Change search
Refine search result
123456 1 - 50 of 292
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Af Ugglas, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Accounting Management on a DTM Network1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Large investments are currently being made for the infrastructure of voice and data services. The network providers’ revenues consist of fees from the users of the network. Until today it has been difficult to charge for the actual usage, instead so-called flat rate charging has been applied.

    Dynamic synchronous Transfer Mode (DTM) is a circuit switched technique that is designed to meet the requirements of future multimedia services. This includes support for real time applications and high throughput. Physically separated channels, whose capacity can easily be adjusted to the users’ demands, provide the service. The channels and their guaranteed service make DTM a very interesting technique when it comes to charging for network usage, as the characteristics of the channel can be easily described by relatively few parameters.

    This thesis describes how accounting management can be applied on a DTM network. It identifies the parameters that need to be collected and describes how to gather these parameters into call data records (CDRs). Furthermore, it outlines how the transportation of the CDRs to the network providers’ billing system can be performed.

  • 2.
    Ahlin, Lars
    et al.
    Swedish Defence Research Agency (FOI).
    Englund, Eva
    FOI.
    Jönsson, Christian
    FOI.
    Söderquist, Ingrid
    FOI.
    Zander, Jens
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Automous Tactical Communications Possibilities and Problems1997In: MILCOM 97 Proceedings, 1997, 393-397 p.Conference paper (Refereed)
    Abstract [en]

    In the battlefield of the future, more and more information will be available for making decisions on a tactical level, provided that this information can be dispersed rapidly and accurately. As a consequence, advanced tactical decision support that now is limited to advanced platforms (e.g. combat aircrafts) will become available at a much lower level, ranging from different kinds of vehicles, down to the individual soldier by means of ultra-light weight ``wearable'' equipment.

    Establishing reliable wireless communications in such a large group of users with unprecidented bandwidth demands and requirements on survivability constitutes a considerable enginerring challenge. In the paper we will, after a short review of some existing approaches, investigate the specific engineering challenges and the fundamental limitations of such low level, autonomous communication systems. Further we give an example of a system architecture, harmonized with a proposed structure for third generation commercial wireless systems (e.g. UMTS). Our conclusions show that mainly distributed computing complexity, device power consumption and available bandwidth constitute the fundamental problems.

  • 3. Aitken, Candice L.
    et al.
    Gorniak, Richard J. T.
    New York University.
    Kramer, Elissa L.
    New York University.
    Noz, Marilyn E.
    New York University.
    Farrell, Eward J.
    IBM Research.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Reddy, David P.
    Comparison of three methods used for fusion of SPECT-CT images of liver matastases1998In: Fusion98, International Conference on Multisource-Mulltisensor Information Fusion / [ed] Hamid R. Arabnia and Dongping (Daniel) Zhu, CSREA Press , 1998, 435-442 p.Conference paper (Refereed)
    Abstract [en]

    We compare three methods for fusing SPECT-CT images: ImageMatch - an automatic three-dimensional/two-dimensional method developed by Focus Imaging; IBM Visualization Data Explorer - a three-diemensional interactive method developed by Internation Business Machines, Inc.; and qsh - an interactive three-dimensional/two-dimensional method developed at New York University. While many fusion methods have proved successful for registering brain images, most methods have been less successful for thoracic and abdominal images. We use images of liver metastases obtained with a radiolabeled breast tumor-directed antibody to illustrate the strengths and weakness of the methods reviewed. The images used are typical clinical images from eigth patients. We conclude that an optimal image fusion program should combine the strengths of each of the methods reviewed.

  • 4.
    Aitken, Candice L.
    et al.
    New York University.
    McGuinness, Georgeann
    New York University.
    Siddiqui, Faaiza
    New York University.
    Ton, Anthony
    New York University.
    Kramer, Elissa L
    New York University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Noz, Marilyn E.
    New York University, Department of Radiology.
    Tumor localization and image registration of 18-FDG SPECT scans with CT scans1999In: Journal of Nuclear Medicine, ISSN 0161-5505, E-ISSN 1535-5667, Vol. 40, no 5, 290P-291P p.Article in journal (Refereed)
    Abstract [en]

    PURPOSE:

    The aim of this study was to determine the feasibility of registering routine clinical F-18 fluorodeoxyglucose (FDG) coincidence detection (CD) scans with computed tomographic (CT) scans for radiation treatment planning and case management.

    METHODS:

    F-18 FDG CD and chest CT scans, performed in 10 randomly selected patients with confirmed or possible adenocarcinoma of the lung, were evaluated. The quality of the matches was verified by comparisons of the center-to-center distance between a region of interest (ROI) manually drawn on the CT slice and warped onto the CD slice with an ROI drawn manually directly on the CD slice. In addition, the overlap between the two ROIs was calculated.

    RESULTS:

    All 10 F-18 FDG CD and CT scans were registered with good superimposition of soft tissue density on increased radionuclide activity. The center-to-center distance between the ROIs ranged from 0.29 mm to 8.08 mm, with an average center-to-center distance of 3.89 mm +/- 2.42 mm (0.69 pixels +/- 0.34 pixels). The ROI overlap ranged from 77% to 99%, with an average of 90% +/- 5.6%.

    CONCLUSIONS:

    Although the use of F-18 FDG CD shows great promise for the identification of tumors, it shares the same drawbacks as those associated with radiolabeled monoclonal antibody SPECT and ligand-based positron emission tomographic scans in that anatomic markers are limited. This study shows that image registration is feasible and may improve the clinical relevance of CD images.

  • 5.
    Al-Sheikhly, Yavor
    KTH, Superseded Departments, Teleinformatics.
    Implementing policy-based network management1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The aim of this thesis project is to help Ericsson implement policy-based network management. The department where the work is conducted is migrating to a new management platform, making it suitable to change the approach towards network management at the same time. An overview of the idea of policy based management will be given, together with suggestions on what is needed to successfully implement this strategy. Examples are presented on how to implement certain policies, given the new management platform. Finally, I present my conclusions of what is the proper path to a policy-based network management system for Ericsson’s internal use and describe future extensions.

  • 6.
    Anderlind, Erik
    KTH, Superseded Departments, Teleinformatics.
    Radio Access Layer Service Guarantee1994In: Personal, Indoor and Mobile Radio Communications, 1994. Wireless Networks - Catching the Mobile Future., New York: IEEE , 1994, 670-674 p.Conference paper (Refereed)
    Abstract [en]

    A flexible structure for a future wireless system will allow users with different applications, such as speech, file transfers and video, to share the same radio channel. In this paper a versatile concept for dividing scarce resources is presented. Users submit a specification of their resource need and acceptable QoS levels, along with a price they are prepared to pay. The network calculates bids as a function of these specifications and resource costs. Continued service is awarded to the set of users with the highest bids. Costs for decreasing or discontinuing service (network goodwill loss) can easily be accounted for.

  • 7.
    Anderlind, Erik
    KTH, Superseded Departments, Teleinformatics.
    Resource allocation for heterogenous traffic in a wireless network1995Report (Other academic)
    Abstract [en]

    We propose a distributed algorithm for radio bandwidth assignment to a user population where bandwidth requirements can vary substantially between different users. The performance is compared, on merits of blocking and total network throughput, to that of a similar network employing a fixed number of channels per cell. The results show that bandwidth utilization increases by an order of magnitude. The throughput of the adaptive schemes are, as opposed to the fixed allocation scheme, fairly insensitive to variations in the traffic mix. Traffic and interference adaptive resource allocation schemes appear necessary in wireless networks in order to obtain reasonable performance for large bandwidth users.

  • 8.
    Anderlind, Erik
    KTH, Superseded Departments, Teleinformatics.
    Resource allocation for heterogenous traffic in a wireless network1995Conference paper (Refereed)
    Abstract [en]

    Multimedia traffic in future wireless networks will require an efficient use of the radio frequency bandwidth. We propose a distributed and adaptive radio bandwidth assignment algorithm for a user population where the bandwidth requirements can vary substantially between different users. The performance is compared, on the merits of blocking and throughput, to that of a similar network employing a fixed number of channels per cell. The results show that the bandwidth utilization increases by an order of magnitude, by far more than for fixed (narrow) bandwidth schemes. Traffic and interference adaptive resource allocation schemes appear necessary in wireless networks in order to obtain reasonable performance for large bandwidth users.

  • 9.
    Andersin, Michael
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Rosberg, Zvi
    IBM, Haifa Research Laboratory.
    Zander, Jens
    KTH, Superseded Departments, Teleinformatics.
    Gradual removals in cellular PCS with constrained power control and noise1995In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 1995, 56-60 p.Conference paper (Refereed)
    Abstract [en]

    In this paper we study the mobile removal problem in a cellular PCS network where transmitter powers are constrained and controlled by a distributed constrained power control (DCPC) algorithm. Due to transmitter mobility and random signal propagation, there are system states where not all transmitters can be supported, even under the optimal power control. Thus, some of them should be removed. It can be shown that finding the optimal removal set is an NP-complete problem, and therefore gives rise to heuristic algorithms. In this paper we study and compare among three classes of transmitter removal algorithms, one-by-one removals, multiple removals and power control with removals combined. All removal algorithms are compared with respect to their outage probabilities and their time to convergence to a steady state. The power control with removals combined algorithm emerges as the best approach with respect to both criteria.

  • 10.
    Andras Moritz, Csaba
    KTH, Superseded Departments, Teleinformatics.
    Cost modeling and analysis1998Doctoral thesis, monograph (Other scientific)
  • 11.
    André, Johan
    KTH, Superseded Departments, Teleinformatics.
    Automated test procedure for GSM Over-The-Air SIM file management1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Developments of new Servers for Over-the-Air SIM file management and SIM Toolkit applications require a comprehensive test procedure to verify their operation. The goal of this Master Thesis has been to improve the existing test procedure and if possible develop a new procedure that could make the tests more efficient.

    Measurements showed that the most time consuming parts of the existing procedure were latencies in the GSM network and manual operations.

    Two major questions had to be handled if it was possible to fully automate the manual test procedure and if an application that reduced the latencies in GSM network would be efficient. This report indicates that it wasn't worth the effort to introduce such an automated test procedure since the extra workload was not in proportion to the benefits.

    In order to improve the performance due to the latencies in the GSM network an application that reduced this latency was implemented. This application made it possible to transfer Short Messages directly to the SIM-card without passing through the GSM network or through the mobile phone. With the new procedure the time for existing test procedure was reduced by as much as 65%.

  • 12.
    Arefi Anbarani, Hossein
    KTH, Superseded Departments, Teleinformatics.
    ATM PON1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This document contains the final report of the thesis project: ATM based passive optical networks (ATM PONs). PONs are being tried as a method of extending optical fibres into the access network. PONs offer the ability of sharing the transmission costs of the access network amongst a large number of customers by allowing fibre and bandwidth sharing via passive optical splitters. ITU-T recommendation G.983 defines a specification for ATM based PONs. An SDL model was used in the project to investigate the possibility of using the Ericsson ATM switch (AXD 301) as the head-end in a G.983 compliant PON (i.e., the OLT). Also some simulations was made, using SDT. The results indicated that the ATM switch could very well serve as an OLT (by addition of a connection board). It was concluded that although the complexity of the system is quite high (caused by the TDMA technique used), it is a feasible solution. A techno-economical analysis made in the initial part of this project indicates that PONs are too expensive for deployment in the near future, compared to enhanced copper networks using xDSL technology. However, new applications could boost demand for high bandwidth sooner than expected. In any case, PONs (except in the FTTH configuration) constitute a natural upgrade for enhanced copper networks.

  • 13.
    Avesand (nee Sjöquist), Stefan
    KTH, Superseded Departments, Teleinformatics. KTH, School of Information and Communication Technology (ICT).
    Secure Database Access in Java Applets1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    For many years the web has only been used as a way ofdistributing information, but the need for more interaction isgrowing stronger. To accomplish this one can use Javaapplets, HTML forms, Active X, Javascript and a few othertechniques. One problem is that you must store the data theusers create, and change, somewhere and somehow. As thetitle reveals, this thesis will analyze a few ways to do this inJava applets.

  • 14.
    Badinson (nee Hossieni), David
    KTH, Superseded Departments, Teleinformatics. KTH, School of Information and Communication Technology (ICT).
    Adding Gigabit Ethernet to an ATM Switch1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This document contains the outcome of the final version of my thesis project: Adding Gigabit Ethernet access to an ATM switch. The accelerating growth of LAN (Local Area Network) traffic and growing number of complex and bandwidth hungry applications, such as, fast Interent, video telephony, voice over Internet, etc., is pushing  network administrators to look to high-speed network technologies.

    The Gigabit Ethernet and ATM are two dominant technologies in network backbone which are operating at gigabit-speed. These two technologies are considered to be competitors, but in reality they are appropriate for different applications and they are not equal substitute for each other. What we can do in this connection is to take up the advantages of both technologies and try to on somehow integrate them, in order to achieve high performance and powerful networks which are extremely demanded for future applications.

    The purpose with this project was to study the ATM and Gigabit Ethernet technologies and investigate the possibility of integrating them. This report includes an introduction to both technologies and design for a Gigabit Ethernet access card to an ATM switch. The document presents the including components in the card and gives a detailed description for each of components.

  • 15.
    Baecklund, Fredrik
    KTH, Superseded Departments, Teleinformatics.
    Software architecture for a scalable carrier class edge router1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    With the rapid growth of the Internet in the recent years and the expected future growth puts greater demands on high performance access and routing  technologies. The Ericsson AXI 510 Edge Router is a step in the right direction but to provide enough performance for future demands, a highly scalable system has to be designed. This new system is probably going to be based on a distributed architecture.

    In this MSc thesis the author discusses possible ways of designing a scalable distributed edge router software architecture and what implications the distributed architecture has on different edge router applications such as Network Address Translation, tunnel termination and management etc. Furthermore, the author presents a design proposal for a fully distributed architecture.

  • 16.
    Barriga, L.
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Brorsson, Mats
    Lund university.
    Ayani, Rassul
    KTH, Superseded Departments, Teleinformatics.
    Hybrid Parallel Simulation of Distributed Shared-Memory Architectures1996Report (Other academic)
  • 17.
    Barriga, Luis
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Brorsson, Mats
    Lund university.
    Ayani, Rassul
    KTH, Superseded Departments, Teleinformatics.
    A model for parallel simulation of distributed shared memory1996Conference paper (Refereed)
    Abstract [en]

    We present an execution model for parallel simulation of a distributed shared memory architecture. The model captures the processor-memory interaction and abstracts the memory subsystem. Using this model we show how parallel, on-line, partially-ordered memory traces can be correctly predicted without interacting with the memory subsystem. We also outline a parallel optimistic memory simulator that uses these traces, finds a global order among all events, and returns correct data and timing to each processor. A first evaluation of the amount of concurrency that our model can extract for an ideal multiprocessor shows that processors may execute relatively long instruction sequences without violating the causality constraints. However parallel simulation efficiency is highly dependent on the memory consistency model and the application characteristics.

  • 18.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Harper, B.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Judge, J.
    Location Aware Mobile Computing1997In: Proceedings of ICT '97, IEEE , 1997, 1319-1324 p.Conference paper (Refereed)
  • 19.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Augmented Mobile Computing and Communication Systems1997In: Proc. Third Asia-Pacific Conference on Communications (APCC’97), 1997, 827-831 p.Conference paper (Refereed)
  • 20.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Based Personal Mobile Computing and Communication1998In: Proceedings of 9th IEEE Workshop on Local and Metropolitan Area Networks, IEEE , 1998, 23-24 p.Conference paper (Refereed)
  • 21.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Using location and environment awareness in mobile communications1997In: Proceedings of the International Conference on Information, Communications and Signal Processing, ICICS, IEEE , 1997, 1781-1785 p.Conference paper (Refereed)
    Abstract [en]

    We are investigating the use of badge based wearable computers to create highly mobile location and environment aware systems. When coupled to intelligent servers the badges provide an unparalleled platform for human centred information environments. This paper describes the architecture of the badge, its distributed computing environment, and presents initial results of application development trials conducted by a class of telecommunications students at KTH.

  • 22.
    Becker, Kalle
    KTH, Superseded Departments, Teleinformatics.
    Calling your mailbox1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This paper presents how the company for whom this work was preformed should act to add an email reading feature to their platform. It also includes an evaluation of the usability of such a system (called Popeye).

    A field trial with Popeye was carried out, and also analyzed to understand both how users want to use this kind of service and also to evaluate speech technology in such applications.

    This paper also briefly describes the platform and why it is a good idea to use Microsoft Transaction Server (MTS) together with COM when building large systems in a Windows NT environment.

    Two different approaches to creation of this feature are discussed and the design of a COM interface was done. This interface will let voice mail vendors connect with the system and this will minimize the hardware that the telecom operators will have to buy and maintain.

    The solution I prefer is the one that means that the company has to build a complete new product. This solution will be harder to implement but I think that it will give the company the most benefits in the end. My conclusions can be read in chapter 5.

  • 23.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.  I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 24.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.

    I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 25.
    Bektesevic, Edin
    KTH, Superseded Departments, Teleinformatics.
    Embedded Linux for Purposes of Internet Appliances: (a.k.a. ‘The Wanderer Project’)1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the Internet continues to grow, now new Internet appliances are being marketed. At the same time, Linux is gradually becoming a competitive choice for desktop, server and embedded applications. How do these two facts relate to each other? What should be the position of Linux in Internet appliances, and how interesting is Linux? Where are the Internet appliances really positioned in terms of their needs for an operating system? How is Linux implemented in embedded applications?

    These are just some of the questions posed during this MSc. Project that this report aims to answer. In addition, we will examine how Linux is used in embedded applications and what it provides in terms of achieving their goals. Also, we will take a look at the compression methods that can be used for system size reduction and analyze their costs.

    The report will show that Linux is a competitive alternative for devices like WebPAD, that it leaves space for further time and cost efficient improvements, and that Internet appliances can get most of the benefits of Linux during its further evolution relatively cheaply.

  • 26.
    Bennani, Zakaria
    KTH, Superseded Departments, Teleinformatics.
    Quality of Service Support for Wireless LANs2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the research and development of mobile computing is becoming increasingly interesting and important to corporations and private users, great efforts are being made to ensure that the wireless network technology is being developed to match the performance level showed by wired network technologies. Introducing wireless mobile computing into already existing and operational situations, that have up to date been taken care of with wired technology, should not mean a degradation of the existing performance level. In other words, there should not be any decrease in the quality of service experienced by the end users due to the mobility or wireless factor.

    When developing quality of service support mechanisms that use characteristics specific to the Internet Protocol, considerations have to be made to make certain that the solutions and implementations developed will be deployable with the next generation Internet Protocol, IPv6. Since the ever decreasing address space in IPv4 is becoming more and more of a problem, at some point migration to IPv6 has to be made. Therefore, this thesis will base its developments on the use of IPv6.

    The thesis concerns the problem of providing statistical QoS guarantees for multimedia applications running over a wireless LAN such as WaveLAN. Using the DiffServ model and support of IPv6, we develop mechanisms for managing QoS and mobility. With the use of pre-connection schemes and a domain routing approach, Mobile Node mobility and Handoffs are handled in such a way to diminish latencies that occur when in-LAN and cross-LAN handoffs are made. To handle QoS guarantees, a bandwidth broker placed in the Access Points manages bandwidth allocations for different cells and configures the traffic parameters of each mobile so that the usage of the wireless MAC layer is controlled. The border router is connected via ATM to core routers in several places in France. Experimentation on the platform involves a DIS application (Distributed Interactive Simulation) running at different sites.

    The development work is done on FreeBSD systems in C.

  • 27.
    Bergqvist, Joakim
    KTH, Superseded Departments, Teleinformatics.
    Dynamic modeling of real-time data sources1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis reports on the development and implementation of a method for dynamically generating a state model from the prerecorded trace of a cell-arrival process and the user of this state machine to drive a simulator to evaluate the effects of multiplexing multiple copies of traffic similar to the original trace.

  • 28.
    Björklund, Ulf
    KTH, Superseded Departments, Teleinformatics.
    Understanding the Performance of the Linux IPv6 Implementation1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The new version of the Internet protocol, IP version 6, will eventually replace the current version IP version 4. Before that change can take place the different implementations of IPv6 must be able to perform at least as well as their predecessors, The implementation that is considered here is that of the Linux operating system. All measurements considers native IPv6, e.g. no tunneling in IPv4 packets.

    A small network of two computers was set up on which the performance tests were performed. Throughput and response times were measured on both Ethernet and Fast Ethernet. The conclusions are that IPv6 performs almost as well as IPv4 in both cases. IPv4's slight advantage is due to the fact that it has less overhead on the network since the header is smaller.

    Later a connection to the 6bone is setup. It is run on an ATM network. The performance across that network is also tested.

  • 29.
    Björkman, Anders
    KTH, Superseded Departments, Teleinformatics.
    Configuration of IPv4 Hosts in Zero-Configuration Networks2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Zero-configuration networks are networks that require no/zero manual configuration or administration to operate. The essence of a zero-configuration network is that it can be used without having to think about the network at all. The most basic zero-configuration network just provides network communication but more advanced services can be provided as long as no configuration is needed. An important area of use is networks for homes and small businesses. Many of the devices that we have in our homes are or will in a near future be ‘networked’ i.e. capable of network communication. Examples are computers and computer equipment such as printers and scanners, the next generation home-appliances such as the refrigerator and the washing machine, the TV, the stereo, climate sensors etc. etc. The main driving forces for this development are the need for resource sharing e.g. of printers or Internet access, home automation and devices, applications or services that use network communication. Networks for the home must be ‘automatic’ because the average person today has problems programming his VCR and cannot be expected to configure or administrate his/her home-network. Today’s solutions are insufficient because they require manual configuration and some technical knowledge. The market potential is enormous. Almost all homes and most small businesses lack a network infrastructure and many will in a near future acquire it.

    In this thesis I discuss the need and areas of use for zero-configuration networks and I look at how to configure IP hosts in general. Solutions on configuration of hosts in zero-configuration networks are discussed and I propose a solution for IPv4 hosts that enables link-local communication, the most basic type of network communication using IP.

    This master’s thesis was carried out at Ericsson Research in Kista during the fall of 1999 and spring of 2000.

  • 30.
    Blank, Bruno
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Häggström, Mattias
    KTH, Superseded Departments, Teleinformatics.
    Mobile Communication In a Multiple Device Environment1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    It is nowadays common that users have more than one computer. At the office, a stationary computer or possibly a laptop is used. When travelling, a Personal Digital Assistant is better suited for e-mail, address book, and scheduling. Probably the user also has an advanced mobile phone. A problem for many users is it has traditionally been quite complex to handle having multiple computers, since the support for mobile use has been insufficient.

    We have looked into common scenarios for mobile users and given and overview of related products and technologies. Some of the traditional protocols for e-mail have been reviewed. We have listed problems with those and suggested improvements. Sendit has a proprietary protocol, which we have compared to traditional protocols.

    This report gives an overview from the user’s point of view. From what we have seen, there are lots of upcoming technologies and solutions to assist mobile users. However, many problems still remain and need to be solved to facilitate the mobile user’s situation.

  • 31.
    Blomberg, Patrik
    KTH, Superseded Departments, Teleinformatics.
    Construction and Implementation of a Walkstation Mobile-distributed File System Testbed1995Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this Master's Thesis an investigation, design and implementation of an object-oriented prototype of a new kind of client-agent-server based distributed file system, suited for wireless mobile computing, are presented. An overview is given of the characteristics and the inherent problems of mobile-wireless computing. Some solutions and techniques to reduce the effects of these problems are described. A presentation of a project (the Walkstation project) that tries to solve these problems is also given. Software to support a mobile-distributed file system is designed and implemented. Various software development techniques and mobile file system design solutions are proposed, and used in the implementation. An integrated caching and prefetching scheme with dynamically loadable cache and prefetch manager objects is designed and implemented. It is proposed that different cache and prefetch algorithms should be used for different kinds of network links. A cache/prefetch-manager object architecture with automatically location-dependant dynamical swapping of network specific manager objects at run-time is therefore proposed and implemented. A mechanism is designed with which an application optionally can be mobility-aware by subscribing for network-change events. Finally, an expedient example of a methodology to achieve easy-understandable and well-designed code, and good extensibility possibilities is explained and used in the development. This is done by utilizing an object-oriented software development methodology in the entire software development cycle.

  • 32.
    Bodinger, Ronnie
    KTH, Superseded Departments, Teleinformatics.
    An MPLS Connection Manager for an Edge Router1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The Internet has been growing rapidly over the last couple of years. The increasing demand for network bandwidth is becoming a huge problem. To solve this problem, new methods must be developed. Ericsson’s solution is the use of MultiProtocol Label Switching (MPLS). MPLS has the potential to have a major impact on IP networking. It has the simplicity and dynamic nature of an IP network, but retains the performance of an ATM network. Furthermore, from an administrator’s point of view, MPLS will drastically simplify network management.

    The key principle behind MPLS is to be able to forward by switching packets through a network instead of routing packets. In order to do this, paths are established at the data link layer throughout the MPLS network. A fixed length identifier known as “label” identifies each path. Then the packets are simply forwarded on the path using layer two switching, instead of performing layer three routing.

    By using MPLS, performance is increased and it provides a good basis for traffic engineering, Quality of Service (QoS) guarantees, and Virtual Private Networks (VPN).

    I have implemented an MPLS ATM driver for an Ericsson AXI 510 Edge Router. The driver is responsible for converting generic MPLS labels into standard ATM labels (VPI/VCI). The driver also modifies the forwarding process in the router so that ATM paths are used to forward the packets, instead of the conventional forwarding methods. This implementation has been partly tested and it complies with MPLS current Internet drafts so far.

  • 33.
    Boström, Tomas
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Lindroos, Olle
    KTH, Superseded Departments, Teleinformatics.
    Hellström, Lennart
    KTH, Superseded Departments, Teleinformatics.
    Simple Mobile IP1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis describes an implementation and evaluation of an IP mobility management protocol, Simple Mobile IP. The protocol enables dynamic address allocation and configuration of mobile terminals through utilisation of DHCP.

    Simple Mobile IP provides IP mobility within one administrative domain, in contrast to the global mobility in conventional Mobile IP. Both protocols use IP tunnelling but in Simple Mobile IP the tunnel runs along the optimised route, thus avoiding triangular routing.

    The protocol was implemented on the Linux platform and evaluated in a wireless LAN environment. The solution detects subnet transitions at the link layer, resulting in loss of IP connectivity for approximately 100 ms when mobile terminals move between subnets. The overhead, introduced by IP tunnelling, reduces the throughput by 3.8% in a wireless LAN environment.

  • 34.
    Brejcha, Mikael
    KTH, Superseded Departments, Teleinformatics. KTH, School of Information and Communication Technology (ICT).
    Talaria: A Distributed Architecture for Supporting Monitoring and Collaborative Information Retrieval1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

     As the amount of information available via the Internet continues to explode, new means of finding and keeping oneself updated on sources of information must be found. This report presents a system that monitors sources of information on behalf of a user and also introduces new sources of information that potentially could be of interest to the user. As monitored information updates it can be directed to a variety of different displaying devices, ranging from simple pagers to advanced desktop computers. Ideas behind the design of the architecture are explained. The report explains why the system will scale as the number of users increases. The report describes measures taken to ensure user privacy.

  • 35.
    Broman, Fredrik
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Tarberg, Fredrik
    KTH, Superseded Departments, Teleinformatics.
    Implementation andAnalyses of theMobile-IP Protocol1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This report is the result of a masters degree project conducted at the Department of Teleinformatics at the Royal Institute of Technology during the autumn 1995. The area investigated is the Mobile Internet Protocol, especially its implementation and efficiency.

    The thesis work is divided into three areas. The first area includes the development and implementation of a Management Information Base for the Mobile-IP protocol. The second area deals with the porting of a Mobile-IP implementation for SunOS to MachOS and Solaris. The last area covers the tests done to measure the throughput and latency of the protocol.

  • 36.
    Byttner, Anders
    KTH, Superseded Departments, Teleinformatics.
    Internet Telephony using the Session Initiation Protocol2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The Session Initiation Protocol (SIP) is a highly extensible signaling protocol that provides mechanisms for establishing, modifying, and tearing down Internet telephony calls. Together with other Internet protocols and API’s it can create a flexible, dynamic, and scalable telephony environment, where services can be developed and deployed rapidly and by a wide range of users.

    This report investigates some proposed extensions to SIP and some of the API's that aim to standardize how telephony services can be defined in a SIP enabled network. The report describes some changes and improvements to these proposals and demonstrates how different services can be implemented using them.

  • 37.
    Börjesson, Martin
    KTH, Superseded Departments, Teleinformatics.
    Creation & Deployment of Voice Browsing Services1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Making the World Wide Web accessible trough audio interfaces (voice browsing) would provide many benefits. Far more people today have access to phones than have access to computers, further more, cellular phones allow user-mobility. Traditional Interactive Voice Response (IVR) applications have so far been restricted to the POTS network. However, a combination of Internet and IVR technologies could make voice browsing on the WWW possible. IVR services can with many benefits be described with customised markup languages instead of the traditional programming languages that are used today. The services can be published on the web using the same tools as in graphical Web publishing.

    In this paper, existing conversational markup languages are presented and evaluated together with suggestions for improvements. The benefits of the Extensible Markup Language in web publishing are studied with the conclusion that it would provide the best available base a future conversational markup standard.

    Requirements for a voice browser are suggested and possible media platforms are evaluated and discussed. The design of a voice browser is presented and discussed together with experiences gained from an implementation task.

    This paper concludes that voice browsing on the WWW will become a common way of web interaction within a not too distant future. The techniques necessary already exists. The benefits and opportunities that it offers will drive the development of necessary standards as well as the growth of content provide[r]s and users[.]

  • 38.
    Carlsson, Stefan
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Halén, Erik
    KTH, Superseded Departments, Teleinformatics.
    Mobile Internet: Content Adaptation for Limited Devices2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates how to adapt content on the Web to the limited I/O capabilities of today’s WAP (Wireless Application Protocol) devices and how to translate from HTML to WML (Wireless Markup Language). We also give an overview of WAP and Mobile Internet and a brief analysis of the future of WAP.

    To evaluate different methods of adaptation, two existing Web sites are adapted to WML. Three different methods are tried and evaluated: The first method is a brute force WML re-coding of the site. The second method is an XML based solution that separates the data from the presentation and uses different XSLT (eXtensible Style sheet Language Transformations) style sheets for different devices. The third method uses a proxy that translates a requested page from HTML to WML. The proxy evaluated here is Oracle’s Portal-to-Go in its semi-automated form, i.e. where it is manually pre-configured for every site it adapts.

    An important issue is whether to adapt specifically for each device or whether to use generically written WML for the entire range of WAP devices. Another issue is that a WAP device only can receive a limited amount of information at a time, and this limit varies between different devices.

  • 39.
    Carrara, Elisabetta
    KTH, Superseded Departments, Teleinformatics.
    Wireless Adaptation of a Security Management Protocol Suite1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Internet Security is rapidly increasing in importance, as Internet itself is spreading out so fast. The IETF Security working group has defined the "IP Security Protocol Suite", a set of protocols that aim at securing the IP layer, so providing general security services for all kinds of applications.

    The IPSec Protocol Suite is completed by a protocol for key management and key exchange, the "Internet Security Association and Key Management Protocol (ISAKMP)" . It is currently an IETF Proposed Standard for the Internet.

    In this thesis we describe ISAKMP, and also its use together with the Internet Key Exchange (IKE) protocol, as a negotiation and key exchange protocol for IPSec. A general overview of cryptography is also provided, since ISAKMP widely uses modern cryptographic techniques.

    ISAKMP flexibility is at the cost of complexity and increased packet traffic. This should be faced in constrained communications, such as wireless. Therefore, this thesis introduces some proposals for a compressed version of the protocol, trying to reduce the number of handshakes and the number of transmitted bytes without significantly decreasing the security level.

    The model is based on the use of a Proxy, which follows the compressed version of ISAKMP on the side of the  mobile node, and then switches to the original version of the protocol on the wired side with the second peer. Ad-hoc solutions are adopted, and security implications are taken into account.

  • 40.
    Chabouni (nee Talbi), Sami
    KTH, Superseded Departments, Teleinformatics. KTH, School of Information and Communication Technology (ICT).
    Investigation and Prototyping of a web based manager in a GSM SIM Application Platform1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The growing need for communication in the world has increased the use of telephony and has therefore led to several technical innovations and improvements in the field of telecommunications. As countries develop their infrastructure new ways of communicating arise. But the technical innovations do not completely guide the evolution of the infrastructure. Many times, the way people act, i.e., their mentality and traditions, decides how to invest in the infrastructure. As basic infrastructure is being built in some developing countries, others come up with new revolutionary solutions to replace old infrastructure and, for some developing countries the question arises whether to continue to invest several hundreds of millions of dollars in traditional telephony wiring. The cellular technique is revolutionary enough to be applied in countries that haven’t yet built a telephony network covering an adequate area of the country. In these countries, investments might therefore be focused on the cellular technique, rather than continuing to invest in cable networking. Thus adapting cellular technology to a worldwide distribution is necessary when it comes to administration and subscriber payment. The communication providers meet administrative obstacles when it comes to telephony services for a large-scale distribution. Will the subscribers pay for the services we offer them?

    Using Subscriber Identity Modules (SIM) one way to solve this problem is to define a prepaid scheme. It is based on the fact that the subscriber uses a unique identifier to make a connection and is billed using this identifier. The service provider is free to choose if the subscriber is thrustworthy or not and thus must pay in advance for the services or billed retroactively. This general way of solving administration problems does not apply only to developing countries where retroactive billing isn’t a common tradition. It is equally applicable to industrial countries where some people are banned from credibility for a couple of years because they haven’t paid their bills in time, or just because they don’t have employment at the time of their subscription application.

    To be in possession of a telephone is everyone’s right in most of the industrialized countries.

  • 41.
    Cho, Ming-King
    KTH, Superseded Departments, Teleinformatics.
    Paving the Information Superhighway at SNRA: A Proposal for Multimedia Traffic Information Systems1995Independent thesis Advanced level (degree of Master (Two Years)), 12 credits / 18 HE creditsStudent thesis
  • 42.
    Christiansson, Fredrik
    KTH, Superseded Departments, Teleinformatics.
    A distributed, mobile positioning systemfor wireless, handheld devices2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates the possibilities of implementing a location awareness mechanism for the so-called lesswire localNavigator. The author claims that it is possible to implement such a mechanism within the given prerequisites and constraints, even though with today’s technology it may not be economically feasible.

    Due to the lesswire’s constraints: high accuracy (67%), high-resolution (12 m2) and no hardware modification allowed to the mobile device, the suggested scheme uses Time Difference Of Arrival technology (TDOA). The main advantage of TDOA, as stated in this thesis, is the fact that it is almost totally independent of the preferred wireless technology of the mobile device. TDOA technology therefore, can be applied to a wide range of wireless networks (primarily TDMA, CDMA, FDMA – based). A disadvantage of this scheme is the fact that the network infrastructure needs to be extremely well synchronized - which in turn implies higher costs.

    Depending on how the synchronization problem is solved, the proposed system may well be economically feasible in the near future.

  • 43.
    Dabbous, Fouad
    KTH, Superseded Departments, Teleinformatics.
    The mobitex network in the point of sale application1995Independent thesis Advanced level (degree of Master (Two Years)), 12 credits / 18 HE creditsStudent thesis
    Abstract [en]

    The Purpose of the work is to provide a solution for interfacing the point-of-sale terminal (POST) with Mobitex radio modem (mobidem) on the mobile side and a solution for interfacing the authorization center host computer with the Mobitex area exchanges (MOX), at the fixed side. The application of POS was coded to use the Mobitex network as a communication link between the POST and the host computer.

    An existing POS application was used during the simulation where the communication procedure had been rewritten to meet the Mobitex network communication specifications. Analyses and ideas related to the suggested communication model and procedure were discussed during the simulation phase.

  • 44.
    Dimitriou, Eleftherios
    KTH, Superseded Departments, Teleinformatics.
    An Archive Robot for Video Mail1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Today most of the real-time voice communications are carried over the Plain Old Telephone System (POTS). In the future that might well change. Research indicates a strong interest for developing the network to support real-time communications in a satisfactory way. Applications will be needed in this new world of IP (Internet Protocol) based communications.

    In this thesis we present an application called the Video Mail service. The Video Mail service can record and playback audio and video messages over the Internet using standard Internet telephony protocols. It is built on top of a more general platform called the Archive Robot. The Archive Robot provides the real-time functionality of the system. It is not explicitly designed to support the Video Mail service. Other services such as Conference Tool and Interactive Voice Response can also be supported.

    The Video Mail service was designed and implemented. Furthermore, this first prototype was used to evaluate the performance of the overall system.

  • 45.
    Doroshenko, Anatoly
    et al.
    Institute of Software Systems, National Academy of Sciences of Ukraine, Kiev 252187, Ukraine.
    Thorelli, Lars-Erik
    KTH, Superseded Departments, Teleinformatics.
    Vlassov, Vladimir
    KTH, Superseded Departments, Teleinformatics.
    Coordination models and facilities could be parallel software accelerators1999In: HIGH-PERFORMANCE COMPUTING AND NETWORKING, PROCEEDINGS, Berlin: Springer Berlin/Heidelberg, 1999, 1219-1222 p.Conference paper (Refereed)
    Abstract [en]

     A  new  coordination  model  is  constructed  for  distributed shared  memory parallel programs.  It  exploits typing of shared resources and  formal specification of a  priori known  synchronization constraints.

  • 46.
    Drakenberg, N. Peter
    KTH, Superseded Departments, Teleinformatics.
    Hierarchial array tiling2001Licentiate thesis, monograph (Other scientific)
  • 47.
    Drakenberg, N. Peter
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Lundevall, Fredrik
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS. KTH, Superseded Departments, Teleinformatics.
    Lisper, Björn
    Mälardalen University.
    An Efficient Semi-Hierarchical Array Layout2001In: Interaction between Compilers and Computer Architectures / [ed] Gyungho Lee, Pen-Chung Yew, Kluwer Academic Publishers, 2001, 21-43 p.Conference paper (Refereed)
    Abstract [en]

    For high-level programming languages, linear array layout (e.g., column major and row major orders) have de facto been the sole form of mapping array elements to memory. The increasingly deep and complex memory hierarchies present in current computer systems expose several deficiencies of linear array layouts. One such deficiency is that linear array layouts strongly favor locality in one index dimension of multidimensional arrays. Secondly, the exact mapping of array elements to cache locations depend on the array’s size, which effectively renders linear array layouts non-analyzable with respect to cache behavior. We present and evaluate an alternative, semi-hierarchical, array layout which differs from linear array layouts by being neutral with respect to locality in different index dimensions and by enabling accurate and precise analysis of cache behaviors at compile-time. Simulation results indicate that the proposed layout may exhibit vastly improved TLB behavior, leading to clearly measurable improvements in execution time, despite a lack of suitable hardware support for address computations. Cache behavior is formalized in terms of conflict vectors, and it is shown how to compute such conflict vectors at compile-time.

  • 48.
    Drugge, Fredrik
    KTH, Superseded Departments, Teleinformatics.
    Design of a Multimedia Help System in UNIX1995Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The department G at EUA has developed a project management method and tool, PROPS-N. The PROPS-N is an on-line system built in FrameMaker that operates in a SUN/UNIX environment.

    This master's thesis attends to the problem of how to organize and implement a prototype of a multimedia help system for PROPS-N, with the help of the commercial tools available today.

    I have searched for multimedia authoring tools and screen activity recorders, that can be used for the development of the prototype. I have evaluated the multimedia authoring tools IconAuthor 6.0, Gain Momentum 3.1 and MetaCard 1.4. I have also evaluated the screen activity recorders ScreenPlay 2.3 and XRecorder 1.101.

    Some aspects that help you create usable help systems, and ensure learning, are also shown in this thesis. I have used a Multimedia Design and Development Methodology, with the tools ScreenPlay and MetaCard for the implementation of the prototype.

    This thesis also includes suggestions for future development of the prototype.

  • 49.
    Däcker, Bjarne
    KTH, Superseded Departments, Teleinformatics.
    Concurrent functional programming for telecommunications2000Licentiate thesis, monograph (Other scientific)
  • 50.
    Ebler, Mats
    et al.
    KTH, Superseded Departments, Teleinformatics.
    Flodén, Anders
    KTH, Superseded Departments, Teleinformatics.
    Mobility for Cordless Multimedia1995Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This project has developed a system for cordless multimedia business communication. It supports multimedia conferencing using existing applications across a mix of cordless and wired networks.

123456 1 - 50 of 292
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf