Change search
Refine search result
52535455565758 2701 - 2750 of 3008
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 2701.
    Vilela, Jéssyka
    et al.
    Universidade Federal de Pernambuco, BRA.
    Castro, Jaelson
    Universidade Federal de Pernambuco, BRA.
    Martins, Luiz Eduardo Galvão
    Universidade Federal de São Paulo, BRA.
    Gorschek, Tony
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Integration between requirements engineering and safety analysis: A systematic literature review2017In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 125, p. 68-92Article in journal (Refereed)
    Abstract [en]

    Context: Safety-Critical Systems (SCS) require more sophisticated requirements engineering (RE) approaches as inadequate, incomplete or misunderstood requirements have been recognized as a major cause in many accidents and safety-related catastrophes. Objective: In order to cope with the complexity of specifying SCS by RE, we investigate the approaches proposed to improve the communication or integration between RE and safety engineering in SCS development. We analyze the activities that should be performed by RE during safety analysis, the hazard/safety techniques it could use, the relationships between safety information that it should specify, the tools to support safety analysis as well as integration benefits between these areas. Method: We use a Systematic Literature Review (SLR) as the basis for our work. Results: We developed four taxonomies to help RE during specification of SCS that classify: techniques used in (1) hazard analysis; (2) safety analysis; (3) safety-related information and (4) a detailed set of information regarding hazards specification. Conclusions: This paper is a step towards developing a body of knowledge in safety concerns necessary to RE in the specification of SCS that is derived from a large-scale SLR. We believe the results will benefit both researchers and practitioners.

  • 2702.
    Vilela, Jéssyka Flavyanne Ferreira
    et al.
    Universidade Federal do Ceara, BRA.
    Castro, Jaelson Freire B.
    Universidade Federal de Pernambuco, BRA.
    Martins, Luiz Eduardo Galvão
    Universidade Federal de Sao Paulo, BRA.
    Gorschek, Tony
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Safety Practices in Requirements Engineering: The Uni-REPM Safety Module2018In: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520Article in journal (Refereed)
    Abstract [en]

    Context: Software is an important part in safety- critical system (SCS) development since it is becoming a major source of hazards. Requirements-related hazards have been as- sociated with many accidents and safety incidents. Requirements issues tend to be mitigated in companies with high processes maturity levels since they do their business in a systematic, consistent and proactive approach. However, requirements en- gineers need systematic guidance to consider safety concerns early in the development process. Goal: the paper investigates which safety practices are suitable to be used in the Requirements Engineering (RE) process for SCS and how to design a safety maturity model for this area. Method: we followed the design science methodology to propose Uni-REPM SCS, a safety module for Unified Requirements Engineering Process Maturity Model (Uni-REPM). We also conducted a static validation with two practitioners and nine academic experts to evaluate its coverage, correctness, usefulness and applicability. Results: The module has seven main processes, fourteen sub-processes and 148 practices that form the basis of safety processes maturity. Moreover, we describe its usage through a tool. Conclusions: The validation indicates a good coverage of practices and well receptivity by the experts. Finally, the module can help companies in evaluating their current practices. IEEE

  • 2703.
    VINEELA, BEAULAH
    Mälardalen University, School of Innovation, Design and Engineering.
    Traceability in Model Based Testing2009Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    From early day’s on modeling played a vital role in the software development process, especially for a detailed understanding of the system that is being developed. Due to importance and usefulness of modeling, Model Driven Development (MDD) approach is widely growing in recent times. Seizing the benefits of model driven approach in design and implementation phases of software development life cycle, it is being extended to other phases of software development as well. In testing as well, which is an important phase of development, for delivering quality software to the customers, this concept of models and modeling techniques are being enforced. Use of modeling techniques in software testing has made testing more effective. Model Based Testing (MBT) is a black-box testing approach where test cases are automatically generated from a behavioral model of the System Under Test (SUT). In order to know relevance of these auto generated test cases on SUT, traceability of these test cases to the requirements is an important factor. Maintaining traceability with test cases would ease software engineering activities like performing impact analysis, measuring the test coverage, and knowing the criticality of the requirement and thereby performing requirements validation. In this thesis, different traceability techniques and approaches from the perspective of model driven engineering have been analyzed.  The results of the research presented in this thesis are aimed at supporting requirements traceability in model based testing tool by taking into account factors like providing a good impact analysis, finding the criticality of requirements, tracking test coverage of each requirement.

  • 2704.
    Vishnubhotla, Sai Datta
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Mendes, Emilia
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering. Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Lundberg, Lars
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    An insight into the capabilities of professionals and teams in agile software development: A systematic literature review2018In: ACM International Conference Proceeding Series, Association for Computing Machinery , 2018, p. 10-19Conference paper (Refereed)
    Abstract [en]

    Background: Previous studies investigated key characteristics of software engineers and factors influencing the performance of individuals, productivity of teams and project success within agile software development (ASD). They aided in the active investigation of human aspects in ASD. However, capability measurement and prediction with respect to agile workforce, owing to its importance, is an area that needs spotlight. Objective: The objective of this paper is to present the state of the art relating to capability measurement of software engineers and teams working in ASD projects. Method: We carried out a systematic literature review (SLR) focused on identifying attributes used for measuring and predicting the capabilities of individual software engineers and teams. Results: Evidence from 16 studies showed attributes that can measure capabilities of engineers and teams, and also attributes that can be used as capability predictors. Further, different instruments used to measure those attributes were presented. Conclusions: The SLR presented a wide list of attributes that were grouped into various categories. This information can be used by project managers as, for example, a checklist to consider when allocating software engineers to teams and in turn teams to a project. Further, this study indicated the necessity for an investigation into capability prediction models. © 2018 Association for Computing Machinery.

  • 2705.
    Vishnubhotla, Sai Datta
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Mendes, Emilia
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering. Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Lundberg, Lars
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Designing a capability-centric web tool to support agile team composition and task allocation: A work in progress2018In: Proceedings - International Conference on Software Engineering, IEEE Computer Society , 2018, Vol. F137813, p. 41-44Conference paper (Refereed)
    Abstract [en]

    A significant number of studies reported models for competence profiling, measuring capabilities of professionals and recommendation systems for roles within agile software development (ASD). These models coordinated in human resource management within ASD. However, in the light of swift, incremental and iterative nature of ASD practices, designing solutions that easily integrate capability measurements with ongoing project management routines, is an important area for investigation. With the support of interviews, grounded theory procedure and workshops, we identified the aspects valued by our industrial collaborator while allocating professionals to tasks. This information was further utilized towards devising a framework for capability-centric Web tool. This tool provides a one-stop solution for project managers to create projects, keep track of capabilities and execute allocation routines. © 2018 ACM.

  • 2706.
    Vitoria, David
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Aligning XP with ISO 9001:2000 -TickIT Guide 5.0: A Case Study in two Academic Software Projects2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Since last four to five years the buzz of continuous growing of agile development has been spread all around the world, specially Extreme Programming as the most important methodology of this kind. From the other side, ISO 9001:2000-TickIT Guide 5.0 has been established mainly in Europe as one of the well-known Quality Management Systems, in order to create a continuous software process improvement throughout software organizations that is mainly related to a certi¯cation process. This thesis is developed to mainly answer the question of how Extreme Programming and the standard ISO 9001:2000 with its interpretation for software development as TickIT Guide 5.0 can be used together, in order to have a continuous software process improvement with the agility to respond quickly to environment changes and satisfy the customer needs and expectations.

  • 2707.
    Vlassov, Vladimir
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Al-Shishtawy, Ahmad
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Brand, Per
    Swedish Institute of Computer Science, Sweden.
    Parlavantzas, Nikos
    Université Européenne de Bretagne, France.
    Niche: A Platform for Self-Managing Distributed Applications2012In: Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification / [ed] Phan Cong-Vinh, IGI Global, 2012, p. 241-283Chapter in book (Refereed)
    Abstract [en]

    We present Niche, a general-purpose, distributed component management system used to develop, deploy,and execute self-managing distributed applications. Niche consists of both a component-based programming model as well as a distributed runtime environment. It is especially designed for complex distributed applications that run and manage themselves in dynamic and volatile environments. Self-management in dynamic environments is challenging due to the high rate of system or environmental changes and the corresponding need to frequently reconfigure, heal, and tune the application. The challenges are met partly by making use of an underlying overlay in the platform to provide an efficient, location-independent,and robust sensing and actuation infrastructure, and partly by allowing for maximum decentralization of management. We describe the overlay services, the execution environment, showing how the challengesin dynamic environments are met. We also describe the programming model and a high-level design methodology for developing decentralized management, illustrated by two application case studies.

  • 2708.
    Vo, Thanh Dien
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Utvärdering av programmeringsverktygen i affärssystemet Pyramid2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Datakraft i Småland AB is an IT consulting company that specializes in hosting and IT services. The company also offers an enterprise resource planning system, called Pyramid, which has built in tools for users to make customized solutions through programming. Datakraft are now interested in getting an evaluation of the programming tools existing in the system, which is the main objective of this report.

    The questions that will be answered in this project are:

    • What is possible to do with the programming tools in Pyramid with C# in Visual Studio as a guideline?
    • Is Visual Kosmos an easy/efficient programming language to work with compared to C#?

    For the evaluation, the work consists of collecting theories and data through education and by creating a solution in Pyramid for Techno Skruv, one of Datakraft’s customers. The methodology that was used for this project is also the procedures used by DataKraft's own staff. This methodology includes the steps feasibility study, design, programming and documentation.

    The result is presented as a distinguishable comparison between Pyramid’s development environment with its programming language, Visual Cosmos and Visual Studio with the C# in table forms. With the results, analysis was made with the data combined with the theories to get the answers for the questions of the objective.

    The programming tools in Pyramid have features that can be found in the standardized Visual Studio and C#. In the light of this, theoretical, the programming tools in Pyramid have no restrictions in terms of programming. In practice, however, the tools are limited due to the fact that the system was created to serve resource planning systems, which is the conclusion of this study.

  • 2709.
    Vogel, Bahtijar
    Linnaeus University, Faculty of Technology, Department of Media Technology. Linnaeus University, Faculty of Technology, Department of Computer Science.
    An Open Architecture Approach for the Design and Development of Web and Mobile Software2014Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The rapid evolution of web and mobile technologies as well as open standards are important ingredients for developing open software applications. HTML5, affordable electronics, and connectivity costs are some of the trends that drive the web towards an open platform and lead to an increased use of distributed applications. Proprietary software technologies have been extensively deployed throughout multiple platforms, including desktop, web, and mobile systems. Such systems are closed in many cases. Thus, it is rather difficult to expand existing and create additional features for them. Web and mobile software development is fragmented with the existence of multiple browsers and mobile operating systems, that comply differently with web standards. The evolution of web and mobile technologies, coupled with the changes in the deployment environments in which they operate, has resulted in complex requirements that are challenging to satisfy. Additionally, the largest part of the development lifecycle is related to the need to constantly change/modify these software systems within a short-time period. The fact that these systems evolve over time makes it difficult to meet the changing requirements.

    In this thesis, we offer a novel open architecture approach in the area of web and mobile software design and development when dealing with heterogeneous device environments, together with constantly evolving and dynamic requirements. This approach is grounded on our experiences gained during the last four years of project work regarding the development of a web and mobile software system to support mobile inquiry learning. This case served as a testbed for experimentation with heterogeneous device environments. After five development iterations, our software solution is considered robust, flexible, and expandable as a platform. Among others, this was validated with being tested with more than 500 users. The open architecture approach is also grounded on a literature survey of state of the art projects and definitions related to this concept. The outcomes of this thesis show that an open architecture approach is characterized by flexibility, customizability, and extensibility, which are instantiated into a set of properties. The importance of stressing these three characteristics and their properties in the open architecture approach is based on the identified needs of using open source components, using open data standards, and reducing development time. The research efforts in this thesis resulted in a refined definition of an open architecture approach as well as the initial and refined models that are contextualized within the field of web and mobile software. 

    For validation of the research, the Goal Question Metric (GQM) approach is adapted and extended with a layer of Tasks/Activities. The data is collected from the project work mentioned above and three follow-up cases. The results show that the benefits of an open architecture approach can be reflected in terms of: achievement of the software system’s long-term goals; reduced development time; and increased satisfaction of the users. These benefits refer to the possibility to easily adapt emerging technologies and address dynamic changes and requirements. The contributions of this thesis are threefold: (1) for researchers, our open architecture approach could be used to analyze a system from a top down perspective; (2) for developers, it could be used as an approach to identify and address the needs for building an open evolvable system from a bottom up perspective; (3) for domain experts in the technology enhanced learning field, it could be used as a sustainability approach through which to integrate new tools and address complex requirements when designing new educational activities.

  • 2710.
    Vogel, Bahtijar
    et al.
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mikkonen, Tommi
    Tampere University of Technology, Finland.
    Milrad, Marcelo
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    From Architectural Requirements towards an Open Architecture for Web and Mobile Societal Applications2014In: Proceedings of the 1st International Workshop on Inclusive Web Programming - Programming on the Web with Open Data for Societal Applications, ACM/IEEE , 2014, p. 20-23Conference paper (Refereed)
    Abstract [en]

    This paper reflects on our experiences during the last four years regarding the development of a web & mobile application for sustainable environment. After five development cycles our software application has become robust, flexible, and expandable platform. Inspired from this and the needs identified during this process we report our research towards identifying novel architectural approaches that nourish open data and emerging web standards for developing open societal applications. The efforts resulted in an open architecture approach that relies on a set of key characteristics - flexibility, evolvability, customizability, and extensibility. Stressing these characteristics refers to the identified needs of using open standards and reducing development time. The results show that an open architecture approach provides the key ingredients in terms of system integration and data interoperability as well as the ability of the software to grow in terms of new services, devices, and subsystems attached to it, primarily due to the use of open source components and open data standards.

  • 2711.
    Vogel, Bahtijar
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science. Linnaeus University, Faculty of Technology, Department of Media Technology.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mikkonen, Tommi
    Tampere University of Technology.
    Milrad, Marcelo
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Towards an Open Architecture Model for Web and Mobile Software: Characteristics and Validity Properties2014In: 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC) / [ed] Chang, CK; Gao, Y; Hurson, A; Matskin, M; McMillin, B; Okabe, Y; Seceleanu, C; Yoshida, K, IEEE Press, 2014, p. 476-485Conference paper (Refereed)
    Abstract [en]

    Proprietary software solutions are extensively deployed through multiple platforms including desktop, web and mobile devices. Such systems are in many cases closed, thus making it difficult for software developers to expand and create additional features to these systems. Recent research in the field of web and mobile technologies indicates that open systems are more successful than those based on proprietary technologies. In this paper, we investigate and analyze existing research related to the notion of open architectures. We conducted a literature survey of the state of the art projects and definitions related to this concept. Our efforts have resulted in a refined definition of the term followed by a conceptual model of an open architecture contextualized within the field of web and mobile software. The model primarily relies on four key characteristics, namely flexibility, evolvability, customizability and extensibility. Furthermore, we present a validation plan based on the GQM approach that further instantiates these characteristics into a set of properties that can serve as metrics.

  • 2712. Volski, V.
    et al.
    Vandenbosch, G.
    Yang, J.
    Kildal, P. -S
    Vipiana, F.
    Pirinoli, P.
    Vecchi, G.
    De Vita, P.
    De Vita, F.
    Freni, A.
    Baccarelli, P.
    Rius, J. M.
    Espinosa, H.
    Mattes, M.
    Valero, A.
    Persson, Patrik
    KTH, School of Electrical Engineering (EES), Electromagnetic Engineering.
    Sipus, Z.
    Overview of the software integration activities within ACE2006Conference paper (Refereed)
    Abstract [en]

    The ACE project initiated the start of several integration activities between European institutions involved in electromagnetic modeling of antennas with planar or conformal topologies. The goal of the integration activities was / is not to create a global software package that integrates the software of all partners, but to initiate a long term process for antenna software integration activities within the European antenna community. During the first two years of ACE the integration activities were performed in several groups with a rather small number of partners in each group. The groups were formed by partners who wanted to integrate a specific approach developed by one partner into the software code of another partner. This allows increasing the capability and efficiency of a software code. In this paper a short overview of all integration activities is given.

  • 2713.
    von Essen, Rickard
    Linköping University, Department of Computer and Information Science.
    Threat Analysis of Video on Demand Services in Next Generation Networks2010Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    IP Multimedia Subsystem (IMS) is the next generation of telecommunication systems. The system is based on an IP network and uses technologies from the Internet. The IMS system is designed to evolve from a telephone system into a general information and communication system. It is meant to include television, Video on Demand (VoD), interactive services etc, etc. It is designed to simplify the implementation of newservices in telecom networks. This report investigates security aspects of VoD services when merging an IP Television (IPTV) system with IMS. The investigation covers security functions in IMS, transitionsolutions for authentication of the Set-Top-Box (STB) in IMS, and identifies problems inthe integration of IPTV and IMS. The report concludes that IMS has good solid Authentication, Authorization, and Accounting (AAA) functions that will provide security and billing functionality. One problemis found in the media control between the STB and the streaming server. This interface lacked specification at the time of investigation, and some problems have been identified. These problems have to be solved before a system can be brought into service and beregarded as secure.

  • 2714.
    Voronkov, Artem
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Challenges in Managing Firewalls2015In: Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedings, Springer, 2015, Vol. 9417, p. 191-196Conference paper (Refereed)
  • 2715. Vromant, Pieter
    et al.
    Weyns, Danny
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Malek, Sam
    Andersson, Jesper
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    On interacting control loops in self-adaptive systems2011In: Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM Press, 2011, p. 202-207Chapter in book (Refereed)
  • 2716.
    Vukovic, Divna
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Wester, Cecilia
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Staff Prediction Analysis: Effort Estimation In System Test2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This master thesis is made in 2001 at Blekinge Institute of Technology and Symbian, which is a software company in Ronneby, Sweden. The purpose of the thesis is to find a suitable prediction and estimation model for the test effort. To do this, we have studied the State of the Art in cost/effort estimation and fault prediction. The conclusion of this thesis is that it is hard to make a general proposal, which is applicable for all organisations. For Symbian we have proposed a model based on use and test cases to predict the test effort.

  • 2717.
    Vulgarakis, Aneta
    Mälardalen University, School of Innovation, Design and Engineering.
    A Resource-Aware Framework for Designing Predictable Component-Based Embedded Systems2012Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Managing complexity is an increasing challenge in the development of embedded systems (ES). Some of the factors contributing to the increase in complexity are the growing complexity of hardware and software, and the increased pressure to deliver full-featured products with reduced time-to-market. An attractive approach to manage the software complexity, reduce time-to-market and decrease development costs lies in the adoption of component-based development that has been proven as a successful approach in other domains. Another raising challenge, due to complexity increase, in ES, is predictability, i.e., the ability to anticipate the behavior of a system at run-time. The particular predictability requirements of ES call for a development framework equipped with techniques and tools that can be applied to deal with requirements, such as timing, and resource utilization, already at early-stage of development. Modeling and formal analysis play increasingly important roles in achieving predictability, since they can help us to understand how systems function, validate the design and verify some important properties.

    In this thesis, we present a resource-aware framework for designing predictable component-based ES. The proposed framework consists of (i) the formally specified ProCom component model that takes into account the characteristics of control-intensive ES, and (ii) the resource-aware timed behavioral language - REMES for modeling and reasoning about components’ and systems’ functional and extra-functional behavior that includes relevant resource types for ES, associated analysis techniques for various resource-wise properties, and a set of associated tools. To demonstrate the potential application of our framework, we present a number of case studies, out of which one is an industrial research prototype, where ProCom and REMES are applied.

  • 2718.
    Vulgarakis, Aneta
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Embedded Systems Resources: Views on Modeling and Analysis2008In: Proceedings - International Computer Software and Applications Conference, 2008, p. 1321-1328Conference paper (Refereed)
    Abstract [en]

    The conflicting requirements of real-time embedded systems, e.g. minimizing memory usage while still ensuring that all deadlines are met at run-time, require rigorous analysis of the system's resource consumption, starting at early design stages. In this paper, we glance through several representative frameworks that model and estimate resource usage of embedded systems, pointing out advantages and limitations. In the end, we describe our own view on how to model and carry out formal analysis of embedded resources, along with developing the system.

  • 2719.
    Våge, William
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Digitala hjälpmedel för aktivitetsbaserat arbetssätt2017Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The activity based workplace model is becoming more and more com- mon and the Swedish Insurance Agency is an authority that has em- braced this model. The new way of working means that more employ- ees work from home or another place than the office. The new working model needs IT solutions that can handle communication and secure document management. This has caused two problems at the Swedish Insurance Agency. The first problem is concerning confusion about how employees should connect correctly to the authority’s conference room equipment. The solution proposal should be able to evaluate if the correct equipment has been connected and present connection status information. The second is for connection to the authority’s Private Network (VPN). The problem is that users often lose or not get proper connection to the network devices when they connect through VPN. A technical solution for each problem were developed. The application for connection against conference room equipment evaluates that the user has a USB dock (with more components connected to it) connected, that the user has network connection and that the USB dock driver has installed correctly. Usability test showed that the application works as intended, except some confusion about the navigation, which was corrected. The application for VPN connection visually shows the user through an icon in the taskbar if the user is properly connected to VPN or not. The application also got the option of calling a connection script if the user loses connection. Evaluation based on Requirements Specifi- cation showed that both applications could meet their requirements and the applications were packaged and distributed to employees at the Swedish Insurance Agency.

  • 2720. Wadhwani, V
    et al.
    Memon, F
    Hameed, MM
    Architecture Based Reliability and Testing Estimation for Mobile Applications2008Conference paper (Refereed)
    Abstract [en]

    We propose an architecture-based testing and reliability framework for mobile applications. During our literature study, we explored some of the software testing and reliability techniques available, as well as investigating the techniques that are being used by industry. This paper presents case studies of two companies that are developing mobile applications. These are helpful for finding the strengths and weaknesses of existing software testing and reliability techniques. In light of these strengths and weaknesses, we propose a framework of architecture-based software testing and reliability estimation for mobile applications.

  • 2721.
    Wadhwani, Vickey
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Ahmed, Shoain
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Evaluating Evolutionary Prototyping for Customizable Generic Products in Industry2008Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Software products can be categorized into three types namely bespoke, market driven and customizable generic products. Each of these products is facing different problems in their development and to address these problems different software process models have been introduced. The use and validation of different software process models for bespoke and market driven products have been discussed in earlier work. On the other hand, less attention was paid to the customizable generic products. Our thesis will fill this gap by conducting a case study on evolutionary prototyping (EP) for customizable generic products. The main aim of the thesis is to make an initial validation of EP for customizable generic products. In order to fulfill the aforementioned aim we performed a literature study on prototyping and EP, together with development of two customizable generic products. During this development process, we used approach of EP. The results from our investigation will provide researchers and practitioners with a deep insight to the EP and also to guide them in making decision regarding the use of EP. The main findings from our investigation are as follows: • EP is not used standalone as a software process model. Rather it is used as a concept that can be augmented with some iterative software process model. • Negative and positive aspects of EP were highlighted by discussing situations where it could be a better choice, with its advantages and disadvantages. • An initial validation was performed on EP for customizable generic products. Reported results from this case study show that the selected approach is a good choice when you want to have innovative product, clear ambiguous and sketchy requirements, discover new requirements, save resources of software testing, involve and satisfy customer. EP shows vulnerabilities in documentation of product and quality of code.

  • 2722.
    Wagnberg, Michael
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Danielsson, Peter
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Internal Dashboard2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This project is about creating a Dashboard with suitable data models containing support ticket statistics for the company Sigma IT Consulting. The work flow used by Sigma today is to manually log in to the system to see the support ticket statistics, which can be a tedious and time consuming process. Furthermore, Sigma do not have any monitoring system for checking the health of their web application services. They have a need for an internal Dashboard containing this information with regularly updates. Our solution is to design suitable data models and implement them within a Dashboard application.

  • 2723.
    Walander, Tomas
    et al.
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Larsson, David
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Critical success factors in Agile software development projects2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 2724.
    Walczak, Wojciech
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Fractal Compression of Medical Images2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Medical images, like any other digital data, require compression in order to reduce disk space needed for storage and time needed for transmission. The lossless compression methods of still images can shorten the file only to a very limited degree. The application of fractal compression to medical images would allow obtaining much higher compression ratios. While the fractal magnification – an inseparable feature of the fractal compression – would be very useful in presenting the reconstructed image in a highly readable form. However, like all irreversible methods, the fractal compression is connected with the problem of information loss, which is especially troublesome in the medical imaging. A very time consuming encoding process, which can last even several hours, is another bothersome drawback of the fractal compression. Based on a survey of literature and own cogitations, the author attempts to provide an adapted to the needs of medical imaging solution that will overcome the unfavorable ailments of the fractal compression methods. The thesis does not provide only theoretical deliberations but also gives implementation of the proposed algorithm, which is used to test the suitability of the fractal compression to medical imaging. The results of the work are more than satisfying – the fidelity of the images compressed with the proposed fractal compression method meets the requirements imposed on the medical images and the fractal magnification outperforms other magnification techniques.

  • 2725.
    Wallenberg, Marcus
    et al.
    Linköping University, Department of Electrical Engineering, Computer Vision. Linköping University, Faculty of Science & Engineering.
    Forssén, Per-Erik
    Linköping University, Department of Electrical Engineering, Computer Vision. Linköping University, Faculty of Science & Engineering.
    Improving Random Forests by Correlation-Enhancing Projections and Sample-Based Sparse Discriminant Selection2016In: Proceedings 13th Conference on Computer and Robot Vision CRV 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 222-227Conference paper (Refereed)
    Abstract [en]

    Random Forests (RF) is a learning techniquewith very low run-time complexity. It has found a nicheapplication in situations where input data is low-dimensionaland computational performance is paramount. We wish tomake RFs more useful for high dimensional problems, andto this end, we propose two extensions to RFs: Firstly, afeature selection mechanism called correlation-enhancing pro-jections, and secondly sparse discriminant selection schemes forbetter accuracy and faster training. We evaluate the proposedextensions by performing age and gender estimation on theMORPH-II dataset, and demonstrate near-equal or improvedestimation performance when using these extensions despite aseventy-fold reduction in the number of data dimensions.

  • 2726.
    Wallin, Johan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    Xamarin: En jämförelse mellan native och cross-platform2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today there are many different types of smartphones with different types of platforms of the type of Android, iOS and Windows Phone. To be available to develop application software for each platform requires specific libraries, tools and programming languages. Because of the time spent of developing different application for each platform developers have come forth with couple of different frameworks that allows developers to develop to multiple platforms at once.The framework Xamarin makes it possible to develop to Android, iOS and a couple of Windows platforms at once. But because of the logic of Xamarin all the written code will be translated by the framework to work for each native platform.To make the choice to use a framework like Xamarin it requires some thought and by listing all the corresponding platforms tools and programming languages to all the platforms Xamarin covers it makes it easier for the developer to choose from experience. But the tools and programming languages experience is not all, in an earlier study of the framework Xamarin they test the frameworks ability to translate the code to native and it could differ between the translations. To prove that there may be some performance differences between application developed with Xamarin and the native applications two applications are developed with an algorithm that simulates CPU work. And by comparing the time it took for both the applications to finish the algorithm the application that was made in Java performed faster and is more effective than the translated Xamarin one.

  • 2727.
    Wallin, Lars
    et al.
    Linköping University, Department of Electrical Engineering. Linköping University, The Institute of Technology.
    Kornfeldt, Eva
    Linköping University, Department of Electrical Engineering. Linköping University, The Institute of Technology.
    Hierarkisk kodning för faksimilbilder1980Report (Other academic)
    Abstract [sv]

    Här undersöks hierarkisk kodning av binära bilder och jämförs med en av CCITT standardiserad endimensionell kod. Resultaten visar att prestanda för de hierarkiska koderna uppfyller det mål man vanligtvis vill uppnå.

  • 2728.
    Wallin, Peter
    Mälardalen University, School of Innovation, Design and Engineering.
    Identifying and Managing Key Challenges in Architecting Software-Intensive Systems2011Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    In many traditional industry applications, such as automotive, process automation and manufacturing automation, software plays a crucial role as an enabler for the introduction of new functionality and retaining competitiveness. The system and software architecture plays an important part in ensuring the systems’ qualities. However, the design of the architecture may be neglected during system development, whilst development efforts are centered on implementing new functionality. The architecture is supposed to support and enable key quality attributes such as safety, reliability, maintainability and flexibility, and so on. This thesis identifies some of the key issues in architecting these software intensive systems. In total, 21 issues have been identified; examples of these issues are (1) there is a lack of process for architecture development, (2) there is a lack of method or model to evaluate business value when choosing architecture, (3) there is a lack of clear long-term architectural strategy, and (4) processes and methods are less valued than individuals’ knowledge and competence. Through a series of workshops, root causes were identified for a selection of these issues. Based on these root causes, five success factors were identified. The success factors are (1) define an architectural strategy (2) implement a process for architectural work (3) ensure authority for architects (4) clarify the business impact of the architecture and (5) optimize on the project portfolio level instead of optimizing each project. In an attempt to provide a possible solution to some of the issues, a method has been created to evaluate how new functionality is successfully integrated into an existing architecture. The method is a combination of the Architecture Tradeoff Analysis Method, ATAM, and the Analytical Hierarchy Process, AHP. The method firstly supports a structured way of listing system goals, and secondly, it also supports design decision-making. Since several issues relate to the organization and are affected by management, a comparison was made between the view of management and architects. This study revealed that one cause for the lack of focus on architecture could be that the existing performance measurement systems used by management all focus on the later phases of development when the architecture is already set.

     

  • 2729.
    Wallin, Peter
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Johnsson, Stefan
    Mälardalen University, School of Innovation, Design and Engineering.
    Axelsson, Jakob
    Volvo Car Corporation.
    Issues Related to Development of E/E Product Line Architectures in Heavy Vehicles2009In: 42nd Annual Hawaii International Conference on System Sciences, IEEE Computer Society, Hawaii, USA, IEEE Computer Society , 2009, p. Article number: 4755804-Conference paper (Refereed)
    Abstract [en]

    The amount of electronics in vehicles is growing quickly, thus systems are becoming increasingly complex which makes the engineering of these software intensive systems more and more difficult. In the automotive industry the use of product line architectures enables a set of vehicles to share architecture to decrease cost and increase quality. In this study we investigate key issues related to real-world decisions regarding electrical and electronic product line architecture for heavy vehicles. To extract key issues a multiple exploratory case study at two heavy vehicle manufacturers was performed. We used semi-formal interviews complemented with a survey to validate the results. The contribution of this study is 14 issues that reflect the situation at the two companies. Many of the identified issues relate to non technical areas such as organization, process, methods and tools, and management. Moreover, possible actions to deal with these issues are discussed.

  • 2730.
    Wallin, Peter
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Larsson, Stig
    Mälardalen University, School of Innovation, Design and Engineering.
    Fröberg, Joakim
    Mälardalen University, School of Innovation, Design and Engineering.
    Axelsson, Jakob
    Mälardalen University, School of Innovation, Design and Engineering.
    Practitioners’ views of Key Issues and their Solutions in the Development of System and Software ArchitectureManuscript (preprint) (Other academic)
    Abstract [en]

    Context: In many traditional industry applications, including automotive, process automation and manufacturing automation, software plays a crucial role as an enabler in the introduction of new functionality and to stay competitive. System and software architecture plays an important part in ensuring the qualities of the systems. However, the design of the architecture may be neglected during system development, whilst development efforts are centered on implementing new functionality.

    Objective: We present the challenges, problems, and success factors that are central to the architectural development of software intensive systems as judged by practitioners.

    Method: The method used consisted of three steps. First, we used semi-structured interviews to collect data in an exploratory manner. In a second step, a survey based on issues extracted from the structured interview data was used to investigate the occurrence of these issues in a wide range of organizations. In order to identify and suggest solutions to the issues that were considered important, we finally performed root cause analysis workshops.

    Results: A total of 21 issues have been identified, and examples of these issues are (1) there is a lack of process in architecture development, (2) there is a lack of methodology or models for evaluating business value when choosing architecture, (3) there is a lack of clear long-term architectural strategy, and (4) processes and methods are of less value than the knowledge and competence of individuals.

    Conclusion: In conclusion, we are convinced that the following success factors are crucial components in developing software intensive systems: (1) defining an architectural strategy, (2) implementing a process for architectural work, (3) ensuring authority for architects, (4) clarifying the business impact of the architecture, and (5) optimization at the project portfolio level, instead of optimizing each project.

     

  • 2731.
    Wallnau, Kurt C.
    Mälardalen University, School of Innovation, Design and Engineering.
    Predictability By Construction: Working the Architecture/Program Seam2010Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Contemporary software engineering practice overemphasizes the distinction of software design from software implementation, and designer (“software architect”) from implementor (“computer programmer”). In this contemporary meme, software architects are concerned with large-grained system structures, quality attributes that arise from these structures (security, availability, performance, etc.) and quality attribute tradeoff to satisfy conflicting stakeholder needs; programmers are concerned with low–level algorithms and data structures, program functionality, and with satisfying architectural intent. However, software is unique in that design and implementation are not cleanly separable. While architect and programmer may have many different design concerns, they also have many complementary and interacting concerns; their respective design practices must be well–integrated. Instead, contemporary architecture and programming practices are diverging. Architects are likely to regard programming as a routine production activity, while programmers are likely to regard architecture as a routine management activity; communication is hindered by a lack of shared vocabulary or appreciation of mutual concerns. Instead of effective integration, a gap has opened in software architecture and programming practice.

    The research reported here defines the architecture/program seam (“the Seam”), a region of overlap in software architecture and programming practice. The Seam emphasizes design concerns centered on achieving predictable runtime behavior. For a behavior to be predictable it must be described in a theory that must ultimately be consistent with basic theories of computation, and each such theory must have objective evidence to demonstrate that theory observations correspond to system observations. The validity of a theory will likely depend on invariants that can be expressed, and enforced, by means of theory–induced design rules. A system that satisfies the design rules of a theory is then regarded as having behavior that is predictable by construction with respect to that theory. Predictability by construction reduces uncertainty, and hence risk in design, and helps designers explain complex design decisions. The research reported here also defines prediction–enabled component technology (PECT) as a foundation technology to support the Seam, and demonstrates a prototype on industrial problems in electric grid substation control, industrial robot control, and desktop streaming audio.

    The prototype PECT extends a basic component technology of pure assembly (“Pin”) with theory extension points (“reasoning frameworks”) that are used to achieve predictability by construction. Reasoning frameworks for real–time performance and temporal–logic model checking have been developed, with statistical confidence intervals providing evidence of predictive quality for the former, and code–embeddable proof certificates providing evidence for the latter. Finally, the research reported here defines the Seam itself as inducing a new kind of evolutionary design problem, whose solutions require the integration of programming language theory, design theory, specialized theories of system behavior and deep systems expertise.

  • 2732.
    Wanderydz, Kristoffer
    Blekinge Institute of Technology, School of Computing.
    WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This project focuses on web security. Some of the most famous vulnerabilities, known troubling web applications. Has been collected and analyzed. Each vulnerability collected in this project, was exploited and secured. Demon- strations from a web application prototype, developed for this project. Brings real examples for each vulnerability, both secured, and insecured. The proto- type ran on a Tomcat web server, and was developed with frameworks such as Web, Spring and Hibernate. Connected to one PostgreSQL data source. All vulnerabilities was successfully implemented in Spring framework, and they were all exploited. Every vulnerability was also secured, with different tools and methods from earlier mentioned frameworks. As a result, real examples from the prototype is used for demonstration in the project, both in a secure and an insecure state. The result views Spring as a framework with good security potential. Most of the Spring specific vulnerabilities, are logical design flaws from developers that can be avoided. Vulnerabilities not related to Spring, such as the one collected for this project. Could be prevented by using methods from the Spring framework or intelligent programming. Which leads to conclusions. Web applications are always exposed to attacks, no matter the framework in use. Creative hackers search to discover new vul- nerabilities, and update old ones all the time. Developers has a responsibility, towards the web applications users. Web applications can not just developed for normal use, but also against possible misuse. Frameworks with good reputation and well processed models, is a good ground for developing a secure application.

  • 2733.
    Wang, Cheng
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Liu, Changling
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Adopting DevOps in Agile: Challenges and Solutions2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Background. DevOps is a hot topic in recent years. It emphasizes the combination of development and operation. Agile is one of the most popular development methods, but Agile mainly focused on software development part, there is no more involvement in deployment and operations. In this case, many companies consider adopting DevOps in Agile to attempt to improve the situation.

    Objectives. The combination of two different technologies is bound to produce some challenges, whether it is for practitioners or researchers, it is very important to find these challenges and mitigate them, so this article aims to investigate the challenges of adopting DevOps in Agile, then through the systematic literature review and survey questionnaire to determine the corresponding mitigation strategy. Then, in order to detail understand the process of adopting DevOps in Agile, we use interview to research the real process of adopting DevOps in agile.

    Methods. According to our research question, we used the systematic literature review(SLR), survey questionnaire and interview as our research methodology. Through literature review, we collected data of adopting DevOps in Agile, and summary the challenges and its relevant mitigation strategies. Then survey questionnaire helped us linking the content of literature to the industry, and compare their difference. Through the interview, we explored the actual process of adopting DevOps in Agile in industry, and correspond the challenges to the actual process.

    Results. Our study summarized the software development process of adopting DevOps based on Agile and revealed 23 challenges and corresponding mitigation strategies. The report also compares the commonalities and gaps between the results from the literature and the findings of real-life adopting of DevOps challenges and mitigation strategies.

    Conclusions. In this article, we introduced the challenges and corresponding mitigation strategies for adopting DevOps based on agile and summarize the corresponding software development process. The obvious challenges and mitigation strategies were divided into four categories: 1) People 2) Project 3) Process 4) Organization, after which we conducted further discussions based on the actual conditions and compared the results of systematic literature review and the results of questionnaire to detail explore their difference.

  • 2734.
    Wang, Han
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Homomorphic Encryption on the IoT2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Security is always a big problem in IoT (internet of things),when it comes to IoT, there must have cloud computing because many devices in IoT are small embedded devices and they don’t always have enough power to finish some complex calculations. Then, they need to take advantage of a third party system especially cloud at present to finish some operations, but the cloud is not safe enough now, in which some important and private information may be leaked, then people introduce homomorphic encryption which can do calculation on encrypted data. To meet the modern needs for random calculations in which the operation can have random times’ addition and multiplication, researchers are trying to make fully homomorphic encryption practical. So in my thesis, I would choose one fully homomorphic encryption scheme to implement a detailed IoT scenario using some IoT devices such as laptop and raspberry pi. Then I would use performance measurements such as response time calculations to do the performance evaluation such as effectiveness and scalability for this technique. Finally, I find some relationship between different parameters and response time, and also effectiveness, scalability in results and conclusion part.

  • 2735.
    Wang, Kaidi
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    Theoretical and Quantitative Comparison of SensibleThings and GSN2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This project is aimed at making comparison between current existing Internet- of-Things (IoT) platforms, SensibleThings (ST) and Global Sensors Networks (GSN). Project can be served as a further work of platforms’ investigation. Comparing and learning from each other aim to contribute to the improvement of future platforms development. Detailed comparison is mainly with the respect of platform feature, communication and data present-frequency performance under stress, and platform node scalability performance on one limited device. Study is conducted through developing applications on each platform, and making measuring performance under the same condition in household network environment. So far, all these respects have had results and been concluded. Qualitatively comparing, GSN performs better in the facets of node’s swift development and deployment, data management, node subscription and connection retry mechanism. Whereas, ST is superior in respects of network package encryption, platform reliability, session initializing latency, and degree of developing freedom. In quantitative comparison, nodes on GSN has better data push pressure resistence while ST nodes works with lower session latency. In terms of data present-frequency, ST node can reach higher updating frequency than GSN node. In the aspect of node sclability on one limited device, ST nodes take the advantage in averagely lower latency than GSN node when nodes number is less than 15 on limited device. But due to sharing mechanism of GSN, on one limited device, it's nodes shows more scalable if platform nodes have similar job.

  • 2736.
    Wang, Qinjin
    KTH, School of Information and Communication Technology (ICT).
    Multi Data center Transaction Chain: Achieving ACID for cross data center multi-key transactions2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Transaction support for Geo-replicated storage system is one of the most popular challenges in the last few years. Some systems gave up for supporting transactions and let upper application layer to handle it. While some other systems tried with different solutions on guaranteeing the correctness of transactions and paid some efforts on performance improvements. However, there are very few systems that claim the supporting of ACID in the global scale.

    In this thesis, we have studied on various data consistency and transaction design theories such as Paxos, transaction chopping, transaction chain, etc. We have also analyzed several recent distributed transactional systems. As the result, a Geo-replicated transactional framework, namely Multi Data center Transaction Chain (MDTC), is designed and implemented. MDTC adopts transaction chopping approach, which brings more concurrency by chopping transactions into pieces. A two phase traversal mechanism is designed to validate and maintain dependencies. For cross data center consistency, a Paxos like majority vote protocol is designed and implemented as a state machine. Moreover, some tuning such as executing read-only transaction locally helps to improve performance of MDTC in different scenarios.

    MDTC only requires 1 cross data center message roundtrip for executing a distributed transaction globally. ACID properties are kept in MDTC. We have evaluated MDTC with an extended TPC-C benchmark on top of Cassandra. The results from various setups have been evaluated and the result shows that MDTC achieves a good performance on throughout and latency. Meanwhile it has very low abort rate and scales well for transactions executed in a global scale.

  • 2737.
    Wang, Yue
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Web services for a Software Development Platform2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Web service is a sophisticated SOA technology with a lot of infrastructure. In this thesis we will get to understand the core aspects and advance futures of Web services and get a solution based on Sauer-Danfoss’s requirements. The critical requirement include to find appropriate Web services application server, to realize an automatic update process and to get a general overview of Web services technology. The challenges in this thesis is obviously in getting understand Web services architecture and programming in unfamiliar language using chosen Web services framework.

  • 2738.
    Wanganga, George
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Effective Requirements Management2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In many smaller companies, requirements management is a daunting challenge. Smaller groups mean fewer resources, and many organizations focus their efforts on design, development and testing not on managing requirements. Some small organizations may perceive requirements management as an activity only for large organizations that have complex products and large staffs to support the effort. Poor and uncontrolled requirement engineering processes yield low quality, highly expensive software products. Obviously, customers are highly dissatisfied with such systems. One of the most critical requirement engineering processes that grossly contribute to this misnomer is lack of “effective requirements management” Information Technology Associates (ITA) has had many challenges resulting from some poor and uncontrolled requirements engineering processes. Lack of effective requirements traceability has also had its share in plaguing ITA in software development activities. ITA started small and so it handled its requirements documentation manually as it only dealt with few customer requirements. Time has seen the company expand, and manual handling of customer requirement became difficult. This master thesis therefore aims to investigate: ♦ The state-of-practice, regarding requirements engineering and requirements management within a medium-sized software development company. ♦ How to successfully implement effective requirement management process within the ITA Company. ♦ How to successfully migrate ITA Company into this RE process while ensuring minimum hassles.

  • 2739.
    Waqar, Hafiz Umer
    Mälardalen University, School of Innovation, Design and Engineering.
    Comparison between .NET and Java EEImplementation of Cash & Bank System2013Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The demands of software engineering increases with everyday passed and every organization

    shows interest to work on daily routine work in the computerized system to improve efficiency

    and accuracy of data. Most of organization demands different kinds of computerized software

    solutions that developed in modern technologies. There are different software development

    technologies that is getting popular with the passage of time and provide high quality product to

    their user. It is not an easy to decide which technology choose to develop computerized system

    where most software falls. The primary purpose of thesis is to compare two different modern

    software development technologies by develop an application with same functional

    requirements. This thesis report will help to user for selection of software development

    technology.

    Cash and bank financial application is choose to develop using .NET and Java Enterprise

    Edition. Microsoft Visual Studio development environment is used for .NET development and

    NetBeans IDE is used for Java Enterprise Edition application. .NET framework contains many

    language that are interrelated with each other like C#, VB, J#, C++ and F#. Cash and bank

    application is develop in C# and Java programming languages and persistence storage of data is

    design in Microsoft SQL Server. Cash and bank application is develop with three tier

    architecture and layer approach. The syntax of .NET and Java Enterprise Edition is quite similar

    but procedure to establish connection, data retrieval and handling the data in different way. NET

    platform provide built in libraries, components and efficient user controls that helps for fast

    development in short period of time.

  • 2740.
    Waqas, Ahmad
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Kamal, Fawad
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Modeling Patterns in Software Design2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Software patterns provide solutions to recurring design problems, provide a way to reason about the quality attributes, and support stakeholders in understanding the system. Naturally, the use of software patterns emerges from the requirements of the software. Use Cases have been a traditional and authentic approach to document these requirements. We propose a way to mine these patterns by sing use cases and advocate their significance in saving resources and time. For this purpose, an open-source system is discussed and four design patterns are mined with the help of use cases elicited from the documentation and literature available for the selected system. Patterns mined in this system are then document in GOF format.Furthermore, the consequences of few patterns on quality attributes are studied and an additional design pattern is proposed to improve the quality of the system.

  • 2741.
    Waqas, Ahmad
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Kamal, Fawad
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Modeling Patterns in Software Design2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Software patterns provide solutions to recurring design problems, provide a way to reason about the quality attributes, and support stakeholders in understanding the system. Naturally, the use of software patterns emerges from the requirements of the software. Use Cases have been a traditional and authentic approach to document these requirements. We propose a way to mine these patterns by sing use cases and advocate their significance in saving resources and time. For this purpose, an open-source system is discussed and four design patterns are mined with the help of use cases elicited from the documentation and literature available for the selected system. Patterns mined in this system are then document in GOF format.Furthermore, the consequences of few patterns on quality attributes are studied and an additional design pattern is proposed to improve the quality of the system.

  • 2742.
    Wasilewski, Dominik
    Blekinge Institute of Technology, School of Computing.
    Modeling of Enterprise Portals with Domain-Specific Language2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Enterprise portals are comprehensive solutions that enable centralized access to information and employees. They also support the business processes taking place in companies. The diversity of functionality offered by enterprise portals is the source of the complexity of the manufacturing process of such applications. Domain-Specific Languages (DSL) are a novel approach to solving problems associated with the software development. By limiting the possibilities of expression to the concepts related to a specific area Domain-Specific Languages are more focused on solving specific problems. The subject of this thesis is DSL SharePoint – Domain-Specific Language which supports the production of enterprise portals on Microsoft SharePoint platform. Language was developed with respect to the newest achievements in area of building DSLs. By applying the language in the industry, it was possible to verify the hypothesis that its usage positively affects the quality of software products. To this end, the quality model was built, and products made with the support of language have been compared to those developed in the traditional manner.

  • 2743.
    Wei, Li
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Kilander, Fredrik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Jansson, Carl-Gustaf
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Extending instant messaging to provide pervasive personal communication2006Conference paper (Refereed)
    Abstract [en]

    This paper proposes a personal software architecture to provide a user with a pervasive communication capability. The core of this architecture is a Personal Communication Server (PCS) which bridges between different Instant Messaging networks and extends them with a unified access to the user. A SIP-based implementation of such a communication server is presented, which solves various interoperability problems, and also provides many value-added features, e.g., extended user presence with location information, adaptive communication, better privacy protection, etc. This implementation enables various existing SIP-compatible resources to be re-used and thus simplifies the construction of the proposed software architecture.

  • 2744.
    Wei, Wenyang
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Private User’s Trust on Data sharing in e- health Applications2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. One of the challenges in requirement engineering is the ability using survey as a requirement-engineering tool towards the software to refine user’s requirements. For instance, with the development of the way of healthcare, many advances in technology transformed the way of healthcare. E-health application is one of the technologies. As more and more health information that is stored electronically, e- health applications have given rise to trust issue in the area of data sharing. Identified the relationship between trust and data sharing based on the survey method is a valid approach, but the current studies still do not give a definite guideline about how requirement engineering should use a survey method step-by-step to refine the needs of users’ trust into software attributes. Based on the mentioned situation in e-health, defining a method to design survey to elicit requirements is needed.

    Objective. In this paper, the aim of the study is to design a survey method for refining user’s requirements of trust in requirement engineering based on the current state-of-art. The paper present the research on data sharing in e-health application. Methods. This study presented an action research, which identified the way about how to refine user’s requirement of trust. Survey was the main approach to do investigation among the e-health applications. Three cycles of AR were conducted in this paper, and three versions of questionnaires were designed in the research process in order to identify the factors that affected user’s trust in data sharing in e-health applications.

    Results. Through the action research, I found out three factors that affected user’s trust in data sharing, then the factors were identified, analysis and summarized, and the relationship between trusts and the factors is describe based on analysis results of the collected data, which obtain from the improved questionnaires. To find out the relationship between trust and the factors help present the process that how to design an accurate survey to refine user’s requirements.

    Based on the process and results of the action research, the survey guideline to refine user’s requirements of trust is designed and described. Conclusions. Based on the results that obtained in this study, I designed a preliminary survey guideline for refining user’s requirements of trust. This study will help requirement engineering to elicit requirement of trust in e-health based on a new and specific survey method. 

  • 2745.
    Wennberg, Per
    et al.
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Danielson, Viktor
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Evaluation of a Testing Process to Plan and Implement an Improved Test System: A Case Study, Evaluation and Implementation in Lab-VIEW/TestStand2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In order to ensure the quality of a product, the provider of the product must performcomplete testing of the product. This fact increases the demands on the test systems usedto conduct the testing, the system needs to be reliable.When developing new software for a company, sometimes a requirements specificationcreated at the beginning of the project is not enough. Details of the desired implementationmay get lost when working with a general requirements specification.This thesis presents a case study of how a certain company work with their test systems.The aim of the case study was to find where the largest points of improvements could bemade in a new test system, which was to be implemented during this thesis work. Theimplementation of this new system was done in LabVIEW in conjunction with TestStandand this process is covered in this thesis.The performed case study revealed that the employees at the company found robustnessand usability to be the key factors in a new test system. During and after the implementationof the new system, it was evaluated regarding these two metrics, this process isalso covered in this thesis.

  • 2746.
    Westberg, Johannes
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Arts, Department of Game Design.
    UniRx and Unity 5: Working with C# and object-oriented reactive programming2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Gameplay programming is vital for video game development and benefits from good tools and techniques. However, techniques are still used in the industry that involves describing how the computer operates. Reactive programming is a way to describe eventful and stateful computer programs declaratively, focusing on what the program should accomplish. This thesis uses the reactive library UniRx with the game engine Unity 5 to create an FPS with reactive techniques, and discusses the advantages and disadvantages of these. Object-oriented reactive programming is used to combine reactive objects with Unity’s component-based framework without using wrappers for non-reactive objects. The results include static methods for observable user input, patterns when defining game components with reactive content, and communication between game objects through interface components. It can be concluded that reactive programming for game programming enables the programmer to describe and understand game logic in a declarative manner. However, combining UniRx and Unity 5 led to complex patterns. Suggestion for future work is using reactive programming with game engines that allows to design game objects that are fully reactive.

  • 2747.
    Wester, Alfred
    et al.
    Blekinge Institute of Technology, School of Computing.
    Fredriksson, Olof
    Blekinge Institute of Technology, School of Computing.
    Jämförelse av Mysql och MongoDb2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Speed is a very important factor in websites and other types of applications and almost all applications stores some type of data, normally in a database. For an example a blog typically saves users, posts and comments. There’s a high risk that as the amount of data in the database grows, the time for inserting and requesting specific data increases. If it takes more than some seconds to view a specific page, a user will normally leave the site. However, it’s a fact that the database will grow while the application will become more popular but it’s possible to save a lot of time if using right database, and structure. In this thesis MongoDB and MySQL will be compared with focus on time consumption. SQL (Structured Query Language) is the language which most databases use. This kind of database stores data in structured tables and noting can be added to them if the type of data is incorrect. SQL also support relations between tables. MySQL is a very popular relational database management system (RDBMS) which for example websites frequently makes use of. NoSQL is a new type of databases where the data is stored in collections without any kind of structure, unlike the well known SQL databases where the data is stored in structured tables. Because of the non-structure, these types of databases are designed to be fast and scalable over multiple machines. Mongodb is a such kind of NoSql-database. Tests has been done both on inserting and processing when handling up to 4 millions entities, MongoDB performs better in almost every test. Results shows that the processing time is shorter using MongoDb in the cases that this thesis is covering, and that it’s possible to implement a much fast application when using MongoDb instead of Mysql as database.

  • 2748.
    Westholm, Erik
    Örebro University, School of Science and Technology.
    A Simulator Tool for Human Activity Recognition2010Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The goal of this project was to create a simulator that was to produce data for research in the field of activity recognition. The simulator was to simulate a human entity moving around in, and interacting with, a PEIS environment. This simulator ended up being based on The Sims 3, and how this was done is described. The reader is expected to have some experience with programming.

  • 2749.
    Westlund, Arvid
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Visual Information and Interaction.
    Image analysis tool for geometric variations of the jugular veins in ultrasonic sequences: Development and evaluation2018Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The aim of this project is to develop and perform a first evaluation of a software, based on the active contour, which automatically computes the cross-section area of the internal jugular veins through a sequence of 90 ultrasound images. The software is intended to be useful in future research in the field of intra cranial pressure and its associated diseases.

    The biomechanics of the internal jugular veins and its relationship to the intra cranial pressure is studied with ultrasound. It generates data in the form of ultrasound sequences shot in seven different body positions, supine to upright. Vein movements in cross section over the cardiac cycle are recorded for all body positions. From these films, it is interesting to know how the cross-section area varies over the cardiac cycle and between body positions, in order to estimate the pressure.

    The software created was semi-automatic, where the operator loads each individual sequence and sets the initial contour on the first frame. It was evaluated in a test by comparing its computed areas with manually estimated areas.  The test showed that the software was able to track and compute the area with a satisfactory accuracy for a variety of sequences. It is also faster and more consistent than manual measurements. The most difficult sequences to track were small vessels with narrow geometries, fast moving walls, and blurry edges.

    Further development is required to correct a few bugs in the algorithm. Also, the improved algorithm should be evaluated on a larger sample of sequences before using it in research. 

  • 2750.
    Westman, Adam
    et al.
    Blekinge Institute of Technology, School of Planning and Media Design.
    Gransing, Jonas Chanasima
    Blekinge Institute of Technology, School of Planning and Media Design.
    Palm, Mikael
    Blekinge Institute of Technology, School of Planning and Media Design.
    Malmgren, Tommie
    Blekinge Institute of Technology, School of Planning and Media Design.
    Spelskapande men en komponentbaserad arbetsprocess2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The purpose is to test a work-flow that is a bit different from what small groups usually use: a component-based work-flow. To execute and process this work-flow, we have decided to develop a digital game.

52535455565758 2701 - 2750 of 3008
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf