Ändra sökning
Avgränsa sökresultatet
3456789 251 - 300 av 50918
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 251. Abeywardena, D.
    et al.
    Wang, Zhan
    KTH, Skolan för datavetenskap och kommunikation (CSC), Datorseende och robotik, CVAP. KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Centrum för Autonoma System, CAS.
    Dissanayake, G.
    Waslander, S. L.
    Kodagoda, S.
    Model-aided state estimation for quadrotor micro air vehicles amidst wind disturbances2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper extends the recently developed Model-Aided Visual-Inertial Fusion (MA-VIF) technique for quadrotor Micro Air Vehicles (MAV) to deal with wind disturbances. The wind effects are explicitly modelled in the quadrotor dynamic equations excluding the unobservable wind velocity component. This is achieved by a nonlinear observability of the dynamic system with wind effects. We show that using the developed model, the vehicle pose and two components of the wind velocity vector can be simultaneously estimated with a monocular camera and an inertial measurement unit. We also show that the MA-VIF is reasonably tolerant to wind disturbances, even without explicit modelling of wind effects and explain the reasons for this behaviour. Experimental results using a Vicon motion capture system are presented to demonstrate the effectiveness of the proposed method and validate our claims.

  • 252. Abeywickrama, S.
    et al.
    Furdek, Marija
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab). University of Zagreb, Faculty of Electrical Engineering and Computing, Dept. of Telecommunications, Croatia.
    Monti, Paolo
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Nag, A.
    Wong, E.
    Dual-homing based protection for enhanced network availability and resource efficiency2014Ingår i: Asia Communications and Photonics Conference, ACP, 2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    An approach to enhance core network survivability by utilizing dual-homing capabilities of the access network. Results reveal significant improvements in core network resource utilization and connection availability, suggesting benefits to network operators and service providers.

  • 253.
    Abghari, Shahrooz
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Boeva, Veselka
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Lavesson, Niklas
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Grahn, Håkan
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Gustafsson, Jörgen
    Ericsson AB.
    Shaikh, Junaid
    Ericsson AB.
    Outlier Detection for Video Session Data Using Sequential Pattern Mining2018Ingår i: ACM SIGKDD Workshop On Outlier Detection De-constructed, 2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    The growth of Internet video and over-the-top transmission techniqueshas enabled online video service providers to deliver highquality video content to viewers. To maintain and improve thequality of experience, video providers need to detect unexpectedissues that can highly affect the viewers’ experience. This requiresanalyzing massive amounts of video session data in order to findunexpected sequences of events. In this paper we combine sequentialpattern mining and clustering to discover such event sequences.The proposed approach applies sequential pattern mining to findfrequent patterns by considering contextual and collective outliers.In order to distinguish between the normal and abnormal behaviorof the system, we initially identify the most frequent patterns. Thena clustering algorithm is applied on the most frequent patterns.The generated clustering model together with Silhouette Index areused for further analysis of less frequent patterns and detectionof potential outliers. Our results show that the proposed approachcan detect outliers at the system level.

  • 254.
    Abghari, Shahrooz
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Boeva, Veselka
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Lavesson, Niklas
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Grahn, Håkan
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Ickin, Selim
    Ericsson, SWE.
    Gustafsson, Jörgen
    Ericsson, SWE.
    A Minimum Spanning Tree Clustering Approach for Outlier Detection in Event Sequences2018Ingår i: The 17th IEEE International Conference on Machine Learning and Applications Special Session on Machine Learning Algorithms, Systems and Applications, IEEE, 2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    Outlier detection has been studied in many domains. Outliers arise due to different reasons such as mechanical issues, fraudulent behavior, and human error. In this paper, we propose an unsupervised approach for outlier detection in a sequence dataset. The proposed approach combines sequential pattern mining, cluster analysis, and a minimum spanning tree algorithm in order to identify clusters of outliers. Initially, the sequential pattern mining is used to extract frequent sequential patterns. Next, the extracted patterns are clustered into groups of similar patterns. Finally, the minimum spanning tree algorithm is used to find groups of outliers. The proposed approach has been evaluated on two different real datasets, i.e., smart meter data and video session data. The obtained results have shown that our approach can be applied to narrow down the space of events to a set of potential outliers and facilitate domain experts in further analysis and identification of system level issues.

  • 255.
    Abghari, Shahrooz
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Kazemi, Samira
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Open Data for Anomaly Detection in Maritime Surveillance2012Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    This thesis investigated the potential open data as a complementary resource for Anomaly Detection (AD) in the Maritime Surveillance (MS) domain. A framework for AD was proposed based on the usage of open data sources along with other traditional sources of data. According to the proposed AD framework and the algorithms for implementing the expert rules, the Open Data Anomaly Detection System (ODADS) was developed. To evaluate the accuracy of the system, an experiment on the vessel traffic data was conducted and an accuracy of 99% was obtained for the system. There was a false negative case in the system results that decreased the accuracy. It was due to incorrect AIS data in a special situation that was not possible to be handled by the detection rules in the scope of this thesis. The validity of the results was investigated by the subject matter experts from the Swedish Coastguard. The validation results showed that the majority of the ODADS evaluated anomalies were true alarms. Moreover, a potential information gap in the closed data sources was observed during the validation process. Despite the high number of true alarms, the number of false alarms was also considerable that was mainly because of the inaccurate open data. This thesis provided insights into the open data as a complement to the common data sources in the MS domain and is concluded that using open data will improve the efficiency of the surveillance systems by increasing the accuracy and covering some unseen aspects of maritime activities.

  • 256.
    Abgrall, Corentin
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Deep learning models as advisors to execute trades on financial markets2018Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Nyligen utförda arbeten har visat att faltningsnätverk framgångsrikt kan hantera tidsserier som indata i olika problem. Observationen utnyttjas i detta examensarbete som introducerar en ny metod som kombinerar tekniker för maskininlärning för att skapa lönsamma handelsstrategier. Metoden löser ett binärt klassificeringsproblem: beroende på en viss tidpunkt, tillgång till priser före denna tidpunkt och ett säljkriterium så är målet att förutsäga nästa prisvariation. Klassificeringsmetoden baseras på faltningsnätverk som kombinerar två stora förbättringar: en speciell form av bagging och en viktpropagering för att förbättra noggrannheten och reducera modellens varians. Det rullande lärandet och faltningsnätverken kan utnyttja tidsberoendet för att förbättra handelsstrategin. Den presenterade arkitekturen klarar av att prestera bättre än experthandlare.

  • 257.
    Abheeshta, Putta
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Comparative Analysis of Software Development Practices across Software Organisations: India and Sweden2016Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Context. System Development Methodologies (SDM’s) have been an area of intensive research in the field of software engineering. Different software organisations adopt different development methodologies and use different development practices. The frequency of usage of development practices and acceptance factors for adoption of development methodology are crucial for software organisations. The factors of acceptance and development practices differ across geographical locations. Many challenges have been presented in the literature with respect to the mismatch of the development practices across organisations while collaborating across organisations in distributed development. There is no considerable amount of research done in context of differences across development practices and acceptance factors for adoption of a particular development methodology. Objectives. The primary objectives of the research are to find out a) differences in (i) practice usage (ii) acceptance factors such as organisational, social and cultural b) explore the reasons for the differences and also investigate consequences of such differences while collaborating, across organisations located in India and Sweden. Methods. A literature review was conducted by searching in scientific databases for identifying common agile and plan-driven development practices and acceptance theories for development methodologies. Survey was conducted across organisations located in India and Sweden to find out the usage frequency of development practices and acceptance factors. Ten interviews were conducted to investigate, reasons for differences and consequences of differences from the software practitioners from organisations located in India and Sweden. Literature evidences were used to support the results collected from interviews. Results. From the survey, organisations in India have adopted a higher frequency of plan driven practices when compared to Sweden and agile practices were adopted at higher frequency in Sweden when compared to India. The number of organisations adopting "pure agile" methodologies have been significantly higher in Sweden. There was significant differences were found across the acceptance factors such as cultural, organisational, image and career factors between India and Sweden. The factors such as cultural, social, human, business and organisational factors are responsible for such differences across development practices and acceptance factors. Challenges related to communication, coordination and control were found due to the differences, while collaborating between Indian and Sweden sites. Conclusions. The study signifies the importance of identifying the frequency of development practices and also the acceptance factors responsible for adoption of development methodologies in the software organisations. The mismatch between these practices will led to various challenges. The study draws insights into various non-technical factors such as cultural, human, organisational, business and social while collaborating between organisations. Variations across these factors will lead to many coordination, communication and control issues. Keywords: Development Practices, Agile Development, Plan Driven Development, Acceptance Factors, Global Software Development.

  • 258. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens konstruerar identitet online – flickors och pojkars erfarenheter av sociala medier2013Ingår i: Pedagogisk forskning i Sverige, ISSN 1401-6788, E-ISSN 2001-3345, Vol. 18, nr 1-2Artikel i tidskrift (Refereegranskat)
  • 259. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens negotiating identity online – Swedish girls' and boys' reflections on online experiences2013Ingår i: Journal of Youth Studies, ISSN 1367-6261, E-ISSN 1469-9680, Vol. 16, nr 8, s. 951-969Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    How do Swedish tweens (10–14 years old) understand and experience the writing of their online identities? How are such intertwined identity markers as gender and age expressed and negotiated? To find some answers to these questions, participants in this study were asked to write a story about the use of online web communities on pre-prepared paper roundels with buzzwords in the margins to inspire them. Content analysis of these texts using the constant comparative method showed that the main factors determining how online communities are understood and used are the cultural age and gender of the user. Both girls and boys chat online, but girls more often create blogs while boys more often play games. Gender was increasingly emphasised with age; but whereas boys aged 14 described themselves as sexually active and even users of pornography, girls of the same age described themselves as shocked and repelled by pornography and fearful of sexual threats. In this investigation an intersectionalist frame of reference is used to elucidate the intertwined power differentials and identity markers of the users' peer group situation.

  • 260.
    Abid, Muhammad Zeeshan
    KTH, Skolan för informations- och kommunikationsteknik (ICT). Technische Universität Braunschweig.
    A Multi-leader Approach to Byzantine Fault Tolerance: Achieving Higher Throughput Using Concurrent Consensus2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Byzantine Fault Tolerant protocols are complicated and hard to implement.Today’s software industry is reluctant to adopt these protocols because of thehigh overhead of message exchange in the agreement phase and the high resourceconsumption necessary to tolerate faults (as 3 f + 1 replicas are required totolerate f faults). Moreover, total ordering of messages is needed by mostclassical protocols to provide strong consistency in both agreement and executionphases. Research has improved throughput of the execution phase by introducingconcurrency using modern multicore infrastructures in recent years. However,improvements to the agreement phase remains an open area.

    Byzantine Fault Tolerant systems use State Machine Replication to tolerate awide range of faults. The approach uses leader based consensus algorithms for thedeterministic execution of service on all replicas to make sure all correct replicasreach same state. For this purpose, several algorithms have been proposed toprovide total ordering of messages through an elected leader. Usually, a singleleader is considered to be a bottleneck as it cannot provide the desired throughputfor real-time software services. In order to achieve a higher throughput there is aneed for a solution which can execute multiple consensus rounds concurrently.

    We present a solution that enables multiple consensus rounds in parallel bychoosing multiple leaders. By enabling concurrent consensus, our approach canexecute several requests in parallel. In our approach we incorporate applicationspecific knowledge to split the total order of events into multiple partial orderswhich are causally consistent in order to ensure safety. Furthermore, a dependencycheck is required for every client request before it is assigned to a particular leaderfor agreement. This methodology relies on optimistic prediction of dependenciesto provide higher throughput. We also propose a solution to correct the course ofexecution without rollbacking if dependencies were wrongly predicted.

    Our evaluation shows that in normal cases this approach can achieve upto 100% higher throughput than conventional approaches for large numbers ofclients. We also show that this approach has the potential to perform better incomplex scenarios

  • 261.
    Abid, Saad Bin
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Wei, Xian
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Development of Software for Feature Model Rendering2006Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    This Master’s thesis is aimed at improving the management of artifacts in the context of a joint-project between Jönköping University with the SEMCO project and industrial partner, a company involved in developing software for safety components. Both have a slightly distinct interest but this project can serve both parties.

    Nowadays feature modelling is efficient way for domain analysis. The purpose of this master thesis is to analysis existing four popular feature diagrams, to find out commonalities between each of them and conclude results to give suggestions of how to use existing notation systems efficiently and according to situations.

    The developed software based on knowledge established from research analysis. Two notation systems which are suggested in research part of the thesis report are implemented in the developed software “NotationManager”. The development procedures are also described and developer choices are mentioned along with the comparisons according to the situations

    Scope of the research part as well as development is discussed. Future work for developed solution is also suggested.

  • 262.
    Abi-Haidar, Layal
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Realtidsgenomsökning efter säkerhetsrisker i JavaScript-kod2015Självständigt arbete på grundnivå (kandidatexamen), 15 poäng / 22,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Syftet med detta arbete är att undersöka om det är möjligt att kunna i realtid undersöka kod på en webbsida för att rekommendera uppdatering av en befintlig webbläsare vid behov, utan att användarupplevelsen påverkas negativt. För att undersöka detta implementerades ett program i JavaScript. Sex olika JavaScript-bibliotek användes som testfall. Programmet söker igenom koden som finns i ett JavaScript-bibliotek och gör en rekommendation med hänsyn till några kända säkerhetsrisker och försvar mot dem. Dessutom beräknar programmet svarstiden med hjälp av klockan på klientsidan.

    Enligt Tolia, Andersen och Satyanarayanan (2006) visar undersökningar som har gjorts att användare föredrar svarstider som är under en sekund, och att svarstider som är över en sekund kan få användarna att bli missnöjda. För att användarupplevelsen inte skall påverkas negativt, bör svarstiden inte överstiga en sekund.

    Resultaten från undersökningen visar att svarstiderna inte blir tillräckligt långa för att kunna påverka användarupplevelsen negativt.

  • 263. Abolhassani, M.
    et al.
    Chan, T. -HH.
    Chen, Fei
    KTH.
    Esfandiari, H.
    Hajiaghayi, M.
    Mahini, H.
    Wu, X.
    Beating ratio 0.5 for weighted oblivious matching problems2016Ingår i: Leibniz International Proceedings in Informatics, LIPIcs, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing , 2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    We prove the first non-trivial performance ratios strictly above 0.5 for weighted versions of the oblivious matching problem. Even for the unweighted version, since Aronson, Dyer, Frieze, and Suen first proved a non-trivial ratio above 0.5 in the mid-1990s, during the next twenty years several attempts have been made to improve this ratio, until Chan, Chen, Wu and Zhao successfully achieved a significant ratio of 0.523 very recently (SODA 2014). To the best of our knowledge, our work is the first in the literature that considers the node-weighted and edge-weighted versions of the problem in arbitrary graphs (as opposed to bipartite graphs). (1) For arbitrary node weights, we prove that a weighted version of the Ranking algorithm has ratio strictly above 0.5. We have discovered a new structural property of the ranking algorithm: if a node has two unmatched neighbors at the end of algorithm, then it will still be matched even when its rank is demoted to the bottom. This property allows us to form LP constraints for both the node-weighted and the unweighted oblivious matching problems. As a result, we prove that the ratio for the node-weighted case is at least 0.501512. Interestingly via the structural property, we can also improve slightly the ratio for the unweighted case to 0.526823 (from the previous best 0.523166 in SODA 2014). (2) For a bounded number of distinct edge weights, we show that ratio strictly above 0.5 can be achieved by partitioning edges carefully according to the weights, and running the (unweighted) Ranking algorithm on each part. Our analysis is based on a new primal-dual framework known as matching coverage, in which dual feasibility is bypassed. Instead, only dual constraints corresponding to edges in an optimal matching are satisfied. Using this framework we also design and analyze an algorithm for the edge-weighted online bipartite matching problem with free disposal. We prove that for the case of bounded online degrees, the ratio is strictly above 0.5. 

  • 264.
    Aboode, Adam
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Anomaly Detection in Time Series Data Based on Holt-Winters Method2018Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    I dagens värld ökar mängden insamlade data för varje dag som går, detta är en trend som sannolikt kommer att fortsätta. Samtidigt ökar även det potentiella värdet av denna data tack vare ständig utveckling och förbättring utav både hårdvara och mjukvara. För att utnyttja de stora mängder insamlade data till att skapa insikter, ta beslut eller träna noggranna maskininlärningsmodeller vill vi försäkra oss om att vår data är av god kvalité. Det finns många definitioner utav datakvalité, i denna rapport fokuserar vi på noggrannhetsaspekten.

    En metod som kan användas för att säkerställa att data är av god kvalité är att övervaka inkommande data och larma när anomalier påträffas. Vi föreslår därför i denna rapport en metod som, baserat på historiska data, kan detektera anomalier i tidsserier när nya värden anländer. Den föreslagna metoden består utav två delar, dels att förutsäga nästa värde i tidsserien genom Holt-Winters metod samt att jämföra residualen med en estimerad normalfördelning.

    Vi utvärderar den föreslagna metoden i två steg. Först utvärderas noggrannheten av de, utav Holt-Winters metod, förutsagda punkterna för olika storlekar på indata. I det andra steget utvärderas prestandan av anomalidetektorn när olika metoder för att estimera variansen av residualernas distribution används. Resultaten indikerar att den föreslagna metoden i de flesta fall fungerar bra för detektering utav punktanomalier i tidsserier med en trend- och säsongskomponent. I rapporten diskuteras även möjliga åtgärder vilka sannolikt skulle förbättra prestandan hos den föreslagna metoden.

  • 265.
    Abou Zliekha, M.
    et al.
    Damascus University/Faculty of Information Technology.
    Al Moubayed, Samer
    Damascus University/Faculty of Information Technology.
    Al Dakkak, O.
    Higher Institute of Applied Science and Technology (HIAST).
    Ghneim, N.
    Higher Institute of Applied Science and Technology (HIAST).
    Emotional Audio-Visual Arabic Text to Speech2006Ingår i: Proceedings of the XIV European Signal Processing Conference (EUSIPCO), Florence, Italy, 2006Konferensbidrag (Refereegranskat)
    Abstract [en]

    The goal of this paper is to present an emotional audio-visual. Text to speech system for the Arabic Language. The system is based on two entities: un emotional audio text to speech system which generates speech depending on the input text and the desired emotion type, and un emotional Visual model which generates the talking heads, by forming the corresponding visemes. The phonemes to visemes mapping, and the emotion shaping use a 3-paramertic face model, based on the Abstract Muscle Model. We have thirteen viseme models and five emotions as parameters to the face model. The TTS produces the phonemes corresponding to the input text, the speech with the suitable prosody to include the prescribed emotion. In parallel the system generates the visemes and sends the controls to the facial model to get the animation of the talking head in real time.

  • 266.
    Abraham, Mark James
    et al.
    KTH, Skolan för teknikvetenskap (SCI), Teoretisk fysik, Beräkningsbiofysik. KTH, Centra, Science for Life Laboratory, SciLifeLab.
    Murtola, T.
    Schulz, R.
    Páll, Szilárd
    KTH, Centra, Science for Life Laboratory, SciLifeLab.
    Smith, J. C.
    Hess, Berk
    KTH, Skolan för teknikvetenskap (SCI), Teoretisk fysik, Beräkningsbiofysik. KTH, Centra, Science for Life Laboratory, SciLifeLab.
    Lindahl, Erik
    KTH, Skolan för teknikvetenskap (SCI), Teoretisk fysik, Beräkningsbiofysik. KTH, Centra, Science for Life Laboratory, SciLifeLab.
    Gromacs: High performance molecular simulations through multi-level parallelism from laptops to supercomputers2015Ingår i: SoftwareX, ISSN 2352-7110, Vol. 1-2, s. 19-25Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    GROMACS is one of the most widely used open-source and free software codes in chemistry, used primarily for dynamical simulations of biomolecules. It provides a rich set of calculation types, preparation and analysis tools. Several advanced techniques for free-energy calculations are supported. In version 5, it reaches new performance heights, through several new and enhanced parallelization algorithms. These work on every level; SIMD registers inside cores, multithreading, heterogeneous CPU-GPU acceleration, state-of-the-art 3D domain decomposition, and ensemble-level parallelization through built-in replica exchange and the separate Copernicus framework. The latest best-in-class compressed trajectory storage format is supported.

  • 267.
    Abrahamsson, Andreas
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för beräkningsvetenskap.
    Pettersson, Rasmus
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för beräkningsvetenskap.
    Smoothing of initial conditions for high order approximations in option pricing2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In this article the Finite Difference method is used to solve the Black Scholes equation. A second order and fourth order accurate scheme is implemented in space and evaluated. The scheme is then tried for different initial conditions. First the discontinuous pay off function of a European Call option is used. Due to the nonsmooth charac- teristics of the chosen initial conditions both schemes show an order of two. Next, the analytical solution to the Black Scholes is used when t=T/2. In this case, with a smooth initial condition, the fourth order scheme shows an order of four. Finally, the initial nonsmooth pay off function is modified by smoothing. Also in this case, the fourth order method shows an order of convergence of four. 

  • 268.
    Abrahamsson, Anna
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för systemteknik.
    Variance Adaptive Quantization and Adaptive Offset Selection in High Efficiency Video Coding2016Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Video compression uses encoding to reduce the number of bits that are used forrepresenting a video file in order to store and transmit it at a smaller size. Adecoder reconstructs the received data into a representation of the original video.Video coding standards determines how the video compression should beconducted and one of the latest standards is High Efficiency Video Coding (HEVC).One technique that can be used in the encoder is variance adaptive quantizationwhich improves the subjective quality in videos. The technique assigns lowerquantization parameter values to parts of the frame with low variance to increasequality, and vice versa. Another part of the encoder is the sample adaptive offsetfilter, which reduces pixel errors caused by the compression. In this project, thevariance adaptive quantization technique is implemented in the Ericsson researchHEVC encoder c65. Its functionality is verified by subjective evaluation. It isinvestigated if the sample adaptive offset can exploit the adjusted quantizationparameters values when reducing pixel errors to improve compression efficiency. Amodel for this purpose is developed and implemented in c65. Data indicates thatthe model can increase the error reduction in the sample adaptive offset. However,the difference in performance of the model compared to a reference encoder is notsignificant.

  • 269.
    Abrahamsson, Björn
    Linköpings universitet, Institutionen för systemteknik.
    Architectures for Multiplication in Galois Rings2004Självständigt arbete på grundnivå (yrkesexamen)Studentuppsats
    Abstract [en]

    This thesis investigates architectures for multiplying elements in Galois rings of the size 4^m, where m is an integer.

    The main question is whether known architectures for multiplying in Galois fields can be used for Galois rings also, with small modifications, and the answer to that question is that they can.

    Different representations for elements in Galois rings are also explored, and the performance of multipliers for the different representations is investigated.

  • 270.
    Abrahamsson, Charlotte
    et al.
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för programvarusystem.
    Wessman, Mattias
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för programvarusystem.
    WLAN Security: IEEE 802.11b or Bluetooth - which standard provides best security methods for companies?2004Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Which security holes and security methods do IEEE 802.11b and Bluetooth offer? Which standard provides best security methods for companies? These are two interesting questions that this thesis will be about. The purpose is to give companies more information of the security aspects that come with using WLANs. An introduction to the subject of WLAN is presented in order to give an overview before the description of the two WLAN standards; IEEE 802.11b and Bluetooth. The thesis will give an overview of how IEEE 802.11b and Bluetooth works, a in depth description about the security issues of the two standards will be presented, security methods available for companies, the security flaws and what can be done in order to create a secure WLAN are all important aspects to this thesis. In order to give a guidance of which WLAN standard to choose, a comparison of the two standards with the security issues in mind, from a company's point of view is described. We will present our conclusion which entails a recommendation to companies to use Bluetooth over IEEE 802.11b, since it offers better security methods.

  • 271.
    Abrahamsson, Claes
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Videokompression och användarnytta2007Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats
    Abstract [sv]

    Digital video är ett område som expanderat kraftigt senaste åren. På grund av avancerade videokompressionsmetoder kan numera en hel långfilm rymmas på mobiltelefonen eller den handhållna videospelaren. Men hur fungerar videokompression och hur hårt kan man komprimera en viss filmsekvens med bibehållen användarnytta? I denna uppsats görs en genomgång för grunderna inom videokompression. Dess förhållande till användarnyttan undersöks genom ett experiment. I detta experiment testas tre videosekvenser komprimerade med tre olika kodekar i tre olika datahastigheter för tre olika experimentgrupper. Slutsatsen av

    denna studie är att det är svårt att hitta en exakt brytpunkt där användaren finner videokvaliteten oacceptabel. Dock kan det konstateras att den högsta datahastigheten(256 kbit/s) genererar hög användarnytta medan den lägsta datahastigheten genererar låg användarnytta. Mellanhastigheten 128 kbit/s får knappt godkänt av testpersonerna.

  • 272.
    Abrahamsson, David
    Linköpings universitet, Institutionen för datavetenskap.
    Security Enhanced Firmware Update Procedures in Embedded Systems2008Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer.

    This thesis work focuses on creating a security enhanced firmware update procedure that is suitable for use in embedded systems. The common elements of embedded systems are described and various candidate algorithms are compared as candidates for firmware verification. Patents are used as a base for the proposal of a security enhanced update procedure. We also use attack trees to perform a threat analysis on an update procedure.

    The results are a threat analysis of a home office router and the proposal of an update procedure. The update procedure will only accept approved firmware and prevents reversion to old, vulnerable, firmware versions. The firmware verification is performed using the hash function SHA-224 and the digital signature algorithm RSA with a key length of 2048. The selection of algorithms and key lengths mitigates the threat of brute-force and cryptanalysis attacks on the verification algorithms and is believed to be secure through 2030.

  • 273.
    Abrahamsson, Emil
    Högskolan i Gävle, Institutionen för matematik, natur- och datavetenskap.
    Digitalt arkiv2008Studentarbete andra termin, 10 poäng / 15 hpStudentuppsats
    Abstract [sv]

    Grunden för detta arbete har varit att förenkla hantering och sökning bland ritningar och förteckningar i ett ritningsarkiv. Lösningen har blivit ett webbaserat datasystem som bygger på en databas där all information lagras och är sökbar. Resultatet har blivit ett system som man oavsett var man befinner sig inom företagets nätverk ha tillgång till alla ritningar och förteckningar på ett snabbt och effektivt sätt.

  • 274. Abrahamsson, Emil
    et al.
    Forni, Timothy
    Skeppstedt, Maria
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Medical text simplification using synonym replacement: adapting assessment of word difficulty to a compounding language2014Ingår i: Proceedings of the 3rdWorkshop on Predicting andImproving Text Readability for Target Reader Populations(PITR) / [ed] Sandra Williams, Stroudsburg: Association for Computational Linguistics , 2014, s. 57-65Konferensbidrag (Refereegranskat)
  • 275.
    Abrahamsson, Felix
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Designing a Question Answering System in the Domain of Swedish Technical Consulting Using Deep Learning2018Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    System som givet en text besvarar frågor är högt eftertraktade inom många arbetsområden. Eftersom majoriteten av all forskning inom naturligtspråkbehandling behandlar engelsk text är de flesta system inte direkt applicerbara på andra språk. Utöver detta har systemen ofta svårt att hantera långa textsekvenser.

    Denna rapport utforskar möjligheten att applicera existerande modeller på det svenska språket, i en domän där syntaxen och semantiken i språket skiljer sig starkt från typiska svenska texter. Dessutom kan längden på texterna variera godtyckligt. För att lösa dessa problem undersöks flera tekniker inom transferinlärning och frågebesvarande modeller i forskningsfronten. En ny metod för att behandla långa texter utvecklas, baserad på en dekompositionsalgoritm.

    Resultaten visar på att transfer learning delvis misslyckas givet domänen och modellerna, men att systemet ändå presterar relativt väl i den nya domänen. Utöver detta visas att systemet presterar väl på långa texter med hjälp av den nya metoden.

  • 276. Abrahamsson, H
    et al.
    Hagsand, Olof
    KTH, Skolan för datavetenskap och kommunikation (CSC), Teoretisk datalogi, TCS.
    Marsh, Ian
    TCP over high speed variable capacity links: A simulation study for bandwidth allocation2002Konferensbidrag (Refereegranskat)
    Abstract [en]

     New optical network technologies provide opportunities for fast, controllable bandwidth management. These technologies can now explicitly provide resources to data paths, creating demand driven bandwidth reservation across networks where an applications bandwidth needs can be meet almost exactly. Dynamic synchronous Transfer Mode (DTM) is a gigabit network technology that provides channels with dynamically adjustable capacity. TCP is a reliable end-to-end transport protocol that adapts its rate to the available capacity. Both TCP and the DTM bandwidth can react to changes in the network load, creating a complex system with inter-dependent feedback mechanisms. The contribution of this work is an assessment of a bandwidth allocation scheme for TCP flows on variable capacity technologies. We have created a simulation environment using ns-2 and our results indicate that the allocation of bandwidth maximises TCP throughput for most flows, thus saving valuable capacity when compared to a scheme such as link over-provisioning. We highlight one situation where the allocation scheme might have some deficiencies against the static reservation of resources, and describe its causes. This type of situation warrants further investigation to understand how the algorithm can be modified to achieve performance similar to that of the fixed bandwidth case.

  • 277.
    Abrahamsson, Henrik
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Internet Traffic Management2008Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
  • 278.
    Abrahamsson, Henrik
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Network overload avoidance by traffic engineering and content caching2012Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    The Internet traffic volume continues to grow at a great rate, now driven by video and TV distribution. For network operators it is important to avoid congestion in the network, and to meet service level agreements with their customers.  This thesis presents work on two methods operators can use to reduce links loads in their networks: traffic engineering and content caching.

    This thesis studies access patterns for TV and video and the potential for caching.  The investigation is done both using simulation and by analysis of logs from a large TV-on-Demand system over four months.

    The results show that there is a small set of programs that account for a large fraction of the requests and that a comparatively small local cache can be used to significantly reduce the peak link loads during prime time. The investigation also demonstrates how the popularity of programs changes over time and shows that the access pattern in a TV-on-Demand system very much depends on the content type.

    For traffic engineering the objective is to avoid congestion in the network and to make better use of available resources by adapting the routing to the current traffic situation. The main challenge for traffic engineering in IP networks is to cope with the dynamics of Internet traffic demands.

    This thesis proposes L-balanced routings that route the traffic on the shortest paths possible but make sure that no link is utilised to more than a given level L. L-balanced routing gives efficient routing of traffic and controlled spare capacity to handle unpredictable changes in traffic.  We present an L-balanced routing algorithm and a heuristic search method for finding L-balanced weight settings for the legacy routing protocols OSPF and IS-IS. We show that the search and the resulting weight settings work well in real network scenarios.

  • 279.
    Abrahamsson, Henrik
    RISE., Swedish ICT, SICS. School of Innovation, Design and Engineering.
    Network overload avoidance by traffic engineering and content caching2012Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    The Internet traffic volume continues to grow at a great rate, now driven by video and TV distribution. For network operators it is important to avoid congestion in the network, and to meet service level agreements with their customers. This thesis presents work on two methods operators can use to reduce links loads in their networks: traffic engineering and content caching. This thesis studies access patterns for TV and video and the potential for caching. The investigation is done both using simulation and by analysis of logs from a large TV-on-Demand system over four months. The results show that there is a small set of programs that account for a large fraction of the requests and that a comparatively small local cache can be used to significantly reduce the peak link loads during prime time. The investigation also demonstrates how the popularity of programs changes over time and shows that the access pattern in a TV-on-Demand system very much depends on the content type. For traffic engineering the objective is to avoid congestion in the network and to make better use of available resources by adapting the routing to the current traffic situation. The main challenge for traffic engineering in IP networks is to cope with the dynamics of Internet traffic demands. This thesis proposes L-balanced routings that route the traffic on the shortest paths possible but make sure that no link is utilised to more than a given level L. L-balanced routing gives efficient routing of traffic and controlled spare capacity to handle unpredictable changes in traffic. We present an L-balanced routing algorithm and a heuristic search method for finding L-balanced weight settings for the legacy routing protocols OSPF and IS-IS. We show that the search and the resulting weight settings work well in real network scenarios.

  • 280.
    Abrahamsson, Henrik
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Traffic measurement and analysis1999Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Measurement and analysis of real traffic is important to gain knowledge about the characteristics of the traffic. Without measurement, it is impossible to build realistic traffic models. It is recent that data traffic was found to have self-similar properties. In this thesis work traffic captured on the network at SICS and on the Supernet, is shown to have this fractal-like behaviour. The traffic is also examined with respect to which protocols and packet sizes are present and in what proportions. In the SICS trace most packets are small, TCP is shown to be the predominant transport protocol and NNTP the most common application. In contrast to this, large UDP packets sent between not well-known ports dominates the Supernet traffic. Finally, characteristics of the client side of the WWW traffic are examined more closely. In order to extract useful information from the packet trace, web browsers use of TCP and HTTP is investigated including new features in HTTP/1.1 such as persistent connections and pipelining. Empirical probability distributions are derived describing session lengths, time between user clicks and the amount of data transferred due to a single user click. These probability distributions make up a simple model of WWW-sessions.

  • 281.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Temporal Characteristics of Large IP Traffic Flows2003Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Several studies of Internet traffic have shown that it is a small percentage of the flows that dominate the traffic. This is often referred to as the mice and elephants phenomenon. It has been proposed that this might be one of very few invariants of Internet traffic and that this property could somehow be used for traffic engineering purposes. The idea being that one in a scalable way could control a major part of the traffic by only keeping track of a small number of flows. But for this the large flows must also be stable in the meaning that they should be among the largest flows during long periods of time. In this work we analyse packet traces of Internet traffic and study the temporal characteristics of large aggregated traffic flows defined by destination address prefixes.

  • 282.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Using empirical distributions to characterize web client traffic and to generate synthetic traffic2000Konferensbidrag (Refereegranskat)
  • 283.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Alonso, Juan
    RISE - Research Institutes of Sweden, ICT, SICS.
    Andersson, Anders
    RISE - Research Institutes of Sweden, ICT, SICS.
    Kreuger, Per
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    A Multi Path Routing Algorithm for IP Networks Based on Flow Optimisation.2002Konferensbidrag (Refereegranskat)
  • 284.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Alonso, Juan
    RISE - Research Institutes of Sweden, ICT, SICS.
    Andersson, Anders
    RISE - Research Institutes of Sweden, ICT, SICS.
    Kreuger, Per
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    From QoS provisioning to QoS charging2002Ingår i: Proceedings of the Second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, 2002, 1, Vol. Lectures Notes in Computer Science (LNCS) no. 2511, s. 135-144Konferensbidrag (Refereegranskat)
  • 285.
    Abrahamsson, Henrik
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ahlgren, Bengt
    RISE - Research Institutes of Sweden, ICT, SICS.
    Lindvall, Patrik
    TeliaSonera, Sweden.
    Nieminen, Johanna
    TeliaSonera, Sweden.
    Tholin, Per
    TeliaSonera, Sweden.
    Traffic Characteristics on 1Gbit/s Access Aggregation Links2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Large network operators have thousands or tens of thousands of access aggregation links that they need to manage and dimension properly. Measuring and understanding the traffic characteristics on these type of links are therefore essential. What do the traffic intensity characteristics look like on different timescales from days down to milliseconds? How do the characteristics differ if we compare links with the same capacity but with different type of clients and access technologies? How do the traffic characteristics differ from that on core network links? These are the type of questions we set out to investigate in this paper. We present the results of packet level measurements on three different 1Gbit/s aggregation links in an operational IP network. We see large differences in traffic characteristics between the three links. We observe highly skewed link load probability densities on timescales relevant for buffering (i.e. 10-milliseconds). We demonstrate the existence of large traffic spikes on short timescales (10-100ms) and show their impact on link delay. We also found that these traffic bursts often are caused by only one or a few IP flows.

  • 286.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Tholin, Per
    Delay and Traffic Intensity Monitoring in an Operational IP Network2015Konferensbidrag (Refereegranskat)
  • 287.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science, Kista, Sweden.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Caching for IPTV distribution with time-shift2013Ingår i: 2013 International Conference on Computing, Networking and Communications, ICNC 2013, IEEE , 2013, s. 916-921Konferensbidrag (Refereegranskat)
    Abstract [en]

    Today video and TV distribution dominate Internet traffic and the increasing demand for high-bandwidth multimedia services puts pressure on Internet service providers. In this paper we simulate TV distribution with time-shift and investigate the effect of introducing a local cache close to the viewers. We study what impact TV program popularity, program set size, cache replacement policy and other factors have on the caching efficiency. The simulation results show that introducing a local cache close to the viewers significantly reduces the network load from TV-on-Demand services. By caching 4% of the program volume we can decrease the peak load during prime time by almost 50%. We also show that the TV program type and how program popularity changes over time can have a big influence on cache hit ratios and the resulting link loads

  • 288.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Caching for IPTV distribution with time-shift2013Konferensbidrag (Refereegranskat)
  • 289.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Robust Traffic Engineering using L-balanced Weight-Settings in OSPF/IS-IS2009Konferensbidrag (Refereegranskat)
  • 290.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Simulation of IPTV caching strategies2010Ingår i: Proceedings of the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2010, s. 187-193Konferensbidrag (Refereegranskat)
    Abstract [en]

    IPTV, where television is distributed over the Internet Protocol in a single operator network, has become popular and widespread. Many telecom and broadband companies have become TV providers and distribute TV channels using multicast over their backbone networks. IPTV also means an evolution to time-shifted television where viewers now often can choose to watch the programs at any time. However, distributing individual TV streams to each viewer requires a lot of bandwidth and is a big challenge for TV operators. In this paper we present an empirical IPTV workload model, simulate IPTV distribution with time-shift, and show that local caching can limit the bandwidth requirements significantly.

  • 291.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Simulation of IPTV caching strategies2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    IPTV, where television is distributed over the Internet Protocol in a single operator network, has become popular and widespread. Many telecom and broadband companies have become TV providers and distribute TV channels using multicast over their backbone networks. IPTV also means an evolution to time-shifted television where viewers now often can choose to watch the programs at any time. However, distributing individual TV streams to each viewer requires a lot of bandwidth and is a big challenge for TV operators. In this paper we present an empirical IPTV workload model, simulate IPTV distribution with time-shift, and show that local caching can limit the bandwidth requirements significantly.

  • 292.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Gunnar, Anders
    RISE., Swedish ICT, SICS.
    Traffic engineering in ambient networks: challenges and approaches2004Ingår i: Swedish National Computer Networking Workshop, 2004, 1Konferensbidrag (Refereegranskat)
    Abstract [en]

    The focus of this paper is on traffic engineering in ambient networks. We describe and categorize different alternatives for making the routing more adaptive to the current traffic situation and discuss the challenges that ambient networks pose on traffic engineering methods. One of the main objectives of traffic engineering is to avoid congestion by controlling and optimising the routing function, or in short, to put the traffic where the capacity is. The main challenge for traffic engineering in ambient networks is to cope with the dynamics of both topology and traffic demands. Mechanisms are needed that can handle traffic load dynamics in scenarios with sudden changes in traffic demand and dynamically distribute traffic to benefit from available resources. Trade-offs between optimality, stability and signaling overhead that are important for traffic engineering methods in the fixed Internet becomes even more critical in a dynamic ambient environment.

  • 293.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Hagsand, Olof
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    TCP over High Speed Variable Capacity Links: A Simulation Study for Bandwidth Allocation2002Konferensbidrag (Refereegranskat)
  • 294.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Kreuger, Per
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    A case for resource management in IPTV distribution2008Konferensbidrag (Refereegranskat)
  • 295.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Kreuger, Per
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Resource Management for IPTV distribution2009Ingår i: ERCIM News, Vol. 77Artikel i tidskrift (Övrigt vetenskapligt)
  • 296.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    DTMsim - DTM channel simulation in ns2001Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Dynamic Transfer Mode (DTM) is a ring based MAN technology that provides a channel abstraction with a dynamically adjustable capacity. TCP is a reliable end to end transport protocol capable of adjusting its rate. The primary goal of this work is investigate the coupling of dynamically allocating bandwidth to TCP flows with the affect this has on the congestion control mechanism of TCP. In particular we wanted to find scenerios where this scheme does not work, where either all the link capacity is allocated to TCP or congestion collapse occurs and no capacity is allocated to TCP. We have created a simulation environment using ns-2 to investigate TCP over networks which have a variable capacity link. We begin with a single TCP Tahoe flow over a fixed bandwidth link and progressively add more complexity to understand the behaviour of dynamically adjusting link capacity to TCP and vice versa.

  • 297.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science, Kista, Sweden.
    Nordmark, Mattias
    TeliaSonera AB, Stockholm, Sweden .
    Program popularity and viewer behaviour in a large TV-on-Demand system2012Ingår i: IMC '12 Proceedings of the 2012 ACM conference on Internet measurement conference, New York: ACM , 2012, s. 199-210Konferensbidrag (Refereegranskat)
    Abstract [en]

    Today increasingly large volumes of TV and video are distributed over IP-networks and over the Internet. It is therefore essential for traffic and cache management to understand TV program popularity and access patterns in real networks.

    In this paper we study access patterns in a large TV-on-Demand system over four months. We study user behaviour and program popularity and its impact on caching. The demand varies a lot in daily and weekly cycles. There are large peaks in demand, especially on Friday and Saturday evenings, that need to be handled.

    We see that the cacheability, the share of requests that are not first-time requests, is very high. Furthermore, there is a small set of programs that account for a large fraction of the requests. We also find that the share of requests for the top most popular programs grows during prime time, and the change rate among them decreases. This is important for caching. The cache hit ratio increases during prime time when the demand is the highest, and aching makes the biggest difference when it matters most.

    We also study the popularity (in terms of number of requests and rank) of individual programs and how that changes over time. Also, we see that the type of programs offered determines what the access pattern will look like.

  • 298.
    Abrahamsson, Henrik
    et al.
    RISE., Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Nordmark, Mattias
    Program Popularity and Viewer Behaviour in a Large TV-on-Demand System2012Konferensbidrag (Refereegranskat)
  • 299.
    Abrahamsson, Jimmy
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Nätverksoptimering: Bästa möjliga tillgänglighet till lägsta möjliga länkkostnad2012Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna uppsats behandlar nätverksoptimering, med fokus på att få fram den bästa möjliga tillgängligheten till lägsta möjliga kostnad, i form av länkar. I studien tas en teoretiskt grundad hypotes om en metod fram för att lösa detta problemet. Samt genomförs ett test där metoden appliceras på ett studieobjekt för att bekräfta huruvida metoden verkar fungerar eller inte.

    Resultatet blir slutligen en metod som genom att analysera tillgängligheten, länk redundansen samt beräkna antal oberoende vägar mellan noder i ett nätverk. Kan genom att jämföra resultat från före en förändring med resultat från efter en förändring lyfta fram de förändringar som medför förbättringar. Varpå ett nätverk kan optimeras till bästa möjliga tillgänglighet till lägsta möjliga kostnad, i form av länkar.

  • 300.
    Abrahamsson, Johan
    et al.
    Umeå universitet, Samhällsvetenskaplig fakultet, Informatik.
    Sjöberg, Robin
    Umeå universitet, Samhällsvetenskaplig fakultet, Informatik.
    E-tjänstutveckling ur ett medborgarperspektiv: Att skapa beslutsunderlag baserat på medborgarärendens lämplighet för olika kommunikationskanaler2009Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Citizens’ interaction with governments is an area with unique implications for channel management. Governments need to take the citizens perspective into further consideration in order to be successful in delivering high-quality e-services. This paper aims to determine if a categorization of citizen-initiated contacts from a citizen-centric perspective can be a valuable basis for decisions regarding e-service development. The study consisted of three steps. The first step was an examination of the existing related literature, which resulted in the uncovering of the most important aspects of citizens channel choice. The second step consisted of an elaboration of a classification based on perceived task characteristics and a subsequent matching of the categories to desirable channel characteristics. The third and final step consisted of an application of the proposed categorization on a content management system containing all citizen-initiated contacts in a Swedish municipality. The application indicated that the proposed categorization could possibly be used to guide investments in e-services towards a channel-appropriate direction.

3456789 251 - 300 av 50918
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf