSHA256.

    Fulltekst (pdf)
    fulltext
  • 218.
    Evertsson, Jens
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Är HTML 5 redo för användning?: - Fokus på funktionalitet gällande utvecklingsspråkets nya taggar och attribut2011Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Det här arbetet innefattar html 5 i avseendet beträffande användning av dess nya taggar/attribut redan nu, även fastän år som 2022 eller 2014 har nämnts av vissa när det gäller utvecklingsspråkets färdigställande. Intresset bakom arbetet uppstod baserat på några olika saker. Först och främst vid studerandet inom kursen "Webbteknisk Introduktion" (som läses i samband med Webbprogrammerare-programmets första år (hösten 2009), hos Linnéuniversitet) där användning av nya taggar, och påståenden avseende att språket redan då kunde börja användas, samt även utvecklingsspråkets namn (eftersom innefattningen av språket består av mycket mer än taggar/attribut) bidrog. Av de nytillkomna taggarna/attributen, har automatiska tester (via Javascript) gentemot de senaste versionerna av webbläsarna (Maj 2011 samt Augusti 2011) bestående av Internet Explorer, Opera, Mozilla Firefox, Apples Safari och Google Chrome genomförts. Operativsystemen webbläsarna körts under består av Mac OS X Server 10.6.7 och Windows 7 Professional (x86). Avseende resultatet visar det att webbläsarna överlag har omkring 80 till 90 % stöd för de nytillkommna taggarna, även fastän alla nya attribut stöds olika i webbläsarna. Slutsatsen av testerna visar därmed att det blir en övervägning i avseendet beträffande vad som kan/bör/skall brukas.

    Fulltekst (pdf)
    Is_HTML5_Ready_for_use
  • 219.
    Fakhraddin, Haider
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap och medieteknik (DM).
    Toward IoT: Implementation of WSN based MQTT Data Protocol2019Independent thesis Advanced level (degree of Master (Two Years)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used as the data exchange protocol to aggregate the data from WSN that incorporated local and remote sensor. ATmega 328 microcontroller unit, NodeMCU development board, SIM800L GSM module and DHT11 sensor modules where used to implement the nodes while Raspberry Pi 3B was used to implement a gateway that acts as the MQTT broker in order to aggregate the data. The proposed system has been implemented and tested successfully. The power consumption for the remote sensor nodes consumed only 20 mWh and the response time for the data transferred within the system’s network from the remote sensor node to the server is about 7 milliseconds with a total error of 0.11%. The system shows an excellent performance and provide a simple solution to link remote sensors which are out of the gateway’s local network coverage.

    Fulltekst (pdf)
    my_thesis.pdf
  • 220.
    Fallman, Therese
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Effektiv administration i WordPress: En studie med fokus på användbarhet och hur detta kan optimeras i ett administrationsgränssnitt2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Det stora informationsflödet på webben innebär att organisationer och företag behöver kunna nå ut med konkurrenskraftig information till sin målgrupp på ett effektivt sätt. Innehållshanteringssystem som till exempel WordPress är ett hjälpmedel för detta men det innebär även att administration kan komma att hanteras av oerfarna användare. Det här arbetet behandlar hur det går att anpassa administrationsgränssnittet i WordPress för att förbättra dess användbarhet. Arbetet redogör även för definitionen av användbarhet samt vilka metoder det finns för att verifera det. För att försöka besvara frågeställningarna har det, förutom en litteraturstudie, genomförts en kvalitativ undersökning som inkluderade observation och experiment. Resultatet påvisar att det finns modifierbara faktorer i WordPress administrationspanel, vilka genom optimering kan inbringa en högre användbarhet och bättre effektivitet för oerfarna användare. Empirin visar även att det är komplicerat att begränsa definitionen av användbarhet, vilket därför resulterar i svårigheter att dra konkreta slutsatser. 

    Fulltekst (pdf)
    fulltext
  • 221.
    Febles Trujillo, Ivan
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    E-Patient Telemedicine Project2006Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    The aim of this thesis is to develop a Java web application with MySql that provides a useful tool for those people that have to handle with diabetes in their normal life.

    The idea is that both patients and doctors will use this prototype for exchanging useful information and thus reduce some of the multiple inconvenient that this disease has.

    The solution proposed in this project can be generalized to cover other aspects of the communication between the patient and the doctor.

    Fulltekst (pdf)
    FULLTEXT01
  • 222.
    Felizardo, Katia Romero
    et al.
    Federal Technological University of Paraná, Brazil.
    Barbosa, Ellen Francine
    University of São Paulo, Brazil.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Valle, Pedro Henrique Dias
    University of São Paulo, Brazil.
    Maldonado, José Carlos
    University of São Paulo, Brazil.
    Visual Text Mining: Ensuring the Presence of Relevant Studies in Systematic Literature Reviews2015Inngår i: International journal of software engineering and knowledge engineering, ISSN 0218-1940, Vol. 25, nr 5, s. 909-928Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    One of the activities associated with the Systematic Literature Review (SLR) process is the selection review of primary studies. When the researcher faces large volumes of primary studies to be analyzed, the process used to select studies can be arduous. In a previous experiment, we conducted a pilot test to compare the performance and accuracy of PhD students in conducting the selection review activity manually and using Visual Text Mining (VTM) techniques. The goal of this paper is to describe a replication study involving PhD and Master students. The replication study uses the same experimental design and materials of the original experiment. This study also aims to investigate whether the researcher's level of experience with conducting SLRs and research in general impacts the outcome of the primary study selection step of the SLR process. The replication results have con¯rmed the outcomes of the original experiment, i.e., VTM is promising and can improve the performance of the selection review of primary studies. We also observed that both accuracy and performance increase in function of the researcher's experience level in conducting SLRs. The use of VTM can indeed be beneficial during the selection review activity.

  • 223.
    Felizardo, Katia Romero
    et al.
    University of São Paulo, Brazil.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Maldonadon, José Carlos
    University of São Paulo, Brazil.
    Lopes, Alneu de Andrade
    University of São Paulo, Brazil.
    Minghim, Rosane
    University of São Paulo, Brazil.
    Content based visual mining of document collections using ontologies2009Inngår i: II Workshop on Web and Text Intelligence (WTI) 2009, 2009Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Document collections are important data sets in many applications. It has been shown that content based visual mappings of documents can be done effectively through projection and point placement strategies. An important step in this process is the creation of a vector space model, in which terms selected from the text and weighted are used as attributes for the vector space. That step in many cases impairs the quality of the projection due to the existence, in the data set, of many terms that are frequent but do not represent important concepts in the user's particular context. This paper proposes and evaluates the use of ontologies for content based visual analysis of textual data sets as a means to improve the displays for the analysis of the collection. The results show that when the ontology effectively represents the data domain it increases quality of maps.

  • 224.
    Felizardo, Katia Romero
    et al.
    University of São Paulo, Brazil.
    Salleh, Norsaremah
    International Islamic University, Malaysia.
    Martins, Rafael Messias
    University of São Paulo, Brazil.
    Mendes, Emilia
    University of Auckland, New Zealand.
    MacDonell, Stephen G.
    University of Auckland, New Zealand.
    Maldonado, José Carlos
    University of São Paulo, Brazil.
    Using visual text mining to support the study selection activity in systematic literature reviews2011Inngår i: 2011 Fifth International Symposium on Empirical Software Engineering and Measurement, ESEM 2011: Proceedings, Washington: IEEE, 2011, s. 77-86Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Background: A systematic literature review (SLR) is a methodology used to aggregate all relevant existing evidence to answer a research question of interest. Although crucial, the process used to select primary studies can be arduous, time consuming, and must often be conducted manually.

    Objective: We propose a novel approach, known as 'Systematic Literature Review based on Visual Text Mining' or simply SLR-VTM, to support the primary study selection activity using visual text mining (VTM) techniques. Method: We conducted a case study to compare the performance and effectiveness of four doctoral students in selecting primary studies manually and using the SLR-VTM approach. To enable the comparison, we also developed a VTM tool that implemented our approach. We hypothesized that students using SLR-VTM would present improved selection performance and effectiveness.

    Results: Our results show that incorporating VTM in the SLR study selection activity reduced the time spent in this activity and also increased the number of studies correctly included.

    Conclusions: Our pilot case study presents promising results suggesting that the use of VTM may indeed be beneficial during the study selection activity when performing an SLR.

  • 225.
    Fellman, Daniel
    et al.
    Umeå University, Sweden.
    Lincke, Alisa
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap och medieteknik (DM).
    Berge, Elias
    Hypocampus AB, Sweden.
    Jonsson, Bert
    Umeå University, Sweden.
    Predicting Visuospatial and Verbal Working Memory by Individual Differences in E-Learning Activities2020Inngår i: Frontiers in Education, E-ISSN 2504-284X, Vol. 5, artikkel-id 22Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    E-learning is being considered as a widely recognized option to traditional learning environments, allowing for highly tailor-made adaptive learning paths with the goal to maximize learning outcomes. However, for being able to create personalized e-learning systems, it is important to identify relevant student prerequisites that are related learning success. One aspect crucial for all kind of learning that is relatively unstudied in relation to e-learning is working memory (WM), conceptualized as the ability to maintain and manipulate incoming information before it decays. The aim of the present study was to examine how individual differences in online activities is related to visuospatial- and verbal WM performance. Our sample consisted of 98 participants studying on an e-learning platform. We extracted 18 relevant features of online activities tapping on Quiz accuracy, Study activity, Within-session activity, and Repetitive behavior. Using best subset multiple regression analyses, the results showed that individual differences in online activities significantly predicted verbal WM performance (p < 0.001, R2Adjusted = 0.166), but not visuospatial WM performance (p = 0.058, R2Adjusted= 0.065). The obtained results contribute to the existing research of WM in e-learning environments, and further suggest that individual differences in verbal WM performance can be predicted by how students interact on e-learning platforms.

    Fulltekst (pdf)
    fulltext
  • 226.
    Ferati, Mexhid
    et al.
    Oslo and Akershus University College of Applied Sciences, Norway.
    Vogel, Bahtijar
    Malmö University.
    Kurti, Arianit
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV). Interactive Institute Swedish ICT.
    Raufi, Bujar
    South East European University, Macedonia.
    Astals, David Salvador
    Universitat Autònoma de Barcelona, Spain.
    Web Accessibility for Visually Impaired People: Requirements and Design Issues2016Inngår i: Usability- and Accessibility-Focused Requirements Engineering: First International Workshop, UsARE 2012, Held in Conjunction with ICSE 2012, Zurich, Switzerland, June 4, 2012 and Second International Workshop, UsARE 2014, Held in Conjunction with RE 2014, Karlskrona, Sweden, August 25, 2014, Revised Selected Papers / [ed] Ebert, Achim; Humayoun, Rukh Shah; Seyff, Norbert; Perini, Anna; Barbosa, D.J. Simone, Cham: Springer, 2016, s. 79-96Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Access to web content continues to be a challenge for the visually impaired, as the needs of such community are very diverse. The access is further hindered by the fact that designers continue to build websites non-compliant with Web Content Accessibility Guidelines (WCAG). To better understand the needs of the visually impaired community, three workshops were organized with various stakeholders coming from three different countries. The results from the workshops suggest that one-solution-fits-all model is inadequate without considering the levels of visual impairment when providing customized web experience. A set of requirements devised from the workshops guided the process of building a middleware prototype. Using eight adaptation techniques, the prototype provides the required user experience based on users level of visual impairment. Preliminary evaluation of the middleware suggests that several adaptation techniques perform better with non-WCAG compliant websites compared to those being compliant.

  • 227. Filieri, Antonio
    et al.
    Maggio, Martina
    Angelopoulos, Konstantinos
    D'Ippolito, Nicolás
    Gerostathopoulos, Ilias
    Berndt Hempel, Andreas
    Hoffmann, Henry
    Jamshidi, Pooyan
    Kalyvianaki, Evangelia
    Klein, Cristian
    Krikava, Filip
    Misailovic, Sasa
    Papadopoulos, Alessandro Vittorio
    Ray, Suprio
    Sharifloo, Amir M.
    Shevtsov, Stepan
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Ujma, Mateusz
    Vogel, Thomas
    Software engineering meets control theory2015Inngår i: Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Piscataway, NJ, USA: IEEE Press, 2015, s. 71-82Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The software engineering community has proposed numerous approaches for making software self-adaptive. These approaches take inspiration from machine learning and control theory, constructing software that monitors and modifies its own behavior to meet goals. Control theory, in particular, has received considerable attention as it represents a general methodology for creating adaptive systems. Control-theoretical software implementations, however, tend to be ad hoc. While such solutions often work in practice, it is difficult to understand and reason about the desired properties and behavior of the resulting adaptive software and its controller.

    This paper discusses a control design process for software systems which enables automatic analysis and synthesis of a controller that is guaranteed to have the desired properties and behavior. The paper documents the process and illustrates its use in an example that walks through all necessary steps for self-adaptive controller synthesis.

  • 228.
    Flammini, Francesco
    Ansaldo STS, Italy.
    Formal Evaluation of a Majority Voting Concept to Improve the Dependability of Multiple Technology Sensors2010Inngår i: Journal of Physical Security, ISSN 2157-8443, Vol. 4, nr 1, s. 1-9Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Finding a good trade-off among the probability of detection (POD), the false alarm rate (FAR) and the reliability of detectors is a very important task in physical security system design. Existing solutions try to achieve this aim either by using the most advanced technologies or by combining basic sensors in logical OR/AND relations. However, these approaches are either not cost-effective or they do not allow for the necessary flexibility to obtain the right balance. In this paper I propose a majority voting scheme for multiple technology detectors which I evaluate using stochastic modelling techniques. This solution has the major advantages that it permits good overall dependability while using low-cost detectors, and also enables a precise fine tuning of POD and FAR parameters. To the best of my knowledge, no similar system has been studied in depth in the research literature. I provide a set of results which clearly show the advantages of the proposed approach.

    Fulltekst (pdf)
    fulltext
  • 229. Flammini, Francesco
    et al.
    Bologna, SandroVittorini, Valeria
    Computer Safety, Reliability, and Security: Proceedings of the 30th international conference on Computer safety, reliability, and security2011Collection/Antologi (Fagfellevurdert)
    Abstract [en]

    This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011.

    The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.

  • 230. Flammini, Francesco
    et al.
    Gaglione, Andrea
    Mazzocca, Nicola
    Moscato, Vincenzo
    Pragliola, Concetta
    On-line integration and reasoning of multi-sensor data to enhance infrastructure surveillance2009Inngår i: Journal of Information Assurance and Security, ISSN 1554-1010, E-ISSN 1554-1029, Vol. 4, nr 3, s. 183-191Artikkel i tidsskrift (Fagfellevurdert)
  • 231. Flammini, Francesco
    et al.
    Gaglione, Andrea
    Pragliola, Concetta
    Model-based early warning and decision support to improve infrastructure surveillance’2009Inngår i: ERCIM News, nr 78Artikkel i tidsskrift (Annet vitenskapelig)
  • 232.
    Fong, Cheng
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Användarvänlig sökfunktionalitet och resultatvisning på webben2011Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    I detta arbete undersöks hur man konstruerar en sökfunktion och hur sökresultatvisningen görs på bästa sätt. Sökfunktionen är oftast en central del på en webbsida idag och fyller en viktig roll för om en webbsida skall bli framgångsrik eller inte. Om informationen inte går att hitta på ett enkelt sätt kan webbsidan tappa sina användare ganska snabbt. Även presentationen av sökresultaten kan vara en vital del där logik, design och layout är viktiga aspekter som inte får förbises. Det finns således en hel del faktorer att ta hänsyn till som webbutvecklare.

    Rapporten går igenom några utvalda best-practice metoder från områden som layout, sökfält, sökresultat och paginering med syftet att identifiera viktiga och användbara metoder. En analys av 10 webbsidor samt en enkätundersökning genomfördes för att undersöka om metoderna tillämpades i verkligheten samt om det var metoder som användare efterfrågar. Arbetet resulterade i en sammanställning av viktiga faktorer som rekommenderas vid konstruktion av en användarvänlig sökfunktion och presentation av sökresultat.

    Fulltekst (pdf)
    Examensarbete
  • 233.
    Fonseca, David
    et al.
    La Salle, Universitat Ramon Llull, Barcelona, Spain.
    Zabulis, Xenophon
    Foundation for Research and Technolgy, Crete, Greece.
    Ramzan, Naeem
    Queen Mary University of London, London, United Kingdom.
    Kurti, Arianit
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Pileggi, Salvatore Flavio
    Universidad Politécnica de Valencia, Valencia, Spain.
    Ko, Heedong
    Image Media Research Center, Seoul, South Korea.
    1st international ACM workshop on user experience in e-learning and augmented technologies in education2012Inngår i: MM'12 Proceedings of the 20th ACM international conference on Multimedia, ACM Press, 2012, s. 1519-1520Konferansepaper (Fagfellevurdert)
    Abstract [en]

    UXeLATE2012 is the 1st International ACM Workshop on User Experience in e-Learning and Augmented Technologies in Education in conjunction with the ACM International Multimedia Conference (MM'12) at Nara, Japan. The workshop has a half day program, with a selection of six papers, and one keynote talk of a recognized expert in the field of usability, mobile technology and education.

  • 234.
    Forsman, Erik
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Skoglund, Andreas
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.

    Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks.

    Fulltekst (pdf)
    fulltext
  • 235.
    Fransson, Rebecca
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Driaguine, Alexandre
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Comparing Progressive Web Applications with Native Android Applications: An evaluation of performance when it comes to response time2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Web applications are often described as being cross-platform. They are accessible from a multitude of different web browsers, which in turn are running on a multitude of different operating systems. For a time now, developers have used many different tools to create cross-platform applications for mobile devices with web technologies. However, these applications fail to deliver when taken out of their native environment, and often do not feel native at all. Enter Progressive Web Applications, PWA. PWA’s are applications written for the web with web technologies, running in a browser,  but seasoned with some techniques that can make them behave like a native application when running on a mobile device. They are just ordinary web applications with native behaviour such as offline support, installability, and push notifications. The question that arises is - can this new type of web applications match Native Android Applications in performance, especially the response time when accessing the device's hardware? This report will try to answer that question

    Fulltekst (pdf)
    fulltext
  • 236.
    Franzén, Jesper
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Svensson, Mikael
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Analys av intern nätverkssäkerhet på en gymnasieskola2010Independent thesis Basic level (university diploma), 5 poäng / 7,5 hpOppgave
    Abstract [sv]

    Detta examensarbete beskriver dator- och nätverkssäkerhet. Syftet med detta examensarbete är att undersöka den interna nätverkssäkerheten på en gymnasieskola. Speciellt viktigt att undersöka är de kriterier skolan har, om kriterierna uppfylls och på vilket sätt dessa kan testas. Tester utfördes gällande säkerhetsprogramvaran för att säkerställa att den verkligen var säker mot intrång. Tester genomfördes även för att kontrollera att elevdatorerna hade ett BIOS-lösenord närvarande, att eleverna hade lagringsutrymme på servern men inte kunde överskrida lagringskvoten, och att eleverna var lokala administratörer på en bärbar klientdator. Ansvarig IT-tekniker på gymnasieskolan tillhandahöll information om hur nätverket var tänkt att se ut utifrån klientanvändarnas perspektiv. En experimentell metod användes för att fastställa om skolans interna nätverk var skyddat mot interna hot. Referenser från internet, såsom artiklar och databaser, har använts. Även böcker och muntlig kommunikation har använts som referenser. Efter vår analys av gymnasieskolans interna nätverkssäkerhet, konstateras att eleverna inte kan utföra otillåtna åtgärder inom det interna datornätverket som resultat av felkonfigurationer eller sårbarheter som har upptäckts av denna analys. En genomgång av den fysiska säkerheten gällande gymnasieskolans datornätverk och en genomgång av den externa säkerheten i nätverket föreslås.

    Fulltekst (pdf)
    FULLTEXT01
  • 237.
    Fröderberg, Håkan
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Komprimering av e-post2004Independent thesis Basic level (degree of Bachelor)Oppgave
    Abstract [sv]

    E-postmeddelanden är något som de flesta av oss använder. Hur vi använder oss av e-post skiljer sig från person till person. Vi har identifierat flera olika användningssätt, till exempel att skicka en text, bifoga filer eller skicka en rolig bild. I den här rapporten studeras ett par olika sätt att med hjälp av komprimering av hela e-postmeddelanden minska datavolymen och därmed den tid det tar transportera meddelanden. Caslon Analythics spår att det 2005 kommer att skickas 236 miljarder e-postmeddelanden. En minskning av meddelandens storlek kommer ha en positiv effekt på belastningen av nätverk. Ett plugin som används av Qualcomm Eudora har skapats för att visa se vilket resultat som kan uppnås. Det använder sig av ett komprimerings-biblioteket vid namn zlib och Eudoras API för plugins. Om man utgår från okomprimerade texter och/eller filer så kan man med hjälp av detta plugin och diverse tester konstatera att man kan minska den plats som ett e-postmeddelande upptar på lagringsutrymmet med upp till 70 procent. Stor vinst kan alltså göras i både tid och plats.

    Fulltekst (pdf)
    FULLTEXT01
  • 238.
    Färlind, Filip
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Ottosson, Kim
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Servervirtualisering idag: En undersökning om servervirtualisering hos offentliga verksamheter i Sverige2014Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    I dagens läge saknas en sammanställning av hur servervirtualisering är implementerat och hur det fungerar hos olika verksamheter i Sverige. Detta arbete har därför, genom en enkätundersökning, besvarat frågeställningen: "Hur ser servervirtualiseringen ut hos kommuner och landsting i Sverige?" Resultaten visade bl.a. att servervirtualisering är väl implementerat av kommuner och landsting i Sverige. Resultaten var dessutom väldigt lika mellan dessa organisationer. Det genomförda arbetet ger olika typer av verksamheter stöd vid planering och implementering av servervirtualisering.

    Fulltekst (pdf)
    fulltext
  • 239.
    Galindo, Noel
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Adaptive code based in Aspect Oriented Programming paradigm2009Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Fulltekst (pdf)
    FULLTEXT01
  • 240.
    Gallardo Salas, Carlos
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Extremera Sánchez, Adrián
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Web Development Frameworks: Ruby on Rails VS Google Web Toolkit2011Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Web programming is getting more and more important every day and as a consequence, many new tools are created in order to help developers design and construct applications quicker, easier and better structured. Apart from different IDEs and Technologies, nowadays Web Frameworks are gaining popularity amongst users since they offer a large range of methods, classes, etc. that allow programmers to create and maintain solid Web systems.This research focuses on two different Web Frameworks: Ruby on Rails and Google Web Toolkit and within this document we will examine some of the most important differences between them during a Web development.

    Fulltekst (pdf)
    fulltext
  • 241.
    Galster, Matthias
    et al.
    Univ Canterbury, New Zealand.
    Weyns, Danny
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV). Katholieke Univ Leuven, Belgium.
    Empirical Research in Software Architecture How far have we come?2016Inngår i: 2016 13TH Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE, 2016, s. 11-20Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Context: Empirical research helps gain well-founded insights about phenomena. Furthermore, empirical research creates evidence for the validity of research results. Objective: We aim at assessing the state-of-practice of empirical research in software architecture. Method: We conducted a comprehensive survey based on the systematic mapping method. We included all full technical research papers published at major software architecture conferences between 1999 and 2015. Results: 17% of papers report empirical work. The number of empirical studies in software architecture has started to increase in 2005. Looking at the number of papers, empirical studies are about equally frequently used to a) evaluate newly proposed approaches and b) to explore and describe phenomena to better understand software architecture practice. Case studies and experiments are the most frequently used empirical methods. Almost half of empirical studies involve human participants. The majority of these studies involve professionals rather than students. Conclusions: Our findings are meant to stimulate researchers in the community to think about their expectations and standards of empirical research. Our results indicate that software architecture has become a more mature domain with regards to applying empirical research. However, we also found issues in research practices that could be improved (e.g., when describing study objectives and acknowledging limitations).

  • 242.
    Galster, Matthias
    et al.
    Univ Canterbury.
    Weyns, Danny
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Tofan, Dan
    Univ Groningen.
    Michalik, Bartosz
    Avgeriou, Paris
    Univ Groningen.
    Variability in Software Systems-A Systematic Literature Review2014Inngår i: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520, Vol. 40, nr 3, s. 282-306Artikkel, forskningsoversikt (Fagfellevurdert)
    Abstract [en]

    Context: Variability (i.e., the ability of software systems or artifacts to be adjusted for different contexts) became a key property of many systems. Objective: We analyze existing research on variability in software systems. We investigate variability handling in major software engineering phases (e.g., requirements engineering, architecting). Method: We performed a systematic literature review. A manual search covered 13 premium software engineering journals and 18 premium conferences, resulting in 15,430 papers searched and 196 papers considered for analysis. To improve reliability and to increase reproducibility, we complemented the manual search with a targeted automated search. Results: Software quality attributes have not received much attention in the context of variability. Variability is studied in all software engineering phases, but testing is underrepresented. Data to motivate the applicability of current approaches are often insufficient; research designs are vaguely described. Conclusions: Based on our findings we propose dimensions of variability in software engineering. This empirically grounded classification provides a step towards a unifying, integrated perspective of variability in software systems, spanning across disparate or loosely coupled research themes in the software engineering community. Finally, we provide recommendations to bridge the gap between research and practice and point to opportunities for future research.

  • 243.
    Gao, Yuan
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Dimension Identification in Data Warehouse Based on Activity Theory2006Independent thesis Advanced level (degree of Master (One Year)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Nowadays, business intelligence techniques are applied more and more often in different settings including corporations and organizations both in the private and public sector. It is really a broad field which can assist business people to realize the state of their organization and make profitable decisions.

    In this thesis, I will focus on one of its components, data warehouse, by proposing activity theory as the method to solve the dimension identification problem in data warehouse. Under the background of project IMIS and the involved personnel, who determine the dimension, firstly I study how to use the ER method, “bottom up” method, and activity theory method to identify the dimension in data warehouse, and some relevant knowledge about the three methods. Then, we apply the three methods to identify the dimension. After that, I evaluate the dimension identification results of the three methods according to the feedback from the healthcare organization to get their veracity and integrality. Finally, based on the results of my efforts, I arrive to the conclusion that the activity theory method can be applied to identify the dimension in data warehouse, and with the comparison to the other two traditional methods (ER model and “bottom up”), the activity theory method is more easy and natural to identify the dimension of a dimensional model.

    Fulltekst (pdf)
    FULLTEXT01
  • 244.
    Garcia Perez, David
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV). Universitat Autònoma de Barcelona.
    Simulation of AssistiveSystems for Elderly People2014Independent thesis Advanced level (degree of Master (Two Years)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Aging population is becoming a problem in a lot of countries, being Swedenone of them, and that is leading society to a lack of the necessary peopleto take care of all the elderly people. The CareIP device, an alarm systemfor the elderly people, with which they are able to ask for assistive help incase they need it, has been used all over Sweden for a while now. In thisthesis, a simulation model has been built in order to study how this caregiving system works in the specic case of Vaxjo. This model can be usedto simulate real situations and prevent certain problems as it could be thelack or excess of resources, long waiting times or unexpected increase on thenumber of alarms, which could lead to critical situations on a emergencyhealthcare system.

    Fulltekst (pdf)
    Master_Thesis
  • 245.
    Geisler, Markus
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    A Machine Learning Component for an Optimized Context-Aware Web Service Selection based on Decision Trees for a Future Service Market2013Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Fulltekst (pdf)
    5DV01E_MasterThesis_MarkusGeisler
  • 246.
    Geisler, Markus
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Optimized context-aware Webservice selection within a future service market based on machine learning methods2013Student paper first term, 10 poäng / 15 hpOppgave
  • 247.
    Gelber, Natan
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Bridging Component Models and Integration problems2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Component based software engineering promotes the use of software component as a cor-

    ner stone for new software. Taken from other manufacturing fields, the vision of selecting

    the components needed and building them as Lego to create a new software seems to of-

    fer enormous advantages for software development. Worldwide, industry and scholars are

    trying to remove the obstacles obstructing this course of action. This report names some

    of the problems that software integrators and developers face. It concentrates on low-level

    communication and other aspects of integration problems. it is based upon practical and

    theoretical research. the conclusion of the report is that while each problem can be solved

    in and of itself, these solutions often lead to the creation of new problems, and therefore

    leave ample room for further research.

    Fulltekst (pdf)
    FULLTEXT01
  • 248.
    Gerdzhikov, Petko
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Behaviour of Port-knocking authentication mechanism2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Port-knocking is a security mechanism used in computer systems to hide available network services. Its operation relies on a drop policy firewall setting in order to make impossible for port-scanning attacks to occur. This project researches the impact of implementing such a software solution. Furthermore, it looks into the behavior of three chosen implementations and make conclusions on the benefits and disadvantages that they bring. In addition, the surrounding implications related to both user and administrator are explored. This thesis includes tests on the resource consumption of the implementations as well as records of the added delay of using the mechanism when initiating a SSH session. There has not been such research performed in this field and the results of it could be beneficial to those who are involved in computer science and network security in particular. Finally, the product of this study state that port-knocking is overlooked and has great benefits in preventing zero-day exploits and hacker tools relying on exposed network services.

    Fulltekst (pdf)
    fulltext
  • 249.
    Ghotb khosrowshahi, seyedeh parastou
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Barakpour, kamran
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Is a graph-based interface more efficient than a traditional one for channel discovery?2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    There are several applications which make it possible for users to search and find their favorite channels; these channels could be anything such as TV channels, radio channels, blogs, websites, etc. Is a graph-based interface more efficient than a traditional one for channel discovery? The aim of this thesis is to answer the question by developing a new browsing method in a graphical user-friendly interface and compare it with a traditional hierarchical method. A graphical application is a graph-based application, in which the nodes (or vertices) represent channels and the edges represent the links among channels. The graphical application is built with the newest Hypertext Markup Language Standard (HTML5) and Cascading Style Sheets (CSS3). A large part of the graphical application is built using the JavaScript library Sigma.js. The resulting graphical application is tested with users and compared with the traditional hierarchical user interface. A questionnaire is provided for end-users to gather feedback. After analyzing the participant‟s feedback, the results were surprising and interesting. A majority of participants enjoyed interacting with graphical application, and they were interested to use it in the future. The final result is merged into the thesis report. This thesis includes all the work of creating graphical and hierarchical user interfaces, testing the hierarchical and graphical user interfaces, and analyzing the user‟s feedback.

    Fulltekst (pdf)
    fulltext
  • 250.
    Giemza, Adam
    et al.
    University of Duisburg-Essen.
    Bollen, Lars
    University of Twente.
    Jansen, Marc
    University of Applied Sciences Ruhr West.
    Hoppe, Ulrich
    University of Duisburg-Essen.
    A flexible unified architecture to support heterogeneous multi-device learning environments2013Inngår i: International Journal of Mobile Learning and Organisation, ISSN 1746-725X, E-ISSN 1746-7268, Vol. 7, nr 3/4, s. 210-223Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Since the personal ownership of mobile devices has increased steadily over the last decade, many students own personal mobile devices that can reasonably be integrated into mobile learning scenarios. Besides all the benefits this option brings, there are also drawbacks, such as the heterogeneity of the set of mobile devices that need to be managed and integrated into existing and emerging learning scenarios. In our approach, one key element to address this challenge is an architecture that allows an easy and flexible integration of mobile and non-mobile devices into the same (mobile) learning scenario. We used a well-known group discussion method and an existing tool and extended it based on our approach. A description of this extension is presented in this paper. Finally, the paper reports on a pilot study in which the extended system was evaluated.

     

2345678 201 - 250 of 1054
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf