Ändra sökning
Avgränsa sökresultatet
52535455 2701 - 2741 av 2741
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 2701.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard OntologyIngår i: 43rd Euromicro Conference on Software Engineering and Advanced Applications SEAA'17Konferensbidrag (Refereegranskat)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned activity, applied during the early stages of safety-critical systems development process, aiming to provide stakeholders with a general understanding of potential hazards. The identified hazards will be described and serve as a basis to further identify mitigation mechanisms in the subsequent development process. However, since various stakeholders will be involved in the identification process, a common understanding of the nature of hazards among stakeholders, such as what a hazard consists of and how to describe it without ambiguities, is of crucial importance to achieve the goal of PHA. In this work, we propose a hazard modeling language (HML) based on a hazard domain ontology, i.e., the Hazard Ontology, in order to facilitate the specification of identified hazards. In addition, we present an approach to the transformation from natural language hazard descriptions into the HML specification. Finally, an industrial PHA example is used to illustrate the usefulness of our work.

  • 2702.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation AB, Sweden.
    Forsberg, Kristina
    Saab AB, Sweden.
    An Environment-Driven Ontological Approach to Requirements Elicitation for Safety-Critical Systems2015Ingår i: 23rd IEEE International Requirements Engineering Conference RE'15, 2015, 247-251 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.

  • 2703.
    Zhou, Shuqiao
    et al.
    Tsinghua University.
    Yuan, Ruixi
    Tsinghua University.
    Dely, Peter
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Mitigating Control Channel Saturation in the Dynamic Channel Assignment Protocol2011Ingår i: JCIT: Journal of Convergence Information Technology, ISSN 2233-9299, Vol. 6, nr 6, 271-281 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

     Multi-channel MAC protocols that rely on a dedicated control channel (CC) for data channel reservation face the problem of control channel saturation. When the control channel becomes the bottleneck, data channels are not fully utilized and the spectrum allocated for the network is not used efficiently. For a popular dedicated control channel based multi-channel MAC protocol, the dynamic channel assignment protocol (DCA), we propose and compare two methods for mitigating control channel saturation. The first method is based on the ability of modern wireless cards to use different channel bandwidths. Increasing the bandwidth of the CC allows higher transmission rates and thereby relieves the saturation on the CC. The second method involves TXOP (Transmission Opportunity)-like burst-transmissions, where several date packets are transmitted using one reservation operation on the control channel. Network simulations and analysis show that, in an 802.11 based network, the bandwidth adaptation method yields a throughput improvement of around 30%. The TXOP mechanism performs much better and increases the throughput by a factor of 2 to 10, depending on the length of the data packets.

  • 2704.
    Zhu, Angela Yun
    et al.
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Inoue, Jun
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Peralta, Marisa Linnea
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Taha, Walid
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    O’Malley, Marcia
    Department of Mechanical Engineering and Materials Science Rice University, Houston, TX 77005, USA.
    Powell, Dane
    Department of Mechanical Engineering and Materials Science Rice University, Houston, TX 77005, USA.
    Implementing Haptic Feedback Environments from High-level Descriptions2009Ingår i: Embedded Software and Systems, 2009. ICESS '09. International Conference on: proceedings, Los Alamitos, Calif.: IEEE Computer Society, 2009, 482-489 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Haptic feedback can be a critical component of virtual environments used in cognitive research, rehabilitation, military training, and entertainment. A limiting factor in the innovation and the acceptance of virtual environments with haptic feedback is the time and cost required tobuild them. This paper presents a development environmentcalled iAcumen that supports a new approach for programming such systems. This approach allows the developer todirectly express physical equations describing the underlying dynamics. By raising the level of abstraction for thedeveloper, we avoid many of the problems that limit the effectiveness of traditional approaches.

  • 2705.
    Zhu, Angela Yun
    et al.
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Taha, Walid
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Cartwright, Robert
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Martel, Matthieu
    Laboratoire ELIAUS-DALI, Universit´e de Perpignan, Perpignan Cedex, France.
    Siek, Jeremy G.
    Department of Electrical and Computer Engineering University of Colorado, Boulder, USA.
    In Pursuit of Real Answers2009Ingår i: 2009 International Conference on Embedded Software and Systems: ICESS 2009 : proceedings, 25-27 May, 2009, Hangzhou, Zhejiang, P.R. China, Los Alamitos, Calif.: IEEE Press, 2009, 115-122 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Digital computers permeate our physical world. This phenomenon creates a pressing need for tools that help us understand a priori how digital computers can affect their physical environment. In principle, simulation can be a powerful tool for animating models of the world. Today, however, there is not a single simulation environment that comes with a guarantee that the results of the simulationare determined purely by a real-valued model and not by artifacts of the digitized implementation. As such, simulation with guaranteed fidelity does not yet exist. Towards addressing this problem, we offer an expository account of what is known about exact real arithmetic. We argue that this technology, which has roots that are over 200 years old, bears significant promise as offering exactly the right technology to build simulation environments with guaranteed fidelity. And while it has only been sparsely studied in this large span of time, there are reasons to believe that the time is right to accelerate research in this direction.

  • 2706.
    Zhu, Sainan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    Creating a NoSQL database for the Internet of Things: Creating a key-value store on the SensibleThings platform2015Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Due to the requirements of the Web 2.0 applications and the relational databaseshave a limitation in horizontal scalability. NoSQL databases have become moreand more popular in recent years. However, it is not easy to select a databasethat is suitable for a specific use. This thesis describes the detailed design, im plementation and final performance evaluation of a key-value NoSQL databasefor the SensibleThings platform, which is an Internet of Things platform. Thethesis starts by comparing the different types of NoSQL databases to select themost appropriate one. During the implementation of the database, the algorithms for data partition, data access, replication, addition and removal ofnodes, failure detection and handling are dealt with. The final results for theload distribution and the performance evaluation are also presented in this pa per. At the end of the thesis, some problems and improvements that need betaken into consideration in the futures.

  • 2707.
    Ziegenbein, Tim
    Linköpings universitet, Institutionen för datavetenskap, Interaktiva och kognitiva system.
    Designing HTML5 2D platformer for web cam based motion games2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Movement interaction in games has over the last years been a main subject in the area of game design and recent motion based interaction systems provide many improvements over earlier systems. Research has proven that motion based games provide several benefits over general games, they increase the players’ engagement level and may induce both mental and physical health benefits. Still, not much research has been conducted in the area of motion based platform games, even though the platform game genre is one of the most popular game genres. In this thesis, a case study is conducted in order to extract design principles and guidelines applicable for motion based platform games. The study includes implementation of a browser-based 2D platform game that uses the web camera to provide motion based interaction. One of the conclusions in this study indicates that many game features from ordinary platform games only require minor modifications to be applicable for motion based platform games.

  • 2708.
    Zimmerman, Marc
    et al.
    Massachusetts Institute of Technology, Cambridge, USA.
    Lundqvist, Kristina
    Massachusetts Institute of Technology, Cambridge, USA.
    Leveson, Nancy
    Massachusetts Institute of Technology, Cambridge, USA.
    Investigating the readability of state-based formal requirements specification languages2002Ingår i: Proc. 24th International Conference on Software Engineering ICSE02, 2002, 33-43 s., 7Konferensbidrag (Övrigt vetenskapligt)
  • 2709.
    Zografos, Vasileios
    et al.
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Lenz, Reiner
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Institutionen för teknik och naturvetenskap, Medie- och Informationsteknik. Linköpings universitet, Tekniska högskolan.
    Spatio-chromatic image content descriptors and their analysis using Extreme Value Theory2011Ingår i: Image analysis: 17th Scandinavian Conference, SCIA 2011, Ystad, Sweden, May 2011. Proceedings, Springer Berlin/Heidelberg, 2011, 579-591 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    We use the theory of group representations to construct very fast image descriptors that split the vector space of local RGB distributions into small group-invariant subspaces. These descriptors are group theoretical generalizations of the Fourier Transform and can be computed with algorithms similar to the FFT. Because of their computational efficiency they are especially suitable for retrieval, recognition and classification in very large image datasets. We also show that the statistical properties of these descriptors are governed by the principles of the Extreme Value Theory (EVT). This enables us to work directly with parametric probability distribution models, which offer a much lower dimensionality and higher resolution and flexibility than explore the connection to EVT and analyse the characteristics of these descriptors from a probabilistic viewpoint with the help of large image databases.

  • 2710.
    Zografos, Vasileios
    et al.
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Nordberg, Klas
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Fast and accurate motion segmentation using linear combination of views2011Ingår i: BMVC 2011, 2011, 12.1-12.11 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    We introduce a simple and efficient procedure for the segmentation of rigidly moving objects, imaged under an affine camera model. For this purpose we revisit the theory of "linear combination of views" (LCV), proposed by Ullman and Basri [20], which states that the set of 2d views of an object undergoing 3d rigid transformations, is embedded in a low-dimensional linear subspace that is spanned by a small number of basis views. Our work shows, that one may use this theory for motion segmentation, and cluster the trajectories of 3d objects using only two 2d basis views. We therefore propose a practical motion segmentation method, built around LCV, that is very simple to implement and use, and in addition is very fast, meaning it is well suited for real-time SfM and tracking applications. We have experimented on real image sequences, where we show good segmentation results, comparable to the state-of-the-art in literature. If we also consider computational complexity, our proposed method is one of the best performers in combined speed and accuracy. © 2011. The copyright of this document resides with its authors.

  • 2711.
    Zola, Enrica
    et al.
    Spain.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap. Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Centrum för HumanIT.
    Minimizing the impact of the handover for mobile users in WLAN: A study on performance optimization2016Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 107, 292-303 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    IEEE 802.11 based Wireless LANs are an important piece in today’s communication infrastructure in order to provide high speed wireless Internet access to static or quasi mobile users. For large WLAN deployments (i.e., Campus or enterprise WLAN), it is important to understand the impact of user mobility and handovers on the system performance. In this article, we have developed a performance model for a set of networked 802.11 based WLAN Access Points, which is based on a Mixed Integer Linear Program (MILP). The objective function tries simultaneously to maximize the total system rate while at the same time minimizing the number of handovers for a configurable handover signaling rate. Because of the conflicting nature of the two objective functions, such multi-objective optimization is difficult to explore. A detailed evaluation of the model using several scenarios involving both different numbers of static and mobile users shows that our formulation allows trading off those two objectives in a robust way. 

  • 2712.
    Zou, Zhuo
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Impulse Radio UWB for the Internet-of-Things: A Study on UHF/UWB Hybrid Solution2011Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    This dissertation investigates Ultra-Wideband (UWB) techniques for the next generation Radio Frequency Identification (RFID) towards the Internet-of-Things (IoT). In particular, an ultra-high frequency (UHF) wireless-powered UWB radio (UHF/UWB hybrid) with asymmetric links is explored from system architecture to circuit implementation.

    Context-aware, location-aware, and energy-aware computing for the IoT demands future micro-devices (e.g., RFID tags) with capabilities of sensing, processing, communication, and positioning, which can be integrated into everyday objects including paper documents, as well as food and pharmaceutical packages. To this end, reliable-operating and maintenance-free wireless networks with low-power and low-cost radio transceivers are essential. In this context, state-of-the-art passive RFID technologies provide limited data rate and positioning accuracy, whereas active radios suffer from high complexity and power-hungry transceivers. Impulse Radio UWB (IR-UWB) exhibits significant advantages that are expected to overcome these limitations. Wideband signals offer robust communications and high-precision positioning; duty-cycled operations allow link scalability; and baseband-like architecture facilitates extremely simple and low-power transmitters. However, the implementation of the IR-UWB receiver is still power-hungry and complex, and thus is unacceptable for self-powered or passive tags.

    To cope with μW level power budget in wireless-powered systems, this dissertation proposes an UHF/UWB hybrid radio architecture with asymmetric links. It combines the passive UHF RFID and the IR-UWB transmitter. In the downlink (reader-tag), the tag is powered and controlled by UHF signals as conventional passive UHF tags, whereas it uses an IR-UWB transmitter to send data for a short time at a high rate in the uplink (tag-reader). Such an innovative architecture takes advantage of UWB transmissions, while the tag avoids the complex UWB receiver by shifting the burden to the reader. A wireless-powered tag providing -18.5 dBm sensitivity UHF downlink and 10 Mb/s UWB uplink is implemented in 180 nm CMOS. At the reader side, a non-coherent energy detection IR-UWB receiver is designed to pair the tag. The receiver is featured by high energy-efficiency and flexibility that supports multi-mode operations. A novel synchronization scheme based on the energy offset is suggested. It allows fast synchronization between the reader and tags, without increasing the hardware complexity. Time-of-Arrival (TOA) estimation schemes are analyzed and developed for the reader, which enables tag localization. The receiver prototype is fabricated in 90 nm CMOS with 16.3 mW power consumption and -79 dBm sensitivity at 10 Mb/s data rate. The system concept is verified by the link measurement between the tag and the reader. Compared with current passive UHF RFID systems, the UHF/UWB hybrid solution provides an order of magnitude improvement in terms of the data rate and positioning accuracy brought by the IR-UWB uplink.

  • 2713.
    Åberg, Christian
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Automated Deployment of Customer-Premises Equipment2016Självständigt arbete på grundnivå (yrkesexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Zero touch deployment tools perform installation and configuration of computer networking devices without human interaction. Modern zero touch deployment tools generally lack support for routers and are platform dependent. This forces Internet Service Providers to rely on manual node deployment methods when deploying Customer-Premise Equipment which is time consuming and error prone. This thesis investigates how the process of deploying Customer-Premises Equipment can be automated and optimized. State-of-the-art is discussed to point out requirements and possible improvements. Based on that, a tool is implemented performing deployment of Customer-Premises Equipment while minimizing manual intervention. As Internet Service Providers typically work with equipment from various vendors, multivendor support is implemented. This thesis studies common methods for initial Customer-Premises Equipment configuration. Request for Comments and Technical manuals are consulted regarding network protocols, zero touch deployment tools and router operating systems.

  • 2714.
    Åberg, Ludvig
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Parallelism within queue application2017Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The aim of this thesis was to modify an existing order queue application which was unable to execute orders in a queue in parallel which in turn could lead to a bad user experience due to the increased queue delay. The thesis proposes two queue structures to allow parallel execution within a queue. One of the two is selected for implemented in the modified order queue application. The implementation was carried out in Java EE and used different types of frameworks such as JPQL. Some parts of the order queue application had to be modified to be able to handle the new queue structure. New attributes that defines dependencies of the orders are used to find a suitable parent for each order in the queue. The queue structure was visualized making it possible to see the execution in real time, and a test server was implemented to test the queue structure. This resulted in a working prototype able to handle dependencies and parallel orders. The modified order queue application was performance measured and compared to the original order queue application. The measurement showed that the modified order queue application performed better than the original order queue application in terms of execution time below a certain number of queues. Future work includes optimizing the methods and queries in the implementation to increase the performance and to handle parallelism within the orders.

  • 2715.
    Åhlander, Gustav
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    William, Andersson
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    En bild säger mer än tusen ord: En fallstudie om hur verksamhetsmodellering kan användas som stöd vid kravarbete i en outsourcad miljö.2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This bachelor thesis deals with the subject of business process modelling in an outsourced environment. The communication process between two parties that are on either side of the globe can be problematic and affect the quality of the system requirements. The background of this study is that there is a lack of communication between these parties, which will eventuate in poor results.

     

    The purpose of this study is to find out whether it is possible to make use of business process modelling in an outsourced environment in order to increase the quality of system requirements by bringing the two parties closer together with help of a common language. A qualitative approach was used to interview relevant informants at Länsförsäkringar AB and its business units Länsförsäkringar Liv and Länsförsäkringar Bank.

     

    We have identified that it is not necessarily the system requirements that have a poor quality but how these system conveyed to the external supplier. Based on our data collection, we realized the great benefits of business process modelling as a means of communication in the system development, which can be a huge advantage in an outsourced environment. According to our study, it is certain that a business process modelling with mapped processes and flow charts can support communication as a common language because of the creation of processes and images instead of text.

  • 2716.
    Åhlander, Niclas
    et al.
    Högskolan i Halmstad.
    Aldaamsah, Saed
    Högskolan i Halmstad.
    Inhämtning & analys av Big Data med fokus på sociala medier2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    I en värld som till allt större del använder sig av sociala medier skapas och synliggörs information om användarna som tidigare inte varit enkel att i stor mängd analysera. I det här arbetet visas processen för att skapa ett automatiserat insamlingssätt av specifik data från sociala medier. Insamlad data analyseras därefter med noggrant utformade algoritmer och slutligen demonstreras processens nytta i sin helhet. Datainhämtningen från sociala medier automatiserades med hjälp av en mängd kombinerade metoder. Därefter kunde analysen av det inhämtade datat utföras med hjälp av specifika algoritmer som redovisades i det här arbetet. Tillsammans resulterade metoderna i att vissa mönster framkom i datan, vilket avslöjade en mängd olika typer av information kring analysens utvalda individer.

  • 2717.
    Åhman, Stefan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Robust Issue Tracking Application (RITA): Developing an issue tracker using modern web technologies2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Issue tracking is one of the vital parts in maintaining computer  systems.  It is utilized in anything from small independent companies to large enterprises. The tracking does not just provide developers and other personnel with crucial information regarding their systems current state, but additionally stores useful documentation if any error reoccurs in the future. However, if the tracking issue would be deficient in some way, the complete process of developing or maintaining a system could affected negatively in great extent. This thesis work has looked into a scenario where the tool has been to slow, overly complicated and obsolete. It has made a large negative impact on the work force that uses the tool and made tracking issue to a discouragement. The thesis work has thence investigated features of the existing tool, suggested a better solution to use based upon these findings, followed by the development of a web application. When the application was finished, its usability was tested by the intended staff and performance tests were conducted. The test results showed that the application had been implemented successfully in many aspects. Unfortunately, due to deficient technical choices, the project did struggle with implementing all features as expected. The thesis work did consequently learn the hard way the importance of a choosing development techniques very thoroughly.

     

  • 2718.
    Åkerberg, Johan
    et al.
    ABB AB, Corporate Research, Sweden.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Exploring Network Security in PROFIsafe2009Ingår i: Lecture Notes In Computer Science: Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security, Heidelberg: Springer-Verlag , 2009, 67-80 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Safety critical systems are used to reduce the probability of failure that could cause danger to person, equipment or environment. The increasing level of vertical and horizontal integration increases the security risks in automation. Since the risk of security attacks can not be treated as negligible anymore, there is a need to investigate possible security attacks on safety critical communication.

    In this paper we show that it is possible to attack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept defense-in-depth.

  • 2719.
    Åkerberg, Mathias
    et al.
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Tibbling, Anders
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Säker identitetshantering på internet: Att minimera bedrägerier och öka konsumentens säkerhet och inflytande vid e-handel2015Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Risken att en obehörig part kan komma över och använda en enskild konsuments identitets-handlingar är stor, samtidigt som individens möjlighet att kontrollera hur och när dess iden-titet används är liten. Problemformuleringen som skulle besvaras var hur identitetsstölder och bedrägerier på internet kunde minimeras samtidigt som konsumenten får ett ökat infly-tande över hanteringen av sin identitet.

    Målsättningen var att centralisera och skapa ett gemensamt förhållningssätt för identitets-hantering på internet till förmån för konsumenterna, och på så vis minimera spridning av egna lösningar för identitetshantering hos enskilda aktörer.

    Lösningen resulterade i en systemmodell med förutsättningar för att autentisera konsumen-ten, hantera filter för hur enskilda identitetshandlingar får användas på internet, samt för att möjliggöra kommunikation med konsumenten genom att skicka notifikationer om händelser som uppstått kopplat till en specifik identitet. Genom en användarportal skulle konsumen-ten kunna administrera sina filter för olika e-tjänster och webbutiker samt få en överblick över specifika händelser som inträffat.

    En prototyp togs fram för att demonstrera systemmodellens grundläggande funktionalitet i praktiken. Denna kom att innefatta funktionalitet för att autentisera konsumenten, skicka notifikationer om händelser och kontrollera existerande filter för en specifik identitet. Pro-totypen kom att bestå av ett förenklat system enligt den modell som tagits fram, med ett tillhörande API samt två modeller motsvarande en webbutik och en betalningsväxel som skulle nyttja funktionaliteten genom att anropa systemets API.

    Lösningen utvärderades baserat på det uppnådda resultatet från intervjuer med experter inom problemområdet och genomförd funktionskontroll av den framtagna prototypen. Ge-nom utvärderingen kunde slutsatsen dras att identitetsbaserade bedrägerier med stor sanno-likhet skulle sjunka drastiskt och att den enskilde konsumentens inflytande och medveten-het skulle stärkas. Den största bidragande faktorn till slutsatsen ansågs främst vara det kon-sistenta och standardiserade sätt som skapats för autentisering av och kommunikation med konsumenten. På så vis skulle aktörerna själva avsätta delar av den funktionalitet och de säkerhetsrisker som ansågs finnas i anslutning till hanteringen av identiteter på internet.

    Svårigheterna med den föreslagna lösningen ansågs vara att få konsumenter, webbutiker och betalningsväxlar att ansluta sig till ett centralt system då man av affärsmässiga skäl väljer att behålla särskilda delar internt.

  • 2720.
    Åkerblom, Jacob
    Mälardalens högskola, Akademin för innovation, design och teknik.
    UTVÄRDERING AV UTVALDA SD-WAN PRODUKTER2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna jämförelsestudie ämnar att undersöka marknadens leverantörer av nätverksutrustning de- finierade som Software Defined Wide Area Networks(SD-WAN). SD-WAN är en innovativ teknik som applicerar virtualisering och Software defined networking koncept i Wide Area Networks (WAN) för att skapa kostnadseffektiva nätverk. Studien har utförts på företaget Curitiba som idag arbetar med konsulttjänster inom utvalda WAN-optimering och SD-WAN-produkter. Arbetets syfte är att utvärdera SD-WAN-lösningar och specificera i vilken typ av företagsnätverk lösningen bäst appliceras. Undersökningen börjar med en utredning av dagens organisationsnätverk för att kunna utföra en jämförelse mot SD-WAN. Därefter utvärderas fem leverantörer av nätverksutrustning definierade som SD-WAN, dessa är: Cisco IWAN, CloudGenix, Riverbed Steelconnect, Talari och Viptela. Produkter från Viptela utvärderas i ett test som undersöker komplexiteten i konfiguration av produkten. Utöver SD-WAN jämförelsen undersöks dagens state of practice och vilka fördelar samt nackdelar denna har över SD-WAN. Cisco IWAN är en sammanslagning av Ciscos tidigare funktioner som tillammans bildar en komplett SD-WAN-lösning, för att uppnå detta behöver produkterna kompletteras med programvarulicenser. CloudGenix är en nystartad nätverksleverantör som erbjuder en SD-WAN-produkt som liknar många andra aktörer men utmärker sig med avancerad applikationsidentifikation. Riverbed SteelConnect är intressant för organisationer som söker en simplifierad helhetslösning med ett centraliserat gränssnitt. Talari var en av de första SDWAN-leverantörerna och fokuserar på applikationsprestanda och pålitlighet men saknar några av funktionerna som de andra aktörerna erbjuder. Viptela erbjuder en simplifierad SD-WAN-lösning med hög skalbarhet. SD-WAN som teknik har många spännande funktioner, organisationer som planerar att investera i en uppgradering av WAN-infrastruktur bör undersöka SD-WAN alternativ.

  • 2721.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Fredriksson, Johan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Sweden.
    Möller, Anders
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Uppsala University, Sweden.
    Tivoli, Massimo
    University of L'Aquila, Italy.
    The SAVE approach to component-based development of vehicular systems2007Ingår i: Journal of Systems and Software, ISSN 0164-1212, Vol. 80, nr 5, 655-667 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The component-based strategy aims at managing complexity, shortening time-to-market, and reducing maintenance requirements by building systems with existing components. The full potential of this strategy has not yet been demonstrated for embedded software, mainly because of specific requirements in the domain, e.g., those related to timing, dependability, and resource consumption. We present SaveCCT - a component technology intended for vehicular systems, show the applicability of SaveCCT in the engineering process, and demonstrate its suitability for vehicular systems in an industrial case-study. Our experiments indicate that SaveCCT provides appropriate expressiveness, resource efficiency, analysis and verification support for component-based development of vehicular software. 

  • 2722.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Uppsala, Sweden.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Sjödin, Mikael
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Nolte, Thomas
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    The SaveCCM Language Reference Manual2007Rapport (Övrigt vetenskapligt)
    Abstract [en]

    This language reference describes the syntax and semantics of SaveCCM, a

    component modeling language for embedded systems designed with vehicle applications and safety concerns in focus. The SaveCCM component model was

    defined within the SAVE project. The SAVE components are influenced mainly

    by the Rubus component technology, with a switch concept similar to that

    in Koala. The semantics is defined by a transformation into timed automata

    with tasks, a formalism that explicitly models timing and real-time task scheduling.

    The purpose of this document is to describe a semantics of the SAVE component modeling language, which can be used to describe timing and functional behavior of components. The model of a system is in some cases an over approximation of the actual system behavior. An implementation of a model can resolve non-determinism e.g. by merging tasks or assigning a scheduling policy (such as static scheduling or fixed priority, preemptive or not) that will resolve

    the non-determinism.

  • 2723.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Möller, Anders
    Hansson, Hans
    Nolin, Mikael
    Towards a Dependable Component Technology for Embedded System ApplicationsManuskript (Övrigt vetenskapligt)
  • 2724.
    Åkesson, Anders
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Lewenhagen, Kenneth
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Node.js in Open Source projects on Github: A literature study and exploratory case study2015Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This study has been performed with an aim to provide an insight into how Node.js is used and the Node.js technology adaptation in the open source community. This research displays the diversity of Node.js and can inspire the reader to further development or continued research.

    Studies into different usages of Node.js have been missing in academic research and therefore this study gives a new, important insight into this technology.

    The authors used the exploratory case study methodology. For data collection, the authors created a JQuery and HTML script that fetched the desired dataset from Github and that were used as a static base for the study. Based on the usage areas extracted from the literature study, the authors specified different categories of usage. The dataset was manually investigated and placed into the categories, if they were relevant.

    The results show that web applications is by far the most well represented category with over 50% of all usages falling into this category. Network applications and Web servers come in at second and third position with 14% and 13% respectively.

    This study provided further categories and the authors could generate a set of diagrams, showing a trend on how the different usage areas changed from 2010 to 2015.

  • 2725.
    Åklint, Richard
    et al.
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Khan, Muhammad Farhan
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Multidimensional Visualization of News Articles2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Large data sets are difficult to visualize. For a human to find structures and understand the data, good visualization tools are required. In this project a technique will be developed that makes it possible for a user to look at complex data at different scales. This technique is obvious when viewing geographical data where zooming in and out gives a good feeling for the spatial relationships in map data or satellite images. However, for other types of data it is not obvious how much scaling should be done.

    In this project, an experimental application is developed that visualizes data in multiple dimensions from a large news article database. Using this experimental application, the user can select multiple keywords on different axis and then can create a visualization containing news articles with those keywords.

    The user is able to move around the visualization. If the camera is far away from the document icons then they are clustered using red coloured spheres. If the user moves the camera closer to the clusters they will pop up into single document icons. If the camera is very close to the document icons it is possible to read the news articles

  • 2726.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Kato, Shinpei
    Carnegie Mellon University, Department of Electrical and Computer Engineering, United States.
    A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux2011Ingår i: Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011, 2011, 380-387 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a Hierarchical Scheduling Framework (HSF) recorder for Linux-based operating systems. The HSF-recorder is a loadable kernel module that is capable of recording tasks and servers without requiring any kernel modifications. Hence, it complies with the reliability and stability requirements in the area of embedded systems where proven versions of Linux are preferred. The recorder is built upon the loadable real-time scheduler framework RESCH (REal-time SCHed- uler). We evaluate our recorder by comparing the overhead of this solu- tion against two other recorders. Also, the tracing accuracy of the HSF- recorder is tested by running a media-processing task together with periodic real-time Linux tasks in combination with servers. We experiment with different task parameters and scheduling strategies and measure the performance of the media-processing task. The tests are recorded with the HSF-recorder, and the Ftrace recorder, in order to show the correctness of the experiments and the HSF-recorder itself.

  • 2727.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Pettersson, Paul
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Modelling, Verification and Synthesis of Two-Tier Hierarchical Fixed-Priority Preemptive Scheduling2011Ingår i: Proceedings - 23rd EUROMICRO Conference on Real-Time Systems (ECRTS'11), 2011, 172-181 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Hierarchical scheduling has major benefits when it comes to integrating hard real-time applications. One of those benefits is that it gives a clear runtime separation of applications in the time domain. This in turn gives a protection against timing error propagation in between applications. However, these benefits rely on the assumption that the scheduler itself schedules applications correctly according to the scheduling parameters and the chosen scheduling policy. A faulty scheduler can affect all applications in a negative way. Hence, being able to guarantee that the scheduler is correct is of great importance. Therefore, in this paper, we study how properties of hierarchical scheduling can be verified. We model a hierarchically scheduled system using task automata, and we conduct verification with model checking using the Times tool. Further, we generate C-code from the model and we execute the hierarchical scheduler in the Vx Works kernel. The CPU and memory overhead of the modelled scheduler is compared against an equivalent manually coded two-level hierarchical scheduler. We show that the worst-case memory consumption is similar and that there is a considerable difference in CPU overhead.

  • 2728.
    Åstrand, Elaine
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. Université Claude Bernard, Lyon, France.
    Wardak, Claire
    Université Claude Bernard, Lyon, France.
    Baraduc, Pierre
    Université Claude Bernard, Lyon, France.
    Ben Hamed, Suliann
    Université Claude Bernard, Lyon, France.
    Direct Two-Dimensional Access to the Spatial Location of Covert Attention in Macaque Prefrontal Cortex.2016Ingår i: Current Biology, ISSN 0960-9822, E-ISSN 1879-0445, Vol. 26, nr 13, 1699-1704 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Direct access to motor cortical information now enables tetraplegic patients to precisely control neuroprostheses and recover some autonomy. Incontrast, explicit access to higher cortical cognitive functions, such as covert attention, has been missing. Indeed, this cognitive information, known only to the subject, can solely be inferred by an observer from the subject's overt behavior. Here, we present direct two-dimensional real-time access to where monkeys are covertly paying attention, using machine-learning decoding methods applied to their ongoing prefrontal cortical activity. Decoded attention was highly predictive of overt behavior in a cued target-detection task. Indeed, monkeys had a higher probability of detecting a visual stimulus as the distance between decoded attention and stimulus location decreased. This was true whether the visual stimulus was presented at the cued target location or at another distractor location. In error trials, in which the animals failed to detect the cued target stimulus, both the locations of attention and visual cue were misencoded. This misencoding coincided with a specific state of the prefrontal cortical population in which the shared variability between its different neurons (or noise correlations) was high, even before trial onset. This observation strongly suggests a functional link between high noise-correlation states and attentional failure. Overall, this real-time access to the attentional spotlight, as well as the identification of a neural signature of attentional lapses, open new perspectives both to the study of the neural bases of attention and to the remediation or enhancement of the attentional function using neurofeedback.

  • 2729.
    Åström Åberg, Fabian
    Linköpings universitet, Institutionen för datavetenskap.
    Dry-run med hjälp av union mount2015Självständigt arbete på grundnivå (kandidatexamen), 10,5 poäng / 16 hpStudentuppsats (Examensarbete)
  • 2730.
    Çürüklü, Baran
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lansner, Anders
    Configuration-specific facilitation phenomena explained by layer 2/3 summation pools in V12009Konferensbidrag (Refereegranskat)
  • 2731.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Düring, Morgan
    Millberg, Mikael
    Evaluating the Efficacy of utilizing a Protocol Grammar for Modeling of a Processor Architecture: A Case Study2002Ingår i: Proceedings of NORCHIP, 2002, 309-315 s.Konferensbidrag (Refereegranskat)
  • 2732.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Eles, Petru
    Linköpings Tekniska Högskola.
    Hemani, Ahmed
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Kuchcinski, Krzystof
    Linköpings Tekniska Högskola.
    Peng, Zebo
    Linköpings Tekniska Högskola.
    Specifying Local Timing Constraints in VHDL for HLS of Digital Systems1995Ingår i: Proceedings of the 6th Swedish Workshop on Copmuter System Architecture, 1995Konferensbidrag (Refereegranskat)
  • 2733.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Ellervee, Johnny
    Revolver: A high-performance MIMD architecture for collision free computing1998Konferensbidrag (Refereegranskat)
  • 2734.
    Öberg, Johnny
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Ellervee, Peeter
    Kumar, Anshul
    Hemani, Ahmed
    Comparing Conventional HLS with Grammar-Based Hardware Synthesis: A Case Study1997Konferensbidrag (Refereegranskat)
  • 2735.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Ellervee, Peeter
    Mokhtari, Mehran
    Jantsch, Axel
    SpaceBall-1G: A 32-bit 1 GIPS Peak Performance MIMD CPU Targeted for GaAs1995Rapport (Övrigt vetenskapligt)
  • 2736.
    Öberg, Johnny
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Robino, Francesco
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    A NoC Generator for the Sea-of-Cores Era2011Ingår i: Proceedings of FPGAWorld 2011, 2011Konferensbidrag (Refereegranskat)
  • 2737.
    Östberg, Per-Olov
    et al.
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för datavetenskap.
    Elmroth, Erik
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för datavetenskap.
    Service development abstraction: A design methodology and development toolset for abstractive and flexible service-based software2011Ingår i: Cloud Computing and Service Science / [ed] Ivanov, van Sinderen, and Shishkov, Springer, 2011Kapitel i bok, del av antologi (Refereegranskat)
  • 2738.
    Österlund, Erik
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Löwe, Welf
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap (DV).
    Block-free concurrent GC: Stack scanning and copying2016Ingår i: ISMM 2016: Proceedings of the 2016 ACM SIGPLAN International Symposium on Memory Management, ACM Press, 2016, 1-12 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    On-the-fly Garbage Collectors (GCs) are the state-of-the-art concurrent GC algorithms today. Everything is done concurrently, but phases are separated by blocking handshakes. Hence, progress relies on the scheduler to let application threads (mutators) run into GC checkpoints to reply to the handshakes. For a non-blocking GC, these blocking handshakes need to be addressed. Therefore, we propose a new non-blocking handshake to replace previous blocking handshakes. It guarantees schedulingindependent operation level progress without blocking. It is scheduling independent but requires some other OS support. It allows bounded waiting for threads that are currently running on a processor, regardless of threads that are not running on a processor. We discuss this non-blocking handshake in two GC algorithms for stack scanning and copying objects. They pave way for a future completely non-blocking GC by solving hard open theory problems when OS support is permitted. The GC algorithms were integrated to the G1 GC of OpenJDK for Java. GC pause times were reduced to 12.5% compared to the original G1 on average in DaCapo. For a memory intense benchmark, latencies were reduced from 174 ms to 0.67 ms for the 99.99% percentile. The improved latency comes at a cost of 15% lower throughput.

  • 2739.
    Östman, Alexander
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Distributed Dominant Resource Fairness using Gradient Overlay2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Resurshantering är en viktig komponent i många distribuerade kluster. En resurshanterare bestämmer vilken server som skall exekvera en uppgift, och vilken användares uppgift som skall allokeras. Om ett system har flera användare med liknande krav, bör resurserna tilldelas jämnlikt mellan användarna. Idag implementeras resurshanterare oftast som en centraliserad server som har information om alla servrar i klustret och de olika användarna. En centraliserad server skapar dock problem som driftstopp vid avbrott på ett enda ställe, även enbart vertikal skalning för resurshanteraren.

    Denna uppsats fokuserar på jämnlikhet för användare med en decentraliserad resurshanterare. En lösning föreslås, Parallel Distributed Gradient-based Dominant Resource Fairness, som tillåter servrar att hantera en delmängd av användare i systemet, detta med en liknande jämnlikhet jämförande med en centraliserad server. Lösningen använder en så kallad gradient network topology overlay för att sortera servrarna baserat på deras användares resursanvändning och tillåter en server att veta om den har användaren med lägst resursanvändning i klustret.

    Lösningen jämförs med existerande lösningar baserat på jämnlikhet och allokeringstid. Resultaten visar att lösningen ger en mer jämnlik allokering än existerande lösningar utifrån gini-koefficienten. Resultaten visar även att systemets skallbarhet angående allokeringstid är beroende på antalet användare i klustret eftersom det tillåter fler parallella allokeringar. Lösningen skalar inte lika bra dock som existerande distribuerade lösningar. Med 40 användare och över 100 servrar har lösningen liknande tid som en centraliserad server, och är snabbare med fler användare.

  • 2740.
    Čaušević, Adnan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Land, Rikard
    Maximatecc AB, Västerås, Sweden.
    Sellin, Ola
    Bombardier Transportation, Väserås, Sweden.
    Automated Regression Test Generation Using Record & Replay Approach: A Case Study on Train Control Management System2016Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Organizations tend to limit their investment in test automation due to the lack of information on the actual tests reuse and when will automated tests really pay off. However, to perform efficient regression testing of software systems, it is expected from a development team to posses a certain level of test automation infrastructure in place, where at the minimum the test execution is scripted and automated. In this paper we are proposing the usage of record & replay approach to observe the functional usage of a component under test, while its being invoked as part of the whole system or only in a certain portion of it. Afterwords, executable tests are automatically derived, containing both test inputs and test verdict, allowing its later usage as part of a regression testing. With as minimal effort as one manual test execution, developers are provided with automated tests, minimizing any concerns on the investment in automation. A case study from Bombardier Transportation is provided showing how the proposed approach substantially reduced the test effort needed when performing regression testing of the train control management system for the Stockholm C30 metro train.

  • 2741.
    Šljivo, Irfan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Afshar, Sara
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Agent-centred Approach for Assuring Ethics in Dependable Service Systems2017Ingår i: 13th IEEE World Congress on Services SERVICES 2017, 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    As the world enters the information era, more and more dependable services controlling and even making our decisions are moved to the ubiquitous smart devices. While various standards are in place to impose the societal ethical norms on decision-making of those devices, the rights of the individuals to satisfy their own moral norms are not addressed with the same scrutiny. Hence, the right of the individuals to reason on their own and evaluate morality of certain decisions is at stake, as many decisions are outsourced from the user to the service providers and third party stakeholders without the user's full awareness of all the aspects of those decisions. In this work we propose an agent-centred approach for assuring ethics in dependable technological service systems. We build upon assurance of safety and security and propose the notion of ethics assurance case as a way to assure that individual users have been made aware of all the ethically challenging decisions that might be performed or enabled by the service provider. We propose a framework for identifying and categorising ethically challenging decisions, and documenting the ethics assurance case. We apply the framework on an illustrative example.

52535455 2701 - 2741 av 2741
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf