Endre søk
Begrens søket
3456789 251 - 300 of 1810
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 251.
    Carlsson, Arthur
    Linköpings universitet, Institutionen för datavetenskap.
    Integration av AJAX i JDP: En studie i hur WM-data kan utveckla modelleringsstödet i ett webbramverk2008Independent thesis Advanced level (degree of Magister), 20 poäng / 30 hpOppgave
    Abstract [sv]

    På WM-data har man utvecklat ett ramverk som heter Java Development Platform med avsikt att modellera större delar av ett system och därmed minska mängden kod som måste skrivas för hand. Ramverket baseras helt på existerande öppna lösningar och används vid utveckling av webbaserade system och skapar en skiktat lösning med en webbapplikation som presentationslager. Problemet är att webbapplikationen har kommit att bli väldigt svår att modellera i enhet med resten av systemet framför allt på grund av den hårda kopplingen till Struts-ramverket. Samtidigt har man börjat få upp ögonen för AJAX och vad det skulle kunna tillföra ramverket.

    Examensarbetet fokuserar på att utreda de problem som existerar i ramverket samt undersöka integrationen av AJAX ur en synvinkel som gynnar dagens lösning. Detta görs genom litteraturstudier, laborationer och genom att undersöka existerande ramverk och plattformar som löser liknande problem. Fokus ligger även på hur AJAX kan användas för att lösa problemen i modelleringen.

    Resultatet av arbetet mynnar ut i en analys som behandlar de aspekter som krävs för att AJAX ska kunna bli en del av JDP-ramverket. Analysen innefattar också synen på hur AJAX skulle kunna användas för att underlätta modelleringen av webbapplikationen utan att införa något nytt modelleringsverktyg, det vill säga att UML fortfarande kan användas.

  • 252.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    BGP oscillations when peering with loopback addresses2006Inngår i: 20th International Conference on Advanced Information Networking and Applications, Vol 2, Proceedings / [ed] Martin DC, LOS ALAMITOS, USA: IEEE COMPUTER SOC , 2006, s. 712-716Konferansepaper (Fagfellevurdert)
    Abstract [en]

    An oscillating routing protocol will result in increased protocol activity and may lead to increased router CPU activity and memory consumption.  This case study shows that BGP peering using loopback addresses when peering EBGP between two dualhomed ASes will cause BGP to oscillate. It includes a detailed lab report in which several possible setups that will cause BGP to oscillate are presented. It also includes an oscillation event from one of the world's largest production networks that was caused by such a setup.

  • 253.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Improving BGP convergence properties and web content blocking using BGP2006Licentiatavhandling, med artikler (Annet vitenskapelig)
  • 254.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Perceived problems with BGP: a survey2006Rapport (Annet vitenskapelig)
  • 255.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Resetting a damped out route in BGP2006Rapport (Annet vitenskapelig)
  • 256.
    Carlzon, Malin
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Hagsand, Olof
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Widell, Fredrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Danielsson, Björn
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Blocking web contents using BGP: measurements and observations2006Rapport (Annet vitenskapelig)
  • 257. Casoni, E.
    et al.
    Jerusalem, A.
    Samaniego, C.
    Eguzkitza, B.
    Lafortune, P.
    Tjahjanto, Denny
    KTH, Skolan för teknikvetenskap (SCI), Hållfasthetslära (Inst.). IMDEA Materials Institute, Spain .
    Saez, X.
    Houzeaux, G.
    Vazquez, M.
    Alya: Computational Solid Mechanics for Supercomputers2015Inngår i: Archives of Computational Methods in Engineering, ISSN 1134-3060, E-ISSN 1886-1784, Vol. 22, nr 4, s. 557-576Artikkel, forskningsoversikt (Fagfellevurdert)
    Abstract [en]

    While solid mechanics codes are now conventional tools both in industry and research, the increasingly more exigent requirements of both sectors are fuelling the need for more computational power and more advanced algorithms. For obvious reasons, commercial codes are lagging behind academic codes often dedicated either to the implementation of one new technique, or the upscaling of current conventional codes to tackle massively large scale computational problems. Only in a few cases, both approaches have been followed simultaneously. In this article, a solid mechanics simulation strategy for parallel supercomputers based on a hybrid approach is presented. Hybrid parallelization exploits the thread-level parallelism of multicore architectures, combining MPI tasks with OpenMP threads. This paper describes the proposed strategy, programmed in Alya, a parallel multi-physics code. Hybrid parallelization is specially well suited for the current trend of supercomputers, namely large clusters of multicores. The strategy is assessed through transient non-linear solid mechanics problems, both for explicit and implicit schemes, running on thousands of cores. In order to demonstrate the flexibility of the proposed strategy under advance algorithmic evolution of computational mechanics, a non-local parallel overset meshes method (Chimera-like) is implemented and the conservation of the scalability is demonstrated.

  • 258.
    Castberg, Miro
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Adaptor Development: An insight to interfacing with electrical energy meters2011Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    Since energy meters became more advanced and able to send data remotely, energy suppliers have had a need to keep their data managed. This gave birth to energy management systems which gather data from energy meters. However, for every type of meter there needs to be a specialization in the management system.

    Smart Metering Language (SML) is a protocol which was created to transfer meter data in as simple way as possible. Implementing the protocol would result in simpler and less vendor-specific solutions for energy management systems.

    This report follows the process of developing an adaptor between a device using the SML protocol and a system that manages energy meters. The thesis uses different parts of the development process in able to show specializations which were needed by the test device and its vendor. 

    The result sums up the experience of developing an adaptor and the specializations which are needed in the SML protocol.

  • 259.
    Ceballos, Germán
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Grass, Thomas
    Hugo, Andra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Analyzing performance variation of task schedulers with TaskInsight2018Inngår i: Parallel Computing, ISSN 0167-8191, E-ISSN 1872-7336, Vol. 75, s. 11-27Artikkel i tidsskrift (Fagfellevurdert)
  • 260.
    Ceballos, Germán
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Grass, Thomas
    Hugo, Andra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    TaskInsight: Understanding task schedules effects on memory and performance2017Inngår i: Proc. 8th International Workshop on Programming Models and Applications for Multicores and Manycores, New York: ACM Press, 2017, s. 11-20Konferansepaper (Fagfellevurdert)
  • 261. Cebrian, Juan M.
    et al.
    Sanchez, Daniel
    Aragon, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Efficient inter-core power and thermal balancing for multicore processors2013Inngår i: Computing, ISSN 0010-485X, E-ISSN 1436-5057, Vol. 95, nr 7, s. 537-566Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Nowadays the market is dominated by processor architectures that employ multiple cores per chip. These architectures have different behavior depending on the applications running on the processor (parallel, multiprogrammed, sequential), but all happen to meet what is called the power and temperature wall. For future technologies (less than 22 nm) and a fixed die size, it is still uncertain the percentage of processor that can be simultaneously powered on. Power saving and power budget mechanisms can be useful to precisely control the amount of power been dissipated by the processor. After an initial analysis we discover that legacy power saving techniques work properly for matching a power budget in thread-independent and multi-programmed workloads, but not in parallel workloads. When running parallel shared-memory applications sacrificing some performance in a single core (thread) in order to be more energy-efficient can unintentionally delay the rest of cores (threads) due to synchronization points (locks/barriers), having a negative impact on global performance. In order to solve this problem we propose power token balancing (PTB) aimed at accurately matching an external power constraint by balancing the power consumed among the different cores. Experimental results show that PTB matches more accurately a predefined power budget (50 % of the original peak power) than other mechanisms like DVFS. The total energy consumed over the budget is reduced to only 8 % for a 16-core CMP with only a 3 % energy increase (overhead). We also introduce a novel mechanism named "Nitro". Nitro will overclock the core that enters a critical section (delimited by locks) in order to free the lock as soon as possible. Experimental results have shown that Nitro is able to reduce the execution time of lock-intensive applications in more than 4 % by overclocking the frequency by 15 % in selected program phases over a period of time that represents a 22 % of the total execution time. We conclude the work with an analysis of the thermal effects of PTB in different CMP configurations using realistic power numbers and heatsink/fan configurations. Results show how PTB not only balances temperature between the different cores, reducing temperature gradient and increasing signal reliability, but also allows a reduction of 28-30 % of both average and peak temperatures for the studied benchmarks when a peak power budget of 50 % is exceeded.

  • 262. Cebrian, Juan M.
    et al.
    Sanchez, Daniel
    Aragon, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Managing power constraints in a single-core scenario through power tokens2014Inngår i: Journal of Supercomputing, ISSN 0920-8542, E-ISSN 1573-0484, Vol. 68, nr 1, s. 414-442Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Current microprocessors face constant thermal and power-related problems during their everyday use, usually solved by applying a power budget to the processor/core. Dynamic voltage and frequency scaling (DVFS) has been an effective technique that allowed microprocessors to match a predefined power budget. However, the continuous increase of leakage power due to technology scaling along with low resolution of DVFS makes it less attractive as a technique to match a predefined power budget as technology goes to deep-submicron. In this paper, we propose the use of microarchitectural techniques to accurately match a power constraint while maximizing the energy-efficiency of the processor. We will predict the processor power dissipation at cycle level (power token throttling) or at a basic block level (basic block level mechanism), using the dissipated power translated into tokens to select between different power-saving microarchitectural techniques. We also introduce a two-level approach in which DVFS acts as a coarse-grain technique to lower the average power dissipation towards the power budget, while microarchitectural techniques focus on removing the numerous power spikes. Experimental results show that the use of power-saving microarchitectural techniques in conjunction with DVFS is up to six times more precise, in terms of total energy consumed over the power budget, than only using DVFS to match a predefined power budget.

  • 263. Cebrián, Juan M.
    et al.
    Aragón, Juan L.
    García, José M.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Leakage-efficient design of value predictors through state and non-state preserving techniques2011Inngår i: Journal of Supercomputing, ISSN 0920-8542, E-ISSN 1573-0484, Vol. 55, nr 1, s. 28-50Artikkel i tidsskrift (Fagfellevurdert)
  • 264. Cebrián, Juan M.
    et al.
    Aragón, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Power Token Balancing: Adapting CMPs to power constraints for parallel multithreaded workloads2011Inngår i: Proc. 25th International Parallel and Distributed Processing Symposium, Piscataway, NJ: IEEE , 2011, s. 431-442Konferansepaper (Fagfellevurdert)
  • 265. Cebrián, Juan M.
    et al.
    Fernández-Pascual, Ricardo
    Jimborean, Alexandra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Acacio, Manuel E.
    Ros, Alberto
    A dedicated private-shared cache design for scalable multiprocessors2017Inngår i: Concurrency and Computation, ISSN 1532-0626, E-ISSN 1532-0634, Vol. 29, nr 2, artikkel-id e3871Artikkel i tidsskrift (Fagfellevurdert)
  • 266.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Finite element methods for surface problems2017Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The purpose of this thesis is to further develop numerical methods for solving surface problems by utilizing tangential calculus and the trace finite element method. Direct computation on the surface is possible by the use of tangential calculus, in contrast to the classical approach of mapping 2D parametric surfaces to 3D surfaces by means of differential geometry operators. Using tangential calculus, the problem formulation is only dependent on the position and normal vectors of the 3D surface. Tangential calculus thus enables a clean, simple and inexpensive formulation and implementation of finite element methods for surface problems. Meshing techniques are greatly simplified from the end-user perspective by utilizing an unfitted finite element method called the Trace Finite Element Method, in which the basic idea is to embed the surface in a higher dimensional mesh and use the shape functions of this background mesh for the discretization of the partial differential equation. This method makes it possible to model surfaces implicitly and solve surface problems without the need for expensive meshing/re-meshing techniques especially for moving surfaces or surfaces embedded in 3D solids, so called embedded interface problems. Using these two approaches, numerical methods for solving three surface problems are proposed: 1) minimal surface problems, in which the form that minimizes the mean curvature was computed by iterative update of a level-set function discretized using TraceFEM and driven by advection, for which the velocity field was given by the mean curvature flow, 2) elastic membrane problems discretized using linear and higher order TraceFEM, which makes it straightforward to embed complex geometries of membrane models into an elastic bulk for reinforcement and 3) stabilized, accurate vertex normal and mean curvature estimation with local refinement on triangulated surfaces. In this thesis the basics of the two main approaches are presented, some aspects such as stabilization and surface reconstruction are further developed, evaluated and numerically analyzed, details on implementations are provided and the current state of work is presented.

  • 267.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Finite element methods on surfaces2015Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The purpose of this thesis is to improve numerical simulations of surface problems. Two novel computational concepts are analyzed and applied on two surface problems; minimal surface problems and elastic membrane problems. The concept of tangential projection implies that direct computation on the surface is made possible compared to the classical approach of mapping 2D parametric surfaces to 3D surfaces by means of differential geometry operators. The second concept presented is the cut finite element method, in which the basic idea of discretization is to embed the d- 1-dimensional surface in a d-dimensional mesh and use the basis functions of a higher dimensional mesh but integrate over the surface. The aim of this thesis is to present the basics of the two main approaches and to provide details on the implementation.

  • 268.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Numerical error estimation for a TraceFEM membrane and distance function on P1 and P2 tetrahedraManuskript (preprint) (Annet vitenskapelig)
  • 269.
    Cenanovic, Mirza
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Hansbo, Peter
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Larsson, Mats G.
    Umeå University.
    Cut finite element modeling of linear membranes2016Inngår i: Computer Methods in Applied Mechanics and Engineering, ISSN 0045-7825, E-ISSN 1879-2138, Vol. 310, s. 98-111Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We construct a cut finite element method for the membrane elasticity problem on an embedded mesh using tangential differential calculus, i.e., with the equilibrium equations pointwise projected onto the tangent plane of the surface to create a pointwise planar problem in the tangential direction. Both free membranes and membranes coupled to 3D elasticity are considered. The discretization of the membrane comes from a Galerkin method using the restriction of 3D basis functions (linear or trilinear) to the surface representing the membrane. In the case of coupling to 3D elasticity, we view the membrane as giving additional stiffness contributions to the standard stiffness matrix resulting from the discretization of the three-dimensional continuum.

  • 270.
    Cenanovic, Mirza
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Hansbo, Peter
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Larsson, Mats G.
    Finite element procedures for computing normals and mean curvature on triangulated surfaces and their use for mesh refinementManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    In this paper we consider finite element approaches to computing the mean curvature vector and normal at the vertices of piecewise linear triangulated surfaces. In particular, we adopt a stabilization technique which allows for first order L2-convergence of the mean curvature vector and apply this stabilization technique also to the computation of continuous, recovered, normals using L2-projections of the piecewise constant face normals. Finally, we use our projected normals to define an adaptive mesh refinement approach to geometry resolution where we also employ spline techniques to reconstruct the surface before refinement. We compare or results to previously proposed approaches.

  • 271.
    Chabloz, Jean-Michel
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Hemani, Ahmed
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Lowering the Latency of Interfaces for Rationally-Related Frequencies2010Inngår i: 2010 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2010, s. 23-30Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We have introduced the Globally-Ratiochronous, Locally-Synchronous (GRLS) design paradigm, a design style based on rationally-related frequencies, with the objective to overcome the limitations of traditional multi-frequency systems by providing a flexibility close that of Globally-Asynchronous, Locally-Synchronous (GALS) systems but introducing performance penalties and overheads close to those of mesochronous systems. In this paper we focus on performances and improve the latency figures of our original GRLS interfaces by introducing two new interfaces, called GRLS-F and GRLS-noF, the first suitable for blocks with long computation time and the second for blocks with short computation time. The latency figures of the original GRLS interfaces are improved up to 50% without increasing complexity. The average latency figures of the resulting interfaces are lower than 1 Receiver clock cycle, the latency of a synchronous interface.

  • 272.
    Chavez Alcarraz, Erick
    et al.
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Moraga, Manuel
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Linked data performance in different databases: Comparison between SQL and NoSQL databases2014Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    Meepo AB was investigating the possibility of developing a social rating and recommendation service. In a recommendation service, the user ratings are collected in a database, this data is then used in recommendation algorithms to create individual user recommendations.

    The purpose of this study was to find out which  demands are put on a DBMS, database management system, powering a recommendation service, what impact the NoSQL databases have on the performance of recommendation services compared to traditional relational databases, and which DBMS is most suited for storing the data needed to host a recommendation service.

    Five distinct NoSQL and Relational DBMS were examined, from these three candidates were chosen for a closer comparison.

    Following a study of recommendation algorithms and services, a test suite was created to compare DBMS performance in different areas using a data set of 100 million ratings.

    The results show that MongoDB had the best performance in most use cases, while Neo4j and MySQL struggled with queries spanning the whole data set.

    This paper however never compared performance for real production code. To get a better comparison, more research is needed. We recommend new performance tests for MongoDB and Neo4j using implementations of recommendation algorithms, a larger data set, and more powerful hardware.

  • 273.
    Cheema, Ansar Zaman
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Saqib, Imran Ullah
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Collaborating ISPs Supporting Various Real-Time Services2010Independent thesis Advanced level (degree of Master (One Year)), 15 poäng / 22,5 hpOppgave
    Abstract [en]

    These days, internet service providers (ISPs) face the challenge about how to increase profitability while hey must ensure a good quality service at the same time and scale up their network. The study involves previous research papers. On the bases of those papers,the comparison is made between different alternatives. The purpose on this study is to find a solution that combines different methods and configurations about how several ISPs could cooperate. Its implementation includes how different ISPs can configure their networks to cooperate on service provision supporting various real-time services.

  • 274.
    Chehrazi, Golriz
    Linköpings universitet, Institutionen för systemteknik.
    Workflow management systems, their security and access control mechanisms2007Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished.

    WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. The security of process flows is important, since the sensitive business data need to be protected to inhibit illegal activities, such as blackmailing, imitation and fraud and to provide for good customer service.

    This paper focuses on access mechanisms, because they are basic security mechanisms used by WfMSs assuring that only authorized users are provided access to data and resources. Also because of the unsecurity of the Internet, which is commonly used as infrastructure of Workflow systems, additional security mechanisms, such as PKIs, digital signatures and SSL have to be used to provide secure workflows.

    Depending on the particular requirements in workflow systems, different extensional access control (AC) mechanisms have been developed to maintain security. But when it comes to commercially used WfMSs, the availability of the system is of utmost importance. It is the prerequisite for the system to be employed by companies. The problem is that there is always a trade-off between availability of the system and security. Because this trade off is generally solved in favor of availability, a major part of the developed AC mechanisms are not used in commercially used WfMS.

    After the first part of this paper which is rather theoretical, we examine a commercial WfMS, namely IBM's MQ Workflow , and its security mechanisms. We show vulnerabilities of the system that could be abused by attackers. Afterwards, we show which security mechanisms, in particular, AC mechanisms are provided to secure against threats. We conclude with a summary, which highlights the difference between security concepts developed in the research area and those really implemented by the commercially used WfMS.

  • 275.
    Chen, Kairang
    Linköpings universitet, Institutionen för systemteknik, Elektroniska Kretsar och System. Linköpings universitet, Tekniska fakulteten.
    Energy-Efficient Data Converters for Low-Power Sensors2016Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Wireless sensor networks (WSNs) are employed in many applications, such as for monitoring bio-potential signals and environmental information. These applications require high-resolution (> 12-bit) analog-to-digital converters (ADCs) at low-sampling rates (several kS/s). Such sensor nodes are usually powered by batteries or energy-harvesting sources hence low power consumption is primary for such ADCs. Normally, tens or hundreds of autonomously powered sensor nodes are utilized to capture and transmit data to the central processor. Hence it is profitable to fabricate the relevant electronics, such as the ADCs, in a low-cost standard complementary metal-oxide-semiconductor (CMOS) process. The two-stage pipelined successive approximation register (SAR) ADC has shown to be an energy-efficient architecture for high resolution. This thesis further studies and explores the design limitations of the pipelined SAR ADC for high-resolution and low-speed applications.

    The first work is a 15-bit, 1 kS/s two-stage pipelined SAR ADC that has been implemented in 0.35-μm CMOS process. The use of aggressive gain reduction in the residue amplifier combined with a suitable capacitive array digital-to-analog converter (DAC) topology in the second-stage simplifies the design of the operational transconductance amplifier (OTA) while eliminating excessive capacitive load and consequent power consumption. A comprehensive power consumption analysis of the entire ADC is performed to determine the number of bits in each stage of the pipeline. Choice of a segmented capacitive array DAC and attenuation capacitorbased DAC for the first and second stages respectively enable significant reduction in power consumption and area. Fabricated in a low-cost 0.35-μm CMOS process, the prototype ADC achieves a peak signal-to-noise-and-distortion ratio (SNDR) of 78.9 dB corresponding to an effective number of bits (ENOB) of 12.8-bit at a sampling frequency of 1 kS/s and provides a Schreier figure-of-merit (FoM) of 157.6 dB. Without any form of calibration, the ADC maintains an ENOB > 12.1-bit up to the Nyquist bandwidth of 500 Hz while consuming 6.7 μW. Core area of the ADC is 0.679 mm2.

    The second work is a 14-bit, tunable bandwidth two-stage pipelined SAR ADC which is suitable for low-power, cost-effective sensor readout circuits. To overcome the high open-loop DC gain requirement of the OTA in the gain-stage, a 3-stage capacitive charge pump (CCP) is utilized to achieve the gain-stage instead of using the switch capacitor (SC) amplifier. Unity-gain OTAs have been used as the analog buffers to prevent the charge sharing between the CCP stages. The detailed design considerations are given in this work. The prototype ADC, designed and fabricated in a low-cost 0.35-μm CMOS process, achieves a peak SNDR of 75.6 dB at a sampling rate of 20 kS/s and 76.1 dB at 200 kS/s while consuming 7.68 μW and 96 μW, respectively. The corresponding Schreier FoM are 166.7 dB and 166.3 dB. Since the bandwidth of CCP is tunable, the ADC maintains a SNDR > 75 dB up

    to 260 kHz. The core area occupied by the ADC is 0.589 mm2.

    As the low-power sensors might be active only for very short time triggered by an external pulse to acquire the data, the third work is a 14-bit asynchronous two-stage pipelined SAR ADC which has been designed and simulated in 0.18-μm CMOS process. A self-synchronous loop based on an edge detector is utilized to generate an internal clock with variable phase. A tunable delay element enables to allocate the available time for the switch capacitor DACs and the gain-stage. Three separate asynchronous clock generators are implemented to create the control signals for two sub-ADCs and the gain-stage between. Aiming to reduce the power consumption of the gain-stage, simple source followers as the analog buffers are implemented in the 3-stage CCP gain-stage. Post-layout simulation results show that the ADC achieves a SNDR of 83.5 dB while consuming 2.39 μW with a sampling rate of 10 kS/s. The corresponding Schreier FoM is 176.7 dB.

  • 276.
    Chen, Kairang
    et al.
    Linköpings universitet, Institutionen för systemteknik, Elektroniska Kretsar och System. Linköpings universitet, Tekniska fakulteten.
    Alvandpour, Atila
    Linköpings universitet, Institutionen för systemteknik, Elektroniska Kretsar och System. Linköpings universitet, Tekniska fakulteten.
    A pipelined SAR ADC with gain-stage based on capacitive charge pump2017Inngår i: Analog Integrated Circuits and Signal Processing, ISSN 0925-1030, E-ISSN 1573-1979, Vol. 90, nr 1, s. 43-53Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper presents a 14-bit, tunable bandwidth two-stage pipelined successive approximation analog to digital converter which is suitable for low-power, cost-effective sensor readout circuits. To overcome the high DC gain requirement of operational transconductance amplifier in the gain-stage, the multi-stage capacitive charge pump (CCP) was utilized to achieve the gain-stage instead of using the switch capacitor integrator. The detailed design considerations are given in this work. Thereafter, the 14-bit ADC was designed and fabricated in a low-cost 0.35-µm CMOS process. The prototype ADC achieves a peak SNDR of 75.6 dB at a sampling rate of 20 kS/s and 76.1 dB at 200 kS/s while consuming 7.68 and 96 µW, respectively. The corresponding FoM are 166.7 and 166.3 dB. Since the bandwidth of CCP is tunable, the ADC maintains a SNDR >75 dB upto 260 kHz. The core area occupied by the ADC is 0.589 mm2.

  • 277.
    Chen, Nan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    An IEEE 802.15.4 Packet Error Classification Algorithm: Discriminating Between Multipath Fading and Attenuation and WLAN2014Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In wireless sensor networks, communications are usually destroyed by signal attenuation, multipath fading and different kinds of interferences like WLAN and microwave oven interference. In order to build a stable wireless communication system, reactions like retransmission mechanisms are necessary. Since the way we must react to interference is different from the way we react to multipathfading and attenuation, the retransmission mechanism should be adjusted in different ways under those different cicumstances. Under this condition, channel diagnostics for discriminating the causes that corrupt the packets between multipath fading and attenuation (MFA) and WLAN interference are imperative. This paper presents a frame bit error rate (F-BER) regulated algorithm based on a joint RSSI-LQI classifier that may correctly diagnose the channel status. This discriminator is implemented on MicaZ sensor devices equipped with CC2420 transceivers. This discriminator is able to improve the accuracy to 91%. Although we need to wait for 2 or 3 necessary packets to make a decision, higher stability and reliability are presented when operating this discriminator.

  • 278.
    Chen, Wei
    Linköpings universitet, Institutionen för systemteknik.
    RTL implementation of Viterbi Decoder2006Student paper first term, 20 poäng / 30 hpOppgave
    Abstract [en]

    A forward error correction technique known as convolutional coding with Viterbi decoding was explored in this final thesis. This Viterbi project is part of the baseband Error control project at electrical engineering department, Linköping University.

    In this project, the basic Viterbi decoder behavior model was built and simulated. The convolutional encoder, puncturing, 3 bit soft decision, BPSK and AWGN channel were implemented in MATLAB code. The BER was tested to evaluate the decoding performance.

    The main issue of this thesis is to implement the RTL level model of Viterbi decoder. With the testing results of behavior model, with minimizing the data path, register size and butterflies in the design, we try to achieve a low silicon cost design. The RTL Viterbi decoder model includes the Branch Metric block, the Add-Compare-Select block, the trace-back block, the decoding block and next state block. With all done, we further understand about the Viterbi decoding algorithm and the DSP implementation methods.

  • 279.
    Chen, Xiaowen
    et al.
    KTH, Skolan för elektro- och systemteknik (EES).
    Lu, Zhonghai
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik.
    Liu, S.
    Chen, S.
    Round-trip DRAM access fairness in 3D NoC-based many-core systems2017Inngår i: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 16, nr 5s, artikkel-id 162Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In 3D NoC-based many-core systems, DRAM accesses behave differently due to their different communication distances and the latency gap of different DRAM accesses becomes bigger as the network size increases, which leads to unfair DRAM access performance among different nodes. This phenomenon may lead to high latencies for some DRAM accesses that become the performance bottleneck of the system. The paper addresses the DRAM access fairness problem in 3D NoC-based many-core systems by narrowing the latency difference of DRAM accesses as well as reducing the maximum latency. Firstly, the latency of a round-trip DRAM access is modeled and the factors causing DRAM access latency difference are discussed in detail. Secondly, the DRAM access fairness is further quantitatively analyzed through experiments. Thirdly, we propose to predict the network latency of round-trip DRAM accesses and use the predicted round-trip DRAM access time as the basis to prioritize the DRAM accesses in DRAM interfaces so that the DRAM accesses with potential high latencies can be transferred as early and fast as possible, thus achieving fair DRAM access. Experiments with synthetic and application workloads validate that our approach can achieve fair DRAM access and outperform the traditional First-Come-First-Serve (FCFS) scheduling policy and the scheduling policies proposed by reference [7] and [24] in terms of maximum latency, Latency Standard Deviation (LSD)1 and speedup. In the experiments, the maximum improvement of the maximum latency, LSD, and speedup are 12.8%, 6.57%, and 8.3% respectively. Besides, our proposal brings very small extra hardware overhead (<0.6%) in comparison to the three counterparts.

  • 280.
    Chen, Zongzhe
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Privacy Preserving Implementation in the E-health System2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    E-health systems are widely used in today’s world, and have a stillbrighter future with the rapid development of smart phones. A fewyears ago, e-health system could only be carried out on computers.But recently, people are using this as a phone application, so thatthey can get information at any time and anywhere. In addition,some smart phones can already measure heart rate and bloodpressure, for example, ‚Instant Heart Rate‛ and ‚Blood PressureMonitor‛. By using these kinds of applications, users can easilymeasure their health data and store them in their mobile phones.However, the problem of privacy has been attracting people’sattention. After uploading their data to the database, users do havethe right to protect their privacy. For instance, even the doctor hasthe authority to obtain the health record; the user's name can behidden, so that the doctor does not know who the owner of this datais. This problem also includes anonymization, pseudonymity,unlinkability, unobservability and many other aspects.In this thesis work, an android application is proposed to solve thisproblem. Users can set their own rules, and all data requests shouldbe dealt with by calling the rules. In addition, a module in the serveris to be developed to carry out the whole process of privacypreserving and the users’ data should be stored in the database.A standard for users to set rules is determined, which is bothdynamical and flexible. The application realizes some additional rulechecking functions to determine whether users have set a valid rule.Privacy rules can be created, deleted, or uploaded. In addition, userscan update their health record and upload it to the database. Theserver will call different protocols to deal with different requests, andthe data which obtains the requests is responded to by calling theusers’ own privacy rules.

  • 281.
    Cheng, Hei Victor
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem. Linköpings universitet, Tekniska fakulteten.
    Aspects of Power Allocation in Massive MIMO2016Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The past decades have seen a rapid growth of mobile data trac, both in terms of connected devices and data rate. To satisfy the ever growing data trac demand in wireless communication systems, the current cellular systems have to be redesigned to increase both spectral eciency and energy eciency. Massive MIMO (Multiple-Input-Multiple-Output) is one solution that satisfy both requirements. In massive MIMO systems, hundreds of antennas are employed at the base station to provide service to many users at the same time and frequency. This enables the system to serve the users with uniformly good quality of service simultaneously, with low-cost hardware and without using extra bandwidth and energy. To achieve this, proper resource allocation is needed. Among the available resources, transmit power is one of the most important degree of freedom to control the spectral eciency and energy eciency. Due to the use of excessive number of antennas and low-end hardware at the base station, new aspects of power allocation compared to current systems arises. In the rst part of the thesis, a new uplink power allocation schemes that based on long term channel statistics is proposed. Since quality of the channel estimates is crucial in massive MIMO, in addition to data power allocation, joint power allocation that includes the pilot power as additional variable should be considered. Therefore a new framework for power allocation that matches practical systems is developed, as the methods developed in the literature cannot be applied directly to massive MIMO systems. Simulation results conrm the advantages brought by the the proposed new framework. In the second part of the thesis, we investigate the eects of using low-end ampliers at the base stations. The non-linear behavior of power consumption in these ampliers changes the power consumption model at the base station, thereby changes the power allocation. Two dierent scenarios are investigated and both results show that a certain number of antennas can be turned o in low load scenarios.

  • 282.
    Chivi, Daniel
    et al.
    KTH, Skolan för kemi, bioteknologi och hälsa (CBH).
    Östling Gran, Joakim
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Administration av API-drivna enheter och tjänster för slutanvändare: En fallstudie av API-tjänster2018Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    I dagsläget tenderar många att använda tjänster som hanteras separat. Arbetet undersöker om det är möjligt att sammankoppla ett fåtal tjänster i en gemensam webbapplikation för att underlätta kommunicering mellan tjänsterna samt att förbättra användarvänligheten.

    Företaget A Great Thing har i åtanke att skapa en webbapplikation som tillåter användare att med hjälp av deras applikation skapa agenter som sköter händelser från användarens begäran, exempelvis “spela upp en låt vid en viss tid”.

    Metodiken som tillämpats har dels varit en fallstudie och dels användarbaserade metoder i form av enkätundersökning samt ett användartest. Ytterligare undersöktes hur kommunikationen går mellan tjänsters API, och de nödvändiga parametrar som utbyter data. Slutligen evalueras den framtagna prototypen enligt vissa riktlinjer inom användarvänlighet.

    Examensarbetets resultat är i form av en webbprototyp med fokus på användarvänlighet, implementering av API:er, användartest på faktiska användare samt statistik på efterfrågan av tjänster. Vidare har även en marknadsundersökning utförts för att belysa ekonomiska vinstmöjligheter genom API-distribution.

    Slutsatsen dras att det är möjligt att sammankoppla API:er och dess tjänster för att uppnå ett användarvänligt gränssnitt samt hur nödvändiga parametrar disponeras på ett effektivt vis. Vidare är förhoppningen att utomstående läsare skapar en förståelse om hur sammankopplingen går till på ett strukturerat och informativt tillvägagångssätt. Även hur olika tekniska metoder inom användarvänlighet kan tillämpas vid konstruktion av prototyper. 

  • 283.
    Christensen, Jens
    et al.
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Ekstedt, Jonatan
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Evaluation of Plugin Frameworks for the Jenkins Continuous Integration Build Server2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Begreppet Continuous Integration (CI) är idag centralt för många företag i deras produktutveckling. Kraven dessa företag ställer på denna programvara skiljer sig, beroende på vad de använder den till och hur deras miljö ser ut. Jenkins är en programvara som används för CI, det är öppen källkod och har ett brett stöd för pluginer. Det finns ett stort urval av pluginer redan idag, men det är inte säkert att specifika önskemål från företag uppfylls av dessa. Därför är det intressant att på ett snabbt sätt ta fram specifika pluginer för dessa företag.

    Vi har i denna rapport utrett möjligheterna att utveckla pluginer till Jenkins i Ruby. Det senaste året har utveckling av pluginer i Ruby vuxit fram för Jenkins. Ramverket är fortfarande i ett tidigt stadium, men är utformat för att kunna falla tillbaka på det programmeringsspråk som Jenkins är skrivet i; Java. Det är på så sätt fullt möjligt att nu skriva pluginer i Ruby. Ruby är ett expressivt språk som är lätt att ta till sig, och den komplexitet som följer pluginutveckling i Java är till stor del gömd i Rubys ramverk.

    Vår slutsats är att Ruby är tillräckligt moget för att användas till pluginutveckling för Jenkins.

    Examensarbetet är uppdelat i två delar: en utvärdering av ramverken och deras verktyg för Ruby och Java, och en utvecklingsfas där vi fastställer vår analys. Den Rubyplugin som utvecklats kan ses som ett ‘proof-of-concept’, denna kan även användas som en slags mall vid framtida pluginutveckling vid Autoliv.

  • 284.
    Christoffersson, Jessica
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Evaluation of Systematic&Colour Print Mottle2005Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    Print mottle is a problem that has been hassling the printing business for a long time. Along with sharpness and correct colour reproduction, absence of print mottle is one of the most important factors of print quality. The possibility to measure the amount of print mottle (reflectance variation) may in many ways facilitate the development of printing methods. Such a measurement model should preferably follow the functions and abilities of the Human Visual System (HVS).

    The traditional model that STFI-Packforsk has developed to measure print mottle uses frequency analysis to find variations in reflectance. However, this model suffers some limitations since is does not perfectly agree with the functions of the HVS and does only measure variations in lightness. A new model that better follows the functions of the HVS has thus been developed. The new model does not only consider variations in lightness (monochromatic) but also variations in colour (chromatic). The new model also puts a higher weight on systematic variations than on random variations since the human eye is more sensitive to ordered structures. Furthermore, the new model uses a contrast sensitivity function that weights the importance of variations in different frequencies.

    To compare the new model with the traditional STFI model, two tests were carried out. Each test consisted of a group of test patches that were evaluated by the traditional STFI model and the new model. The first test consisted of 15 greyscale test patches that originated from conventional flexo and offset presses. The second test consisted of 24 digitally simulated test patches containing colour mottle and systematic mottle.

    The evaluation results in both the traditional and the new model were compared to the results of a visual evaluation carried out using a panel of test persons. The new model produced a result that correlated considerably better with the visual estimation than what the traditional model did.

  • 285.
    Chukala, Sileshi
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    A Move Towards Practicability: Context Information and User Profile Management for the SensibleThings Platform2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Achievements in academia and industry indicate a move towards the creation of a giant smart system including objects of different sizes, shapes, and purposes where the Internet will be so diverse and more resourceful with the incorporation of different smart devices. Mid Swe-den University took a first step towards providing an appropriate plat-form for Internet of Things applications known as SensibleThings for the emerging intercommunication of “objects”, called Internet of Things. The SensibleThings platform has produced components for sharing sensor-based context information on the Internet, in order to enable Internet of Things applications. In this thesis the plan was to contribute to filling the gap between the IoT and developers in academia as well as in the industries. The aim of the project was to create basic functionality to enable users to find new interesting users on the IoT and prioritize existing users. To this end context information and user profile man-agement is proposed and presented. Furthermore, a comparison be-tween the platform with the proposed extension as well as without was compared and examined.

  • 286.
    Ciobanu, Alexandru
    et al.
    McGill University, Canada .
    Hemati, Saied
    Linköpings universitet, Institutionen för systemteknik, Elektroniksystem. Linköpings universitet, Tekniska högskolan.
    Gross, Warren J.
    McGill University, Canada .
    Adaptive Multiset Stochastic Decoding of Non-Binary LDPC Codes2013Inngår i: IEEE Transactions on Signal Processing, ISSN 1053-587X, E-ISSN 1941-0476, Vol. 61, nr 16, s. 4100-4113Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We propose a non-binary stochastic decoding algorithm for low-density parity-check (LDPC) codes over GF(q) with degree two variable nodes, called Adaptive Multiset Stochastic Algorithm (AMSA). The algorithm uses multisets, an extension of sets that allows multiple occurrences of an element, to represent probability mass functions that simplifies the structure of the variable nodes. The run-time complexity of one decoding cycle using AMSA is O(q) for conventional memory architectures, and O(1) if a custom memory architecture is used. Two fully-parallel AMSA decoders are implemented on FPGA for two (192,96) (2,4)-regular codes over GF(64) and GF(256), both achieving a maximum clock frequency of 108 MHz. The GF(64) decoder has a coded throughput of 65 Mb/s at E-b/N-0 = 2.4 dB when using conventional memory, while a decoder using the custom memory version can achieve 698 Mb/s at the same E-b/N-0. At a frame error rate (FER) of 2 x 10(-6) the GF(64) version of the algorithm is only 0.04 dB away from the floating-point SPA performance, and for the GF(256) code the difference is 0.2 dB. To the best of our knowledge, this is the first fully parallel non-binary LDPC decoder over GF(256) reported in the literature.

  • 287.
    Ciobanu Morogan, Matei
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Data- och systemvetenskap, DSV.
    Security system for ad-hoc wireless networks based on generic secure objects2005Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    As computing devices and wireless connectivity become ubiquitous, new usage scenarios emerge, where wireless communication links between mobile devices are established in an ad-hoc manner. The resulting wireless ad-hoc networks differ from classical computer networks in a number of ways, lack of permanent access to the global network and heterogeneous structure being some of them. Therefore, security services and mechanisms that have been designed for classical computer networks are not always the optimal solution in an ad-hoc network environment.

    The research is focused on analyzing how standard security services that are available in classical networks can be provided in an ad-hoc wireless network environment. The goal is to design a security system optimized for operation in ad-hoc wireless networks that provides the same security services – authentication, access control, data confidentiality and integrity, non-repudiation – currently available in classic wired networks.

    The first part of the thesis is the design and implementation of a security platform based on generic secure objects. The flexible and modular nature of this platform makes it suitable for deployment on devices that form ad-hoc networks – ranging from Java-enabled phones to PDAs and laptops.

    We then investigate the problems that appear when implementing in ad-hoc networks some of the security technologies that are standard building blocks of secure systems in classical computer networks. Two such technologies have been found to present problems, namely the areas of certification and access control. In a series of articles, we have described the problems that appear and devised solutions to them by designing protocols, techniques and extensions to standards that are optimized for usage in the ad-hoc network environment.

    These techniques, together with the functionality provided by the underlying security platform, are used to implement all standard security services – confidentiality, authentication, access control, non repudiation and integrity, allowing to integrate ad-hoc networks into the existing security infrastructure.

  • 288.
    Claug, Erik
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Web Design for Multiple Platforms in Microsoft SharePoint 20132013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    As mobile devices become more common when surfing the web there is an increasing demand of making web sites adjusted to other devices than computers. One common platform on the web is Microsoft SharePoint. In this report I look into one method of how to develop web sites that work on multiple devices in Microsoft SharePoint. I will be looking into different techniques as separate web sites compared to responsive web design. By exploring the approach of mobile first I try to find a working solution of techniques. I also look into another method that is suggested in a book and look into how Bootstrap could be used in the process.

    I will also look into content to identify what content need to be adjusted between different devices. I find that navigation is an important part of a web site and look into different methods of handling navigation on mobile devices.

    By analyzing different techniques and looking into what content is going to be adjusted a solution is proposed where the navigation is adjusted in a responsive design. The design is converted into a SharePoint masterpage and then fixed using stylesheets and JavaScript. The solution works on a web site with a complex site structure since it focuses on how to adjust the navigation.

  • 289.
    Clear, Tony
    et al.
    Auckland Univ Technol, Sch Engn Comp & Math Sci, Auckland, New Zealand..
    Beecham, Sarah
    Univ Limerick, Lero, Limerick, Ireland..
    Barr, John
    Ithaca Coll, Ithaca, NY 14850 USA..
    Daniels, Mats
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Oudshoorn, Michael
    Wentworth Inst Technol, Dept Comp Sci & Comp Networking, Boston, MA USA..
    Noll, John
    Univ Limerick, Lero, Limerick, Ireland..
    Developments in Global Software Engineering Education2016Inngår i: 2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2016Konferansepaper (Fagfellevurdert)
    Abstract [en]

    An ITiCSE 2015 conference working group report has recently delivered a comprehensive systematic review of the literature addressing the challenges and solutions in teaching global software engineering courses. In this panel session, a group of authors of that report will review the findings, and present their own views on teaching such courses, the pros and cons and their own motivations and experiences, together with strategies that have proven effective. We argue that these courses are critical for preparing students for practice as software engineers in today's global settings, but they are certainly not for the faint-hearted. After the review and presentation of position statements by panelists there will be a question and answer session with the audience and a discussion elaborating on the next frontiers in research and practice for global software engineering education.

  • 290. Clear, Tony
    et al.
    Daniels, Mats
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik. Datorteknik.
    2D and 3D Introductory Processes in Virtual Groups2003Inngår i: IEEE Frontiers in Education, 2003, s. S1F1-S1F6Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper reports upon a collaborative learning

    trial conducted in 2002 between students at Auckland

    University of Technology New Zealand and Uppsala

    University Sweden.

    The trial design included an initial phase in which virtual

    groups became acquainted, using different modes of cybericebreaker,

    and a subsequent phase with a common task

    involving group decision making - evaluating and ranking

    the different icebreaker experiences.

    The software used in the trial comprised 1) a custom

    developed web-based groupware database, and 2) a Java

    3D application, employing configurable avatars, which

    could be manipulated in a virtual world. Each of these

    applications supported icebreaking activities intended to

    establish trust between virtual group members, the latter in

    3D mode, and the former in 2D mode.

    The trial process and the software are initially outlined. The

    evaluation strategy, and approaches to data analysis are

    then discussed, and the paper concludes with a report of

    preliminary findings from the trial.

  • 291.
    Clemmedsson, Elin
    KTH, Skolan för industriell teknik och management (ITM), Industriell ekonomi och organisation (Inst.), Industriell Marknadsföring och Entreprenörskap.
    Identifying Pitfalls in Machine Learning Implementation Projects: A Case Study of Four Technology-Intensive Organizations2018Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This thesis undertook the investigation of finding often occurring mistakes and problems that organizations face when conducting machine learning implementation projects. Machine learning is a technology with the strength of providing insights from large amounts of data. This business value generating technology has been defined to be in a stage of inflated expectations which potentially will cause organizations problems when doing implementation projects without previous knowledge. By a literature review and hypothesis formation followed by interviews with a sample group of companies, three conclusions are drawn from the results. First, indications show there is a correlation between an overestimation of the opportunities of machine learning and how much experience an organization has within the area. Second, it is concluded that data related pitfalls, such as not having enough data, low quality of the data, or biased data, are the most severe. Last, it is shown that realizing the value of long-term solutions regarding machine learning projects is difficult, although the ability increases with experience.

  • 292.
    Clemmensen, Christian
    et al.
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Winsth, Jonas
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Konceptuell modell av dataomvandling till USB2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Alstom Power i Växjö arbetar med utveckling och försäljning av bland annat elektrofilter till

    rökgasreningssystem vid olika typer av miljövårdsanläggningar för t.ex. kraftverksindustrin.

    Dessa elektrofilter kontrolleras och regleras med hjälp av styrutrustning uppbyggd av ett

    antal styrenheter som idag kommunicerar via en egentillverkad standard kallad ”Fläktbuss”. För

    att övervaka detta system vill man använda handburna PDA och kommunicera med Fläktbussen

    via USB. För att få kommunikationen mellan USB och Fläktbuss att fungera krävs någon form av

    aktiv konvertering.

    Detta examensarbete kommer att ta upp så väl problematik och lösningar kring det

    problem som finns i samband med denna konvertering.

  • 293.
    Cojean, Terry
    et al.
    University of Bordeaux.
    Guermouche, Abdou
    University of Bordeaux.
    Hugo, Andra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Namyst, Raymond
    University of Bordeaux.
    Wacrenier, Pierre-André
    University of Bordeaux.
    Resource aggregation for task-based CholeskyFactorization on top of heterogeneous machines2016Konferansepaper (Fagfellevurdert)
  • 294.
    Collin, Mikael
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Brorsson, Mats
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Öberg, Johnny
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    A performance and energy exploration of dictionary code compression architectures2011Inngår i: 2011 International  Green Computing Conference and Workshops (IGCC), IEEE conference proceedings, 2011, s. 1-8Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We have made a performance and energy exploration of a previously proposed dictionary code compression mechanism where frequently executed individual instructions and/or sequences are replaced in memory with short code words. Our simulated design shows a dramatically reduced instruction memory access frequency leading to a performance improvement for small instruction cache sizes and to significantly reduced energy consumption in the instruction fetch path. We have evaluated the performance and energy implications of three architectural parameters: branch prediction accuracy, instruction cache size and organization. To asses the complexity of the design we have implemented the critical stages in VHDL.

  • 295. Cornwall, L. A.
    et al.
    Jensen, J.
    Kelsey, D. P.
    Frohner, Á.
    Kouřil, D.
    Bonnassieux, F.
    Nicoud, S.
    Lorentey, K.
    Hahkala, J.
    Silander, M.
    Cecchini, R.
    Ciaschini, V.
    dell'Agnello, L.
    Spataro, F.
    O'Callaghan, D.
    Mulmo, Olle
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Volpato, Gian Luca
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Groep, D.
    Steenbakkers, M.
    Mcnab, A.
    Authentication and authorization mechanisms for multi-domain grid environments2004Inngår i: Journal of Grid Computing, ISSN 1570-7873, E-ISSN 1572-9184, Vol. 2, nr 4, s. 301-311Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article discusses the authentication and the authorization aspects of security in grid environments spanning multiple administrative domains. Achievements in these areas are presented using the EU DataGrid project as an example implementation. It also gives an outlook on future directions of development.

  • 296.
    Crona, Andreas
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik.
    Gustafsson, Benjamin
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik.
    En jämförande studie av crossplattform- och hybridutveckling2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Syfte – Syftet med studien var att jämföra och utvärdera två utvecklingsmetoder för hybrid- och crossplattformutveckling. Detta syfte bröts ner till två frågeställningar:

    • Hur väl kan de båda utvecklingsmetoderna återskapa animationer för att förbättra användarupplevelsen i en applikation?- Vilka av de 3 utvalda animationerna som visas i meaningful transitions och point of origin går att återskapa i de båda utvecklingssätten?
    • Hur påverkas prestandan vid användandet av de utvalda hårdvarufunktioner som implementerats med de båda utvecklingsmetoderna? – Kameran och minnet.

    Metod – Denna rapport är en fallstudie då den är gjord i samarbete med Knowit Jönköping AB efter deras önskemål. Utvecklingsmetoderna som valdes var PhoneGap och Appcelerator Studio, alltså en för hybridutveckling och en för cross-plattform. En applikation för varje utvecklingsmetod byggdes med identiska funktioner som skulle kunna testas för att besvara frågeställningarna. Två kvantitativa insamlingar gjordes i form av enkätundersökning av testpersoners uppfattning av animationerna och en insamling av prestandamätningar vid hårdvaruanvändning.

    Resultat – Resultatet från studien visar att minnesåtgången vid hårdvaruanvändning är både låg och nästan identisk för de båda utvecklingsmetoderna. Empirin visar även att animationerna på båda metoderna kan leva upp till Googles riktlinjer enligt testpersonerna och upplevs som positiva. En notering är dock att Appcelerator tycks ha en liten fördel vad det gäller animationerna. Denna fördel är relativt liten och gör egentligen ingen större skillnad för vilken metod som kan anses som den bästa.

    Implikationer – Studien bidrar till att underlätta valet för mjukvaruutvecklare och företag som funderar på att använda sig utav någon av utvecklingsmetoderna. Detta genom att visa att prestandan vid hårdvaruanvändning inte är något att lägga stor vikt på. För användargränssnitt och användarupplevelse finns en mindre skillnad då Appcelerator använder sig utav native SDK och får en liten fördel när det kommer till användarupplevelsen. Detta kan dock justeras för PhoneGap då det med lite extra jobb går att styla applikationen till att se mer native ut. Utvecklare kan därför tänka på vilka kunskaper de har sedan innan vad gäller XML/HTML och styling då de ska välja utvecklingsmetod.

    Begränsningar – Utvecklingen är gjord av förstagångsanvändare av PhoneGap och Appcelerator Studio vilket kan ha påverkat kvalitén på animationerna och användargränssnittet. En tredjepartsapplikation användes vid mätning av prestandan då PhoneGap saknade plugin för det. Detta kan ha haft en påverkan på resultatet.

  • 297. Crossley, Mark
    et al.
    Lindell, Joakim
    Lösenordsmönster: Att förebygga svaga lösenord2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Passwords are used more now than ever before. Their use is based on the ideathat the password is only known to the user and that its secrecy prevents othersfrom accessing potentially valuable or sensitive information. But how secret isa password in today's high tech world? Passwords are generally converted into hashsums and saved in databases. Cracking a password requires that the process is reversed so that the actual password can be derived from the hash sum. This cracking process can beachieved by two methods. An attacker can test all the possible combinations,(brute force cracking) or the attacker can compare the password with a list ofcommonly used passwords (cracking with wordlists). This paper investigates a passwords vulnerability to both brute force crackingand cracking via wordlists. It uses a modern computer's processing speedsto establish the amount of time to crack a certain password via brute forcecracking. It also deploys state of the art techniques to examine a password'scontent. It analyses three databases from dierent online communities to examineany possible correlation between a user's hobby interest and their choiceof password. This paper finds that the majority of passwords won't remain secret for very long. Short passwords which consist of a small alphabet are particularly vulnerable to brute force attacks. However due to the increasing speed of modern computers even passwords which are twelve characters long are still potentially vulnerable. This paper finds that users from a variety of online communities choose common passwords which are likely to be on a wordlist and thus susceptible to cracking via word list attacks.

    This paper provides suggestions on how a user can choose a stronger password.

  • 298.
    Cseplö, Madeleine
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Wilhelmsson, Anna
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Korsbo, Jonna
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Ungdomars medvetenhet om IT-relaterad brottslighet2014Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Världen vi lever i blir allt mer teknisk för var dag som går, men följer vår kunskap med i denna utveckling? Tyvärr är det inte så, allt för få reflekterar över de risker denna utveckling medför samt hur våra lagar appliceras i denna miljö. På grund av detta kan det vara svårt för både unga och vuxna att veta vad som är tillåtet och ej i den teknologins värld. Numera introduceras barn och ungdomar tidigt för tekniken och debuten för deras självständiga användande av tekniken i allt lägre åldrar och har en stor roll i både utbildningen samt för det sociala umgänget. De sociala medierna har blivit en del av ungdomars vardag och detta har medfört att handlingar som näthat dessvärre har ökat.

     

    Vårt mål med arbetet har varit att skapa en dialog om IT-relaterade brott ungdomar emellan, men även för att upplysa äldre generationer om problemet. Det vi kan konstatera är att det definitivt finns ett behov av att informera ungdomar om ämnet, då mer än hälften av eleverna själva (59.2 %) säger att de vill ha en halvdag i skolan om IT-relaterade brott. Elevernas kunskap om IT-relaterad brottslighet varierade mellan åldrarna, de yngsta kände sig säkrare på vad som på Internet är tillåtet och inte medan enbart 60.5 % av de äldsta eleverna kände sig tillräckligt informerade. Ett annat framtaget resultat är att flera av eleverna har en oroväckande inställning till kränkningar och hat på Internet. De menar att det numera sker så mycket och ofta att de inte längre ser det som ett större problem. Dessutom är det inte många som känner sig oroliga för konsekvenserna om de skulle utföra något olagligt via Internet, endast drygt hälften av de äldre.

     

    Omfattningen av vårt arbete är långt ifrån stor då fallstudien enbart genomfördes på en skola, detta då det var den enda skolan som anmälde sitt intresse till att medverka. Trots detta, är resultaten från vår undersökning mycket intressanta och säger även en hel del om hur medvetenheten antagligen ser ut hos många ungdomar idag. 

  • 299.
    Cucurull, Jordi
    et al.
    Linköpings universitet, Institutionen för datavetenskap, RTSLAB - Laboratoriet för realtidssystem. Linköpings universitet, Tekniska högskolan.
    Nadjm-Tehrani, Simin
    Linköpings universitet, Institutionen för datavetenskap, RTSLAB - Laboratoriet för realtidssystem. Linköpings universitet, Tekniska högskolan.
    Asplund, Mikael
    Linköpings universitet, Institutionen för datavetenskap, RTSLAB - Laboratoriet för realtidssystem. Linköpings universitet, Tekniska högskolan.
    Anomaly detection and mitigation for disaster area networks2010Inngår i: Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings / [ed] Somesh Jha, Robin Sommer and Christian Kreibich, Springer Berlin/Heidelberg, 2010, s. 339-359Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common operational picture and thereby reliable dissemination are prevalent.In this paper we address anomaly detection in intermittently connected mobile ad hoc networks in which there is little or no knowledge about the actors on the scene, and opportunistic contacts together with a store-and-forward mechanism are used to overcome temporary partitions. The approach uses a statistical method for detecting anomalies when running a manycast protocol for dissemination of important messages to k receivers. Simulation of the random walk gossip (RWG) protocol combined with detection and mitigation mechanisms is used to illustrate that resilience can be built into a network in a fully distributed and attack-agnostic manner, at a modest cost in terms of drop in delivery ratio and additional transmissions. The approach is evaluated with attacks by adversaries that behave in a similar manner to fair nodes when invoking protocol actions.

  • 300. Culver, Stephen
    et al.
    Gidlund, Mikael
    ABB Corporate Research .
    Wang, G.
    Performance of Cooperative relaying with ARQ in Wireless Sensor Networks2009Inngår i: Proceedings, 2009, s. 317-319Konferansepaper (Fagfellevurdert)
3456789 251 - 300 of 1810
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf