Change search
Refine search result
1234567 1 - 50 of 45856
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    A. Molnar, Wolfgang
    et al.
    Public Research Centre Henri Tudor, , .
    A. Proper, HenderikPublic Research Centre Henri Tudor, , .Zdravkovic, JelenaStockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.Loucopoulos, PericleUniversity of Manchester, , .Pastor, OscarUniversitat Politècnica de València, , Centro de Investigación PROS.de Kinderen, SybrenUniversity of Luxembourg, , .
    CBI Workshops: TEE and CoBI: The 8th Workshop on Transformation & Engineering of Enterprises (TEE 2014) The 1st International Workshop on Capability-oriented Business Informatics (CoBI 2014) 2014Conference proceedings (editor) (Other (popular science, discussion, etc.))
  • 2. AAl Abdulsalam, Abdulrahman
    et al.
    Velupillai, Sumithra
    Meystre, Stephane
    UtahBMI at SemEval-2016 Task 12: Extracting Temporal Information from Clinical Text2016In: Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016), Association for Computational Linguistics , 2016, 1256-1262 p.Conference paper (Refereed)
    Abstract [en]

    The 2016 Clinical TempEval continued the 2015 shared task on temporal information extraction with a new evaluation test set. Our team, UtahBMI, participated in all subtasks using machine learning approaches with ClearTK (LIBLINEAR), CRF++ and CRFsuite packages. Our experiments show that CRF-based classifiers yield, in general, higher recall for multi-word spans, while SVM-based classifiers are better at predicting correct attributes of TIMEX3. In addition, we show that an ensemble-based approach for TIMEX3 could yield improved results. Our team achieved competitive results in each subtask with an F1 75.4% for TIMEX3, F1 89.2% for EVENT, F1 84.4% for event relations with document time (DocTimeRel), and F1 51.1% for narrative container (CONTAINS) relations.

  • 3. Aalst, Will
    et al.
    Shaw, Michael J.Szyperski, ClemensStirna, JanisStockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.Persson, Anne
    The Practice of Enterprise Modeling: first IFIP WG 8.1 Working Conference (PoEM 2008), proceedings2009Conference proceedings (editor) (Other academic)
  • 4.
    Aalto, Erik
    KTH, School of Computer Science and Communication (CSC).
    Learning Playlist Representations for Automatic Playlist Generation2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Spotify is currently the worlds leading music streaming ser-vice. As the leader in music streaming the task of providing listeners with music recommendations is vital for Spotify. Listening to playlists is a popular way of consuming music, but traditional recommender systems tend to fo-cus on suggesting songs, albums or artists rather than pro-viding consumers with playlists generated for their needs.

    This thesis presents a scalable and generalizeable approach to music recommendation that performs song selection for the problem of playlist generation. The approach selects tracks related to a playlist theme by finding the charac-terizing variance for a seed playlist and projects candidate songs into the corresponding subspace. Quantitative re-sults shows that the model outperforms a baseline which is taking the full variance into account. By qualitative results the model is also shown to outperform professionally curated playlists in some cases.

  • 5.
    Aarno, Daniel
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    Intention recognition in human machine collaborative systems2007Licentiate thesis, monograph (Other scientific)
    Abstract [en]

    Robot systems have been used extensively during the last decades to provide automation solutions in a number of areas. The majority of the currently deployed automation systems are limited in that the tasks they can solve are required to be repetitive and predicable. One reason for this is the inability of today’s robot systems to understand and reason about the world. Therefore the robotics and artificial intelligence research communities have made significant research efforts to produce more intelligent machines. Although significant progress has been made towards achieving robots that can interact in a human environment there is currently no system that comes close to achieving the reasoning capabilities of humans.

    In order to reduce the complexity of the problem some researchers have proposed an alternative to creating fully autonomous robots capable of operating in human environments. The proposed alternative is to allow fusion of human and machine capabilities. For example, using teleoperation a human can operate at a remote site, which may not be accessible for the operator for a number of reasons, by issuing commands to a remote agent that will act as an extension of the operator’s body.

    Segmentation and recognition of operator generated motions can be used to provide appropriate assistance during task execution in teleoperative and human-machine collaborative settings. The assistance is usually provided in a virtual fixture framework where the level of compliance can be altered online in order to improve the performance in terms of execution time and overall precision. Acquiring, representing and modeling human skills are key research areas in teleoperation, programming-by-demonstration and human-machine collaborative settings. One of the common approaches is to divide the task that the operator is executing into several sub-tasks in order to provide manageable modeling.

    This thesis is focused on two aspects of human-machine collaborative systems. Classfication of an operator’s motion into a predefined state of a manipulation task and assistance during a manipulation task based on virtual fixtures. The particular applications considered consists of manipulation tasks where a human operator controls a robotic manipulator in a cooperative or teleoperative mode.

    A method for online task tracking using adaptive virtual fixtures is presented. Rather than executing a predefined plan, the operator has the ability to avoid unforeseen obstacles and deviate from the model. To allow this, the probability of following a certain trajectory sub-task) is estimated and used to automatically adjusts the compliance of a virtual fixture, thus providing an online decision of how to fixture the movement.

    A layered hidden Markov model is used to model human skills. A gestem classifier that classifies the operator’s motions into basic action-primitives, or gestemes, is evaluated. The gestem classifiers are then used in a layered hidden Markov model to model a simulated teleoperated task. The classification performance is evaluated with respect to noise, number of gestemes, type of the hidden Markov model and the available number of training sequences. The layered hidden Markov model is applied to data recorded during the execution of a trajectory-tracking task in 2D and 3D with a robotic manipulator in order to give qualitative as well as quantitative results for the proposed approach. The results indicate that the layered hidden Markov model is suitable for modeling teleoperative trajectory-tracking tasks and that the layered hidden Markov model is robust with respect to misclassifications in the underlying gestem classifiers.

  • 6.
    Aarno, Daniel
    et al.
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Sommerfeld, Johan
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Kragic, Danica
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Pugeault, Nicolas
    Kalkan, Sinan
    Woergoetter, Florentin
    Krüger, Norbert
    Early reactive grasping with second order 3D feature relations2008In: Recent Progress In Robotics: Viable Robotic Service To Human / [ed] Lee, S; Suh, IH; Kim, MS, 2008, Vol. 370, 91-105 p.Conference paper (Refereed)
    Abstract [en]

    One of the main challenges in the field of robotics is to make robots ubiquitous. To intelligently interact with the world, such robots need to understand the environment and situations around them and react appropriately, they need context-awareness. But how to equip robots with capabilities of gathering and interpreting the necessary information for novel tasks through interaction with the environment and by providing some minimal knowledge in advance? This has been a longterm question and one of the main drives in the field of cognitive system development. The main idea behind the work presented in this paper is that the robot should, like a human infant, learn about objects by interacting with them, forming representations of the objects and their categories that are grounded in its embodiment. For this purpose, we study an early learning of object grasping process where the agent, based on a set of innate reflexes and knowledge about its embodiment. We stress out that this is not the work on grasping, it is a system that interacts with the environment based on relations of 3D visual features generated trough a stereo vision system. We show how geometry, appearance and spatial relations between the features can guide early reactive grasping which can later on be used in a more purposive manner when interacting with the environment.

  • 7. Aarts, Fides
    et al.
    Jonsson, Bengt
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Uijen, Johan
    Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction2010In: Testing Software and Systems: ICTSS 2010, Berlin: Springer-Verlag , 2010, 188-204 p.Conference paper (Refereed)
  • 8.
    Aarts, Marcel
    Mälardalen University, School of Innovation, Design and Engineering.
    Using Kinect to interact with presentation software2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Imagination Studios is a company specialized in motion capturing and animation. Part of their daily business is working at trade shows where they have a booth to keep close contact with existing customers and also to find new ones. However, usually only two to three people will be working at the booth, and frequently, these people will be in meetings with potential customers. During a time like this, nobody is free to attend to other people checking out the booth. This can result in a potential loss of a new customer. This project seeks a way to alleviate that problem.The idea behind this project was to create an application that trade show visitors can interact with in a playful and innovative way while also giving them a feel of what Imagination Studios is all about while looking for information about the company. To do this it was decided to let users interact with the system by using a Microsoft Kinect. The Kinect allows for easy implementation of a user interface based on motion capturing while also being very cost effective. A new user interface was to be designed as well, without copying already existing solutions and without simply expanding a traditional UI with new elements. To achieve this several design sketches were made, and the most interesting ones were then turned into storyboards. These were then used to decide on the final design, which was then elaborated on by use of video sketches and a collage in Adobe Photoshop.Several tools were used during the actual implementation. For the actual visualization and graphical design, the Unreal Engine 3 in combination with UDK was decided upon. To connect Kinect and Unreal Engine 3, a third party addon called NIUI which makes use of the open source SDK OpenNI was used. For ease of debugging and programming in Unrealscript, the programming language used by the Unreal Engine 3, an addon for Microsoft Visual Studio 2010 called nFringe (Pixel Mine, Inc., 2010) was used.

  • 9. Aartsen, M. G.
    et al.
    Abbasi, R.
    Ackermann, M.
    Adams, J.
    Aguilar, J. A.
    Ahlers, M.
    Altmann, D.
    Arguelles, C.
    Auffenberg, J.
    Bai, X.
    Baker, M.
    Barwick, S. W.
    Baum, V.
    Bay, R.
    Beatty, J. J.
    Tjus, J. Becker
    Becker, K. -H
    BenZvi, S.
    Berghaus, P.
    Berley, D.
    Bernardini, E.
    Bernhard, A.
    Besson, D. Z.
    Binder, G.
    Bindig, D.
    Bissok, M.
    Blaufuss, E.
    Blumenthal, J.
    Boersma, David J.
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Bohm, C.
    Bose, D.
    Boeser, S.
    Botner, Olga
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Brayeur, L.
    Bretz, H. -P
    Brown, A. M.
    Bruijn, R.
    Casey, J.
    Casier, M.
    Chirkin, D.
    Christov, A.
    Christy, B.
    Clark, K.
    Classen, L.
    Clevermann, F.
    Coenders, S.
    Cohen, S.
    Cowen, D. F.
    Silva, A. H. Cruz
    Danninger, M.
    Daughhetee, J.
    Davis, J. C.
    Day, M.
    De Clercq, C.
    De Ridder, S.
    Desiati, P.
    de Vries, K. D.
    de With, M.
    DeYoung, T.
    Diaz-Velez, J. C.
    Dunkman, M.
    Eagan, R.
    Eberhardt, B.
    Eichmann, B.
    Eisch, J.
    Euler, S.
    Evenson, P. A.
    Fadiran, O.
    Fazely, A. R.
    Fedynitch, A.
    Feintzeig, J.
    Feusels, T.
    Filimonov, K.
    Finley, C.
    Fischer-Wasels, T.
    Flis, S.
    Franckowiak, A.
    Frantzen, K.
    Fuchs, T.
    Gaisser, T. K.
    Gallagher, J.
    Gerhardt, L.
    Gladstone, L.
    Glusenkamp, T.
    Goldschmidt, A.
    Golup, G.
    Gonzalez, J. G.
    Goodman, J. A.
    Gora, D.
    Grandmont, D. T.
    Grant, D.
    Gretskov, P.
    Groh, J. C.
    Gross, A.
    Ha, C.
    Ismail, A. Haj
    Hallen, P.
    Hallgren, Allan
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Halzen, F.
    Hanson, K.
    Hebecker, D.
    Heereman, D.
    Heinen, D.
    Helbing, K.
    Hellauer, R.
    Hickford, S.
    Hill, G. C.
    Hoffman, K. D.
    Hoffmann, R.
    Homeier, A.
    Hoshina, K.
    Huang, F.
    Huelsnitz, W.
    Hulth, P. O.
    Hultqvist, K.
    Hussain, S.
    Ishihara, A.
    Jacobi, E.
    Jacobsen, J.
    Jagielski, K.
    Japaridze, G. S.
    Jero, K.
    Jlelati, O.
    Kaminsky, B.
    Kappes, A.
    Karg, T.
    Karle, A.
    Kauer, M.
    Kelley, J. L.
    Kiryluk, J.
    Klaes, J.
    Klein, S. R.
    Koehne, J. -H
    Kohnen, G.
    Kolanoski, H.
    Koepke, L.
    Kopper, C.
    Kopper, S.
    Koskinen, D. J.
    Kowalski, M.
    Krasberg, M.
    Kriesten, A.
    Krings, K.
    Kroll, G.
    Kunnen, J.
    Kurahashi, N.
    Kuwabara, T.
    Labare, M.
    Landsman, H.
    Larson, M. J.
    Lesiak-Bzdak, M.
    Leuermann, M.
    Leute, J.
    Luenemann, J.
    Macias, O.
    Madsen, J.
    Maggi, G.
    Maruyama, R.
    Mase, K.
    Matis, H. S.
    McNally, F.
    Meagher, K.
    Merck, M.
    Merino, G.
    Meures, T.
    Miarecki, S.
    Middell, E.
    Milke, N.
    Miller, J.
    Mohrmann, L.
    Montaruli, T.
    Morse, R.
    Nahnhauer, R.
    Naumann, U.
    Niederhausen, H.
    Nowicki, S. C.
    Nygren, D. R.
    Obertacke, A.
    Odrowski, S.
    Olivas, A.
    Omairat, A.
    O'Murchadha, A.
    Paul, L.
    Pepper, J. A.
    de los Heros, Carlos Perez
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Pfendner, C.
    Pieloth, D.
    Pinat, E.
    Posselt, J.
    Price, P. B.
    Przybylski, G. T.
    Quinnan, M.
    Raedel, L.
    Rae, I.
    Rameez, M.
    Rawlins, K.
    Redl, P.
    Reimann, R.
    Resconi, E.
    Rhode, W.
    Ribordy, M.
    Richman, M.
    Riedel, B.
    Rodrigues, J. P.
    Rott, C.
    Ruhe, T.
    Ruzybayev, B.
    Ryckbosch, D.
    Saba, S. M.
    Sander, H. -G
    Santander, M.
    Sarkar, S.
    Schatto, K.
    Scheriau, F.
    Schmidt, T.
    Schmitz, M.
    Schoenen, S.
    Schoeneberg, S.
    Schoenwald, A.
    Schukraft, A.
    Schulte, L.
    Schultz, D.
    Schulz, O.
    Secke, D.
    Sestayo, Y.
    Seunarine, S.
    Shanidze, R.
    Sheremata, C.
    Smith, M. W. E.
    Soldin, D.
    Spiczak, G. M.
    Spiering, C.
    Stamatikos, M.
    Stanev, T.
    Stanisha, N. A.
    Stasik, A.
    Stezelberger, T.
    Stokstad, R. G.
    Stoessl, A.
    Strahler, E. A.
    Ström, Rickard
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Strotjohann, N. L.
    Sullivan, G. W.
    Taavola, Henric
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Taboada, I.
    Tamburro, A.
    Tepe, A.
    Ter-Antonyan, S.
    Tesic, G.
    Tilav, S.
    Toale, P. A.
    Tobin, M. N.
    Toscano, S.
    Tselengidou, M.
    Unger, E.
    Usner, M.
    Vallecorsa, S.
    van Eijndhoven, N.
    van Overloop, A.
    van Santen, J.
    Vehring, M.
    Voge, M.
    Vraeghe, M.
    Walck, C.
    Waldenmaier, T.
    Wallraff, M.
    Weaver, Ch.
    Wellons, M.
    Wendt, C.
    Westerhoff, S.
    Whitehorn, N.
    Wiebe, K.
    Wiebusch, C. H.
    Williams, D. R.
    Wissing, H.
    Wolf, M.
    Wood, T. R.
    Woschnagg, K.
    Xu, D. L.
    Xu, X. W.
    Yanez, J. P.
    Yodh, G.
    Yoshida, S.
    Zarzhitsky, P.
    Ziemann, J.
    Zierke, S.
    Zoll, M.
    The IceProd framework: Distributed data processing for the IceCube neutrino observatory2015In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 75, 198-211 p.Article in journal (Refereed)
    Abstract [en]

    IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, identify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. This paper presents the first detailed description of IceProd, a lightweight distributed management system designed to meet these requirements. It is driven by a central database in order to manage mass production of simulations and analysis of data produced by the IceCube detector. IceProd runs as a separate layer on top of other middleware and can take advantage of a variety of computing resources, including grids and batch systems such as CREAM, HTCondor, and PBS. This is accomplished by a set of dedicated daemons that process job submission in a coordinated fashion through the use of middleware plugins that serve to abstract the details of job submission and job management from the framework. (C) 2014 Elsevier Inc. All rights reserved.

  • 10.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiate thesis, comprehensive summary (Other academic)
  • 11.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: Proceedings of the 48th Annual Hawaii International Conference on System Sciences (HICSS-48), IEEE Computer Society, 2015, 4691-4699 p.Conference paper (Refereed)
  • 12. Aasi, Parisa
    et al.
    Nunes, Ivan
    Rusu, Lazar
    Hodosi, Georg
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), IEEE Computer Society, 2015, 4691-4699 p.Conference paper (Refereed)
    Abstract [en]

    IT Outsourcing (ITO) is used widely by Multinational Companies (MNCs) as a sourcing strategy today. ITO relationship between service buyer and provider then becomes a crucial issue in achieving expected objectives. This research sheds light on the influence of organizational culture (OC) of the buyer company on its ITO relationship with the provider. More specifically, the influence that OC can have on four significant dimensions of trust, cooperation, communication and commitment in ITO is studied through a qualitative analysis. IT managers of six MNCs were interviewed which exposed the connection between OC and ITO relationship factors. An open communication culture, speed of adaption to change, receiving innovative solutions, flat or hierarchical structures and responsibility degree appeared as the most visible differences between OCs of MNCs influencing ITO relationships. The results can be used for improving the ITO by considering the influence of OC to gain more benefits from outsourcing.

  • 13.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The impact of different organizational cultures on IT outsourcing relationship management2013In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, no 2, 50-66 p.Article in journal (Refereed)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 14.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Facing The Digitalization Challenge: Why Organizational Culture Matters and How It Influences IT Governance Performance2017In: 26th International Conference on Information Systems Development, Association for Information Systems , 2017Conference paper (Refereed)
  • 15.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2014In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, 34-49 p.Article in journal (Refereed)
  • 16.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Culture on IT Governance: A Literature Review2014In: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, 4436-4445 p.Conference paper (Refereed)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 17.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui, Ralph H. Sprague, Jr., IEEE Computer Society, 2016Conference paper (Refereed)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 18.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Role of Culture in IT Governance2014In: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Conference paper (Refereed)
  • 19.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017In: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, no 0, 229-252 p.Chapter in book (Refereed)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 20.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    Télé-Université du Québec, École des sciences de l’administration, .
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2017In: International Journal of IT - Business Alignment and Governance, Vol. 8Article in journal (Refereed)
  • 21.
    Abadir Guirgis, Georg
    Linköping University, Department of Computer and Information Science.
    Lärarperspektiv på riskutbildningen för motorcyklister2011Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [sv]

    Under det senaste decenniet har det i Sverige blivit allt populärare att åka motorcykel. Enobligatorisk riskutbildning för behörighet A och A1 infördes från och med den 1 november2009. Då riskutbildningen är ny har få utvärderingar gjorts.Denna studie utvärderar riskutbildningen för motorcyklister utifrån trafikskolläraresperspektiv. Målet har varit att sammanställa synpunkter och erfarenheter från lärarna påutbildningen. Ett ytterligare mål har varit att undersöka trafikskollärarnas upplevda effekter avutbildningen på elevers trafikbeteende. Sex semistrukturerade intervjuer med trafikskolläraresamt en observationsstudie på olika trafikskolor genomfördes. Utöver detta genomfördesdeltagande observation av en fortbildning där 15 trafikskollärare deltog. Resultatet frånstudien visar att lärarna anser att behovet av riskutbildningen är stort och attimplementationen av den nya riskutbildningen gått bra. Förutom att elever efter utbildningenrefererar till den, vilket enligt lärarna indikerar att de tagit till sig vad som sagts, märks det nui större utsträckning än tidigare att elever kör lugnare och tänker sig mer för i vissasituationer. Detta påtalades vara ett klart önskvärt resultat.

  • 22.
    Abadir Guirgis, Georg
    Linköping University, Department of Computer and Information Science. Linköping University, Faculty of Arts and Sciences.
    Mindre energi och rätt tid: Utvärdering av utbildning och träning för lokförare i energieffektiv körning – en simulatorstudie2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    During the 80’s, the first train simulator was introduced in Swedish train driver education and is still the only full scale simulator being used to educate train drivers in Sweden. The reason for this seems to be a lack of educational and economic motives for an expanded usage of simulators within education and training. Energy savings within the railway domain, i.e. energy-efficient driving, is currently a topic for all train operators in Sweden. Some operators already educate their drivers in energy efficient driving and tests of energy efficiency in real traffic has shown a potential energy saving of 16 %, after drivers have completed a theoretical education in energy-efficient driving. Because there were some uncertainties in the data from the tests carried out in real traffic, where conditions and experimental procedures varied between the drivers and it also turned out that education and access to a support system while driving resulted in a small saving in energy (13 %) there was a need to examine the potential savings under controlled conditions. Therefore, a study was conducted using a train simulator. In the simulator, the researcher has full control over the data and conditions are the same for all drivers. The simulator used in the study was developed by VTI (Swedish National Road and Transport Research Institute) and modeled after an X50 Regina. The purpose of this study was to investigate whether the same theoretical education in energy-efficient driving, in combination with simulator training under ideal conditions, could contribute to the same, or better energy saving compared to the results of the tests from real traffic. Furthermore, the effect of feedback during training with regard to energy savings was also investigated. 24 train driver students were divided into three groups with 8 students in each. Two of these groups completed two sessions (reference and test session) with theoretical education and simulator training between the sessions. The last group (control group) completed two sessions (reference and test session) without education and training between the sessions. The two groups that were given theoretical education conducted their simulator training under two different conditions, where one group trained with feedback (energy consumption and rail gradient) and the other group trained without feedback. It turns out that a theoretical education in energy efficient driving, combined with 30 minutes of simulator training, resulted in a total saving of about 24 % energy for both groups. Also, considering that the control group improved their energy consumption by simply driving the simulator two times (8 % total energy saving), the energy saving was almost equal to the result of the tests in real traffic. Since the results were equal even though the conditions differed, there is reason to investigate how different driving conditions affect the outcome. There is also a need to better understand why education in combination with a support system resulted in a lower energy saving than for those who were only given education during the tests in real traffic, and also why feedback during training in the simulator did not give a detectable effect. Basically, there are many reasons to further investigate how to design simulator training and support systems for train drivers. In addition to the energy savings, the results showed that drivers improved their arrival times i.e. arrive more accurate in relation to the time table. The results suggest that there is great potential for train simulators in the Swedish train driver education, both for training and for evaluating the effects of the training.

  • 23.
    Abadir Guirgis, Georg
    et al.
    Swedish National Road and Transport Research Institute, Traffic and road users, Human-vehicle-transport system interaction.
    Peters, Björn
    Swedish National Road and Transport Research Institute, Traffic and road users, Human-vehicle-transport system interaction.
    Lidström, Mats
    Swedish National Road and Transport Research Institute, Traffic and road users, Vehicle technology and simulation.
    Lokförarutbildning i Sverige: simulatoranvändning och ERTMS2014Report (Other academic)
    Abstract [en]

    This report, which provides an overview of the compulsory basic training for train drivers in Sweden, highlights the occurrence of simulator-based training in education, along with the training efforts being made with regards to the future introduction of ERTMS/ETCS. The report also shows the possibilities and limitations of increased use of simulators in driver training and describes the most important governing documents for train drivers and train driver training. Furthermore, the Swedish Transport Agency curriculum for train driver licenses is presented along with the institutions engaged in basic education, training and examination of train driver’s. Also, the Swedish Transport Administration’s E-learning tool for ERTMS, the ERSA-simulator and company specific ERTMS education at SJ and Green Cargo are described. Moreover, Swedish train companies’ and educators’ current use and future needs of simulators for train driver training were examined. Examples from other domains where simulators are used in a training context are also presented.

  • 24. Abaglo, A. J.
    et al.
    Bonalda, C.
    Pertusa, Emeline
    KTH.
    Environmental Digital Model: Integration of BIM into environmental building simulations2017In: CISBAT 2017 International ConferenceFuture Buildings & Districts – Energy Efficiency from Nano to Urban Scale, Elsevier, 2017, Vol. 122, 1063-1068 p.Conference paper (Refereed)
    Abstract [en]

    The digital model and the BIM are creating a revolution with a transition from 2D to 3D models. However, environmental professions carry out building simulations with a wide range of software with little or no communication between them. This often leads to the realization of several 3D models and therefore a significant loss of time, as well as possible inconsistencies of geometrical information. Our research aims to use the interoperability potential offered by BIM-friendly software to develop gateways to optimize the modeling phase and improve the restitution of the studies through visual integration in a digital mockup.

  • 25.
    Abbas, Asad
    et al.
    Örebro University, Örebro University School of Business.
    Faiz, Ali
    Örebro University, Örebro University School of Business.
    Reasons for the failure of government IT projects in Pakistan: A Contemporary Study2013Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 26.
    Abbas, Asad
    et al.
    Örebro University, Örebro University School of Business.
    Faiz, Ali
    Örebro University, Örebro University School of Business.
    Usefulness of Digital and Traditional Library in Higher Education2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
  • 27.
    ABBAS, FAHEEM
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Intelligent Container Stacking System at Seaport Container Terminal2016Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Context: The workload at seaport container terminal is increasing gradually. We need to improve the performance of terminal to fulfill the demand. The key section of the container terminal is container stacking yard which is an integral part of the seaside and the landside. So its performance has the effects on both sides. The main problem in this area is unproductive moves of containers. However, we need a well-planned stacking area in order to increase the performance of terminal and maximum utilization of existing resources.

    Objectives: In this work, we have analyzed the existing container stacking system at Helsingborg seaport container terminal, Sweden, investigated the already provided solutions of the problem and find the best optimization technique to get the best possible solution. After this, suggest the solution, test the proposed solution and analyzed the simulation based results with respect to the desired solution.

    Methods: To identify the problem, methods and proposed solutions of the given problem in the domain of container stacking yard management, a literature review has been conducted by using some e-resources/databases. A GA with best parametric values is used to get the best optimize solution. A discrete event simulation model for container stacking in the yard has been build and integrated with genetic algorithm. A proposed mathematical model to show the dependency of cost minimization on the number of containers’ moves.

    Results: The GA has been achieved the high fitness value versus generations for 150 containers to storage at best location in a block with 3 tier levels and to minimize the unproductive moves in the yard. A comparison between Genetic Algorithm and Tabu Search has been made to verify that the GA has performed better than other algorithm or not. A simulation model with GA has been used to get the simulation based results and to show the container handling by using resources like AGVs, yard crane and delivery trucks and container stacking and retrieval system in the yard. The container stacking cost is directly proportional to the number of moves has been shown by the mathematical model.

    Conclusions: We have identified the key factor (unproductive moves) that is the base of other key factors (time & cost) and has an effect on the performance of the stacking yard and overall the whole seaport terminal. We have focused on this drawback of stacking system and proposed a solution that makes this system more efficient. Through this, we can save time and cost both. A Genetic Algorithm is a best approach to solve the unproductive moves problem in container stacking system.

  • 28.
    Abbas, Gulfam
    et al.
    Blekinge Institute of Technology, School of Computing.
    Asif, Naveed
    Blekinge Institute of Technology, School of Computing.
    Performance Tradeoffs in Software Transactional Memory2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Transactional memory (TM), a new programming paradigm, is one of the latest approaches to write programs for next generation multicore and multiprocessor systems. TM is an alternative to lock-based programming. It is a promising solution to a hefty and mounting problem that programmers are facing in developing programs for Chip Multi-Processor (CMP) architectures by simplifying synchronization to shared data structures in a way that is scalable and compos-able. Software Transactional Memory (STM) a full software approach of TM systems can be defined as non-blocking synchronization mechanism where sequential objects are automatically converted into concurrent objects. In this thesis, we present performance comparison of four different STM implementations – RSTM of V. J. Marathe, et al., TL2 of D. Dice, et al., TinySTM of P. Felber, et al. and SwissTM of A. Dragojevic, et al. It helps us in deep understanding of potential tradeoffs involved. It further helps us in assessing, what are the design choices and configuration parameters that may provide better ways to build better and efficient STMs. In particular, suitability of an STM is analyzed against another STM. A literature study is carried out to sort out STM implementations for experimentation. An experiment is performed to measure performance tradeoffs between these STM implementations. The empirical evaluations done as part of this thesis conclude that SwissTM has significantly higher throughput than state-of-the-art STM implementations, namely RSTM, TL2, and TinySTM, as it outperforms consistently well while measuring execution time and aborts per commit parameters on STAMP benchmarks. The results taken in transaction retry rate measurements show that the performance of TL2 is better than RSTM, TinySTM and SwissTM.

  • 29.
    Abbas, Haider
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Options-Based Security-Oriented Framework for Addressing Uncerainty Issues in IT Security2010Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Continuous development and innovation in Information Technology introduces novel configuration methods, software development tools and hardware components. This steady state of flux is very desirable as it improves productivity and the overall quality of life in societies. However, the same phenomenon also gives rise to unseen threats, vulnerabilities and security concerns that are becoming more critical with the passage of time. As an implication, technological progress strongly impacts organizations’ existing information security methods, policies and techniques, making obsolete existing security measures and mandating reevaluation, which results in an uncertain IT infrastructure. In order to address these critical concerns, an options-based reasoning borrowed from corporate finance is proposed and adapted for evaluation of security architecture and decision- making to handle them at organizational level. Options theory has provided significant guidance for uncertainty management in several domains, such as Oil & Gas, government R&D and IT security investment projects. We have applied options valuation technique in a different context to formalize optimal solutions in uncertain situations for three specific and identified uncertainty issues in IT security. In the research process, we formulated an adaptation model for expressing options theory in terms useful for IT security which provided knowledge to formulate and propose a framework for addressing uncertainty issues in information security. To validate the efficacy of this proposed framework, we have applied this approach to the SHS (Spridnings- och Hämtningssystem) and ESAM (E-Society) systems used in Sweden. As an ultimate objective of this research, we intend to develop a solution that is amenable to automation for the three main problem areas caused by technological uncertainty in information security: i) dynamically changing security requirements, ii) externalities caused by a security system, iii) obsoleteness of evaluation. The framework is general and capable of dealing with other uncertainty management issues and their solutions, but in this work we primarily deal with the three aforementioned uncertainty problems. The thesis presents an in-depth background and analysis study for a proposed options-based security-oriented framework with case studies for SHS and ESAM systems. It has also been assured that the framework formulation follows the guidelines from industry best practices criteria/metrics. We have also proposed how the whole process can be automated as the next step in development.

  • 30.
    Abbas, Haider
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Threats and Security Measures Involved in VoIP-Telephony2006Independent thesis Advanced level (degree of Master (One Year)), 30 credits / 45 HE creditsStudent thesis
  • 31.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Magnusson, Christer
    Department of Computer and System Sciences, Stockholm University, Sweden.
    Yngström, Louise
    Department of Computer and System Sciences, Stockholm University, Sweden.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Addressing Dynamic Issues in Information Security Management2011In: Information Management & Computer Security, ISSN 0968-5227, Vol. 19, no 1, 5-24 p.Article in journal (Refereed)
    Abstract [en]

    Purpose – The paper addresses three main problems resulting from uncertainty in information securitymanagement: i) dynamically changing security requirements of an organization ii) externalities caused by a securitysystem and iii) obsolete evaluation of security concerns.

    Design/methodology/approach – In order to address these critical concerns, a framework based on optionsreasoning borrowed from corporate finance is proposed and adapted to evaluation of security architecture anddecision-making for handling these issues at organizational level. The adaptation as a methodology is demonstrated by a large case study validating its efficacy.

    Findings – The paper shows through three examples that it is possible to have a coherent methodology, buildingon options theory to deal with uncertainty issues in information security at an organizational level.

    Practical implications – To validate the efficacy of the methodology proposed in this paper, it was applied tothe SHS (Spridnings- och Hämtningssystem: Dissemination and Retrieval System) system. The paper introduces themethodology, presents its application to the SHS system in detail and compares it to the current practice.

    Originality/value – This research is relevant to information security management in organizations, particularlyissues on changing requirements and evaluation in uncertain circumstances created by progress in technology.

  • 32.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Magnusson, Christer
    Department of Computer and System Sciences, Stockholm University, Sweden.
    Yngström, Louise
    Department of Computer and System Sciences, Stockholm University, Sweden.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010In: International Journal of Computer Science and Information Security, ISSN 1947-5500, Vol. 8, no 3, 89-67 p.Article in journal (Refereed)
  • 33.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Magnusson, Christer
    Yngström, Louise
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms2010In: IEEE ETCS 2010, Wuhan, China, 2010, 149-153 p.Conference paper (Refereed)
    Abstract [en]

    Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i.e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization

  • 34.
    Abbas, Haider
    et al.
    KTH, School of ICT, Electronic Systems.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    ICT/Materialfysik.
    Addressing Dynamic Issues in Information Security Management2011In: Information Management & Computer Security, ISSN 0968-5227, Vol. 19, no 1, 5-24 p.Article in journal (Refereed)
    Abstract [en]

    The paper addresses three main problems resulting from uncertainty in information security management: i)dynamically changing security requirements of an organization ii) externalities caused by a security system and iii)obsolete evaluation of security concerns. A framework based on options reasoning borrowed from corporate finance is proposed and adapted to evaluation of security architecture and decision-making for handling these issues at organizational level. The adaptation as methodology is demonstrated by a large case study validating its efficacy.

  • 35.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Magnusson, Christer
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Analyzing IT Security Evaluation needs for Developing Countries2009In: IPID Annual Workshop 2009, Orebro, Sweden, 2009Conference paper (Other academic)
  • 36. Abbas, Haider
    et al.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010In: International Journal of computer Science and Information Security, ISSN 1947-5500, Vol. 8, no 3, 59-67 p.Article in journal (Refereed)
    Abstract [en]

    Information technology evolves at a faster pace giving organizations a limited scope to comprehend and effectively react to steady flux nature of its progress. Consequently the rapid technological progression raises various concerns for the IT system of an organization i.e. existing hardware/software obsoleteness, uncertain system behavior, interoperability of various components/method, sudden changes in IT security requirements and expiration of security evaluations. These issues are continuous and critical in their nature that create uncertainty in IT infrastructure and threaten the IT security measures of an organization. In this research, Options theory is devised to address uncertainty issues in IT security management and the concepts have been developed/validated through real cases on SHS (Spridnings-och-Hämtningssystem) and ESAM (E-society) systems. AUMSIS (Automated Uncertainty Management System in Information Security) is the ultimate objective of this research which provides an automated system for uncertainty management in information security. The paper presents the architectural description of AUMSIS, its various components, information flow, storage and information processing details using options valuation techniques. It also presents heterogeneous information retrieval problems and their solution. The architecture is validated with examples from SHS system

  • 37.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Sundkvist, Stefan
    KTH, School of Information and Communication Technology (ICT).
    Increasing the Performance of Crab Linux Router Simulation Package Using XEN2006In: IEEE International Conference on Industrial and Information Systems, Kandy, Sri Lanka, 2006, 459-462 p.Conference paper (Refereed)
    Abstract [en]

    Nowadays hardware components are very expensive, especially if the prime purpose is to perform some routing related lab exercises. Physically connected network resources are required to get the desired results. Configuration of network resources in a lab exercise consumes much time of the students and scientists. The router simulation package Crab(1), based on KnoppW, Quagga' and User Mode Linux (UML) is designed for the students to facilitate them in performing lab exercises on a standalone computer where no real network equipment is needed. In addition to that it provides the facility of connection with the real network equipments. Crab also handles the pre configuration of different parts of the simulated networks like automatic IT addressing etc. This paper will describe the performance enhancing of Crab by replacing User Mode Linux virtual machine with XEN capable of providing ten virtual sessions concurrently using a standalone computer.

  • 38.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Yngström, Louise
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Adaptability Infrastructure for Bridging IT Security Evaluation and Options Theory2009In: ACM- IEEE SIN 2009 International Conference on Security of Information and Networks, North Cyprus, 2009Conference paper (Refereed)
    Abstract [en]

    The constantly rising threats in IT infrastructure raise many concerns for an organization, altering security requirements according to dynamically changing environment, need of midcourse decision management and deliberate evaluation of security measures are most striking. Common Criteria for IT security evaluation has long been considered to be victimized by uncertain IT infrastructure and considered resource hungry, complex and time consuming process. Considering this aspect we have continued our research quest for analyzing the opportunities to empower IT security evaluation process using Real Options thinking. The focus of our research is not only the applicability of real options analysis in IT security evaluation but also observing its implications in various domains including IT security investments and risk management. We find it motivating and worth doing to use an established method from corporate finance i.e. real options and utilize its rule of thumb technique as a road map to counter uncertainty issues for evaluation of IT products. We believe employing options theory in security evaluation will provide the intended benefits. i.e. i) manage dynamically changing security requirements ii) accelerating evaluation process iii) midcourse decision management. Having all the capabilities of effective uncertainty management, options theory follows work procedures based on mathematical calculations quite different from information security work processes. In this paper, we will address the diversities between the work processes of security evaluation and real options analysis. We present an adaptability infrastructure to bridge the gap and make them coherent with each other. This liaison will transform real options concepts into a compatible mode that provides grounds to target IT security evaluation and common criteria issues. We will address ESAM system as an example for illustrations and applicability of the concepts.

  • 39.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Yngström, Louise
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic Systems.
    Empowering Security Evaluation of IT Products with Options Theory2009In: 30th IEEE Symposium on Security & Privacy, Oakland, USA, 2009Conference paper (Refereed)
  • 40.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Yngström, Louise
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory2009In: IEEE  ECBS-EERC 2009, New York: IEEE , 2009, 134-141 p.Conference paper (Refereed)
    Abstract [en]

    Reliability of IT systems and infrastructure is a critical need for organizations to trust their business processes. This makes security evaluation of IT systems a prime concern for these organizations. Common Criteria is an elaborate, globally accepted security evaluation process that fulfills this need. However CC rigidly follows the initial specification and security threats and takes too long to evaluate and as such is also very expensive. Rapid development in technology and with it the new security threats further aggravates the long evaluation time problem of CC to the extent that by the time a CC evaluation is done, it may no longer be valid because new security threats have emerged that have not been factored in. To address these problems, we propose a novel Option Based Evaluation methodology for security of IT systems that can also be considered as an enhancement to the CC process. The objective is to address uncertainty issues in IT environment and speed up the slow CC based evaluation processes. OBE will follow incremental evaluation model and address the following main concerns based on options theory i.e. i) managing dynamic security requirement with mid-course decision management ii) devising evaluation as an improvement process iii) reducing cost and time for evaluation of an IT product.

  • 41.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Yngström, Louise
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    ROA Based Agile Security Evaluation of IT Products for Developing Countries2009In: IPID 4th Annual Conference 2009, London, UK, 2009Conference paper (Other academic)
  • 42.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Security Evaluation of IT Products: Bridging the Gap between Common Criteria (CC) and Real Option Thinking2008In: WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, 530-533 p.Conference paper (Refereed)
    Abstract [en]

    Information security has long been considered as a key concern for organizations benefiting from the electronic era. Rapid technological developments have been observed in the last decade which has given rise to novel security threats, making IT, an uncertain infrastructure. For this reason, the business organizations have an acute need to evaluate the security aspects of their IT infrastructure. Since many years, CC (Common Criteria) has been widely used and accepted for evaluating the security of IT products. It does not impose predefined security rules that a product should exhibit but a language for security evaluation. CC has certain advantages over ITSEC1, CTCPEC2 and TCSEC3 due to its ability to address all the three dimensions: a) it provides opportunity for users to specify their security requirements, b) an implementation guide for the developers and c) provides comprehensive criteria to evaluate the security requirements. Among the few notable shortcomings of CC is the amount of resources and a lot of time consumption. Another drawback of CC is that the security requirements in this uncertain IT environment must be defined before the project starts. ROA is a well known modern methodology used to make investment decisions for the projects under uncertainty. It is based on options theory that provides not only strategic flexibility but also helps to consider hidden options during uncertainty. ROA comes in two flavors: first for the financial option pricing and second for the more uncertain real world problems where the end results are not deterministic. Information security is one of the core areas under consideration where researchers are employing ROA to take security investment decisions. In this paper, we give a brief introduction of ROA and its use in various domains. We will evaluate the use of Real options based methods to enhance the Common Criteria evaluation methodology to manage the dynamic security requirement specification and reducing required time and resources. We will analyze the possibilities to overcome CC limitations from the perspective of the end user, developer and evaluator. We believe that with the ROA enhanced capabilities will potentially be able to stop and possibly reverse this trend and strengthen the CC usage with a more effective and responsive evaluation methodology.

  • 43.
    Abbas, Muhammad Hassan
    et al.
    Linköping University, Department of Computer and Information Science.
    Khan, Mati-ur-Rehman
    Linköping University, Department of Computer and Information Science.
    Correlational Analysis of Drivers Personality Traits and Styles in a Distributed Simulated Driving Environment2007Independent thesis Basic level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this thesis report we conducted research study on driver's behavior in T-Intersections using simulated environment. This report describes and discusses correlation analysis of driver's personality traits and style while driving at T-Intersections.

    The experiments were performed on multi user driving simulator under controlled settings, at Linköping University. A total of forty-eight people participated in the study and were divided into groups of four, all driving in the same simulated world.

    During the experiments participants were asked to fill a series of well-known self-report questionnaires. We evaluated questionnaires to get the insight in driver's personality traits and driving style. The self-report questionnaires consist of Schwartz's configural model of 10 values types and NEO-five factor inventory. Also driver's behavior was studied with the help of questionnaires based on driver's behavior, style, conflict avoidance, time horizon and tolerance of uncertainty. Then these 10 Schwartz's values are correlated with the other questionnaires to give the detail insight of the driving habits and personality traits of the drivers.

  • 44.
    Abbas, Nadeem
    Umeå universitet.
    Properites of "Good" Java Examples2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Example programs are well known as an important tool to learn computer programming. Realizing the signicance of example programs, this study has been conducted with a goalto measure and evaluate the quality of examples used in academia. We make a distinctionbetween good and bad examples, as badly designed examples may prove harmful for novice learners. In general, students differ from expert programmers in their approach to read and comprehend a program. How do students understand example programs is explored in the light of classical theories and models of program comprehension. Key factors that impact program quality and comprehension are identified. To evaluate as well as improve the quality of examples, a set of quality attributes is proposed. Relationship between program complexity and quality is examined. We rate readability as a prime quality attribute and hypothesize that example programs with low readability are difficult to understand. Software Reading Ease Score (SRES), a program readability metric proposed by Börstler et al. is implemented to provide a readability measurement tool. SRES is based on lexical tokens and is easy to compute using static code analysis techniques. To validate SRES metric, results are statistically analyzed in correlation to earlier existing well acknowledged software metrics.

  • 45.
    Abbas, Nadeem
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Towards autonomic software product lines2011In: SPLC '11 Proceedings of the 15th International Software Product Line Conference, Volume 2, ACM Press, 2011, 44:1-44:8 p.Conference paper (Refereed)
    Abstract [en]

    We envision an Autonomic Software Product Line (ASPL). The ASPL is a dynamic software product line that supports self adaptable products. We plan to use reflective architecture to model and develop ASPL. To evaluate the approach, we have implemented three autonomic product lines which show promising results. The ASPL approach is at initial stages, and require additional work. We plan to exploit online learning to realize more dynamic software product lines to cope with the problem of product line evolution. We propose on-line knowledge sharing among products in a product line to achieve continuous improvement of quality in product line products.

  • 46.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Architectural reasoning for dynamic software product lines2013In: Proceedings of the 17th International Software Product Line Conference co-located workshops, ACM Press, 2013, 117-124 p.Conference paper (Refereed)
    Abstract [en]

    Software quality is critical in today's software systems. A challenge is the trade-off situation architects face in the design process. Designers often have two or more alternatives, which must be compared and put into context before a decision is made. The challenge becomes even more complex for dynamic software product lines, where domain designers have to take runtime variations into consideration as well. To address the problem we propose extensions to an architectural reasoning framework with constructs/artifacts to define and model a domain's scope and dynamic variability. The extended reasoning framework encapsulates knowledge to understand and reason about domain quality behavior and self-adaptation as a primary variability mechanism. The framework is demonstrated for a self-configuration property, self-upgradability on an educational product-line.

  • 47.
    Abbas, Nadeem
    et al.
    EcoFES.
    Andersson, Jesper
    EcoFES.
    Architectural Reasoning Support for Product-Lines of Self-adaptive Software Systems - A Case Study2015In: Software Architecture: 9th European Conference, ECSA 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 2015. Proceedings, Springer International Publishing , 2015, 17, 20-36 p.Chapter in book (Refereed)
    Abstract [en]

    Software architecture serves as a foundation for the design and development of software systems. Designing an architecture requires extensive analysis and reasoning. The study presented herein focuses on the architectural analysis and reasoning in support of engineering self-adaptive software systems with systematic reuse. Designing self-adaptive software systems with systematic reuse introduces variability along three dimensions; adding more complexity to the architectural analysis and reasoning process. To this end, the study presents an extended Architectural Reasoning Framework with dedicated reasoning support for self-adaptive systems and reuse. To evaluate the proposed framework, we conducted an initial feasibility case study, which concludes that the proposed framework assists the domain architects to increase reusability, reduce fault density, and eliminate differences in skills and experiences among architects, which were our research goals and are decisive factors for a system’s overall quality.

  • 48.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Architectural Reasoning Support for Product-Lines of Self-adaptive Software Systems: A Case Study2015In: Software Architecture: 9th European Conference, ECSA 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 201 / [ed] Danny Weyns, Raffaela Mirandola, Ivica Crnkovic, 2015, 20-36 p.Conference paper (Refereed)
    Abstract [en]

    Software architecture serves as a foundation for the design and development of software systems. Designing an architecture requires extensive analysis and reasoning. The study presented herein focuses on the architectural analysis and reasoning in support of engineering self-adaptive software systems with systematic reuse. Designing self-adaptive software systems with systematic reuse introduces variability along three dimensions; adding more complexity to the architectural analysis and reasoning process. To this end, the study presents an extended Architectural Reasoning Framework with dedicated reasoning support for self-adaptive systems and reuse. To evaluate the proposed framework, we conducted an initial feasibility case study, which concludes that the proposed framework assists the domain architects to increase reusability, reduce fault density, and eliminate differences in skills and experiences among architects, which were our research goals and are decisive factors for a system's overall quality.

  • 49.
    Abbas, Nadeem
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Jesper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Harnessing Variability in Product-lines of Self-adaptive Software Systems2015In: Proceedings of the 19th International Conference on Software Product Line: SPLC '15, ACM Press, 2015, 191-200 p.Conference paper (Refereed)
    Abstract [en]

    This work studies systematic reuse in the context of self-adaptive software systems. In our work, we realized that managing variability for such platforms is different compared to traditional platforms, primarily due to the run-time variability and system uncertainties. Motivated by the fact that recent trends show that self-adaptation will be used more often in future system generation and that software reuse state-of-practice or research do not provide sufficient support, we have investigated the problems and possibly resolutions in this context. We have analyzed variability for these systems, using a systematic reuse prism, and identified a research gap in variability management. The analysis divides variability handling into four activities: (1) identify variability, (2) constrain variability, (3) implement variability, and (4) manage variability. Based on the findings we envision a reuse framework for the specific domain and present an example framework that addresses some of the identified challenges. We argue that it provides basic support for engineering self-adaptive software systems with systematic reuse. We discuss some important avenues of research for achieving the vision.

  • 50.
    Abbas, Nadeem
    et al.
    RISE, Swedish ICT, SICS, Software and Systems Engineering Laboratory. Linnaeus University.
    Andersson, Jesper
    RISE, Swedish ICT, SICS, Software and Systems Engineering Laboratory. Linnaeus University.
    Harnessing Variability in Product-lines of Self-adaptive Software Systems2015Conference paper (Refereed)
    Abstract [en]

    This work studies systematic reuse in the context of self-adaptive software systems. In our work, we realized that managing variability for such platforms is different compared to traditional platforms, primarily due to the run-time variability and system uncertainties. Motivated by the fact that recent trends show that self-adaptation will be used more often in future system generation and that software reuse state-of-practice or research do not provide sufficient support, we have investigated the problems and possibly resolutions in this context. We have analyzed variability for these systems, using a systematic reuse prism, and identified a research gap in variability management. The analysis divides variability handling into four activities: (1) identify variability, (2) constrain variability, (3) implement variability, and (4) manage variability. Based on the findings we envision a reuse framework for the specific domain and present an example framework that addresses some of the identified challenges. We argue that it provides basic support for engineering self-adaptive software systems with systematic reuse. We discuss some important avenues of research for achieving the vision.

1234567 1 - 50 of 45856
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf