Digitala Vetenskapliga Arkivet

Change search
Refine search result
57585960616263 2951 - 3000 of 6263
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 2951.
    Kalavri, Vasiliki
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Vlassov, Vladimir
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Brand, Per
    Swedish Institute of Computer Science (SICS), Kista, Sweden.
    PonIC: Using Stratosphere to Speed Up Pig Analytics2013In: Euro-Par 2013 Parallel Processing: 19th International Conference, Aachen, Germany, August 26-30, 2013. Proceedings, Springer Berlin/Heidelberg, 2013, p. 279-290Conference paper (Refereed)
    Abstract [en]

    Pig, a high-level dataflow system built on top of Hadoop MapReduce, has greatly facilitated the implementation of data-intensive applications. Pig successfully manages to conceal Hadoop’s one input and two-stage inflexible pipeline limitations, by translating scripts into MapReduce jobs. However, these limitations are still present in the backend, often resulting in inefficient execution.Stratosphere, a data-parallel computing framework consisting of PACT, an extension to the MapReduce programming model and the Nephele execution engine, overcomes several limitations of Hadoop MapReduce. In this paper, we argue that Pig can highly benefit from using Stratosphere as the backend system and gain performance, without any loss of expressiveness.We have ported Pig on top of Stratosphere and we present a process for translating Pig Latin scripts into PACT programs. Our evaluation shows that Pig Latin scripts can execute on our prototype up to 8 times faster for a certain class of applications.

  • 2952.
    Kalezić, Đorđe
    Mälardalen University, School of Innovation, Design and Engineering.
    Safety-Guaranteed Mission Planner for Autonomous Vehicles2020Independent thesis Advanced level (degree of Master (One Year)), 40 credits / 60 HE creditsStudent thesis
    Abstract [en]

    Driverless vehicles are becoming more and more popular in the area of construction equipment as they promise to ensure safety and industrial productivity by iteratively and automatically completing repetitive tasks. These vehicles are always travelling and working in an environment full of uncertainties, such as unforeseen static obstacles. In this thesis, our goal is to develop a method for correctness-guaranteed mission-plan synthesis for autonomous vehicles that meet specified requirements and apply the path-finding algorithm, i.e., Theta*, and a model-checking technique to ensure the correctness of the mission plan. The proposed approach is implemented in a tool called TAMAA (Timed-Automata-Based Planner for Multiple Autonomous Agents), which facilitates the use of formal modelling and verification techniques for mission-plan synthesis by a means of a user-friendly GUI. The tool is evaluated in various scenarios to demonstrate that it is able to synthesize mission plans that satisfy different kinds of requirements.

    Download (pdf)
    Safety-Guaranteed Mission Planner for Autonomous Vehicles
  • 2953.
    Kalia, Nidhi Rani
    et al.
    Halmstad University, School of Information Technology.
    Bagepalli Ashwathanarayana, Sachin Bharadwaj
    Halmstad University, School of Information Technology.
    Vehicle Usage Modelling Under Different Contexts2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Modern vehicles nowadays are equipped with highly sensitive sensors which continuously log in the information when the vehicle is in motion. These vehicles also deal with some performance issues like more fuel consumption, breakdown, or failure, etc. The information logged in by the sensors can be useful to analyze and evaluate these performance issues.  As vehicles are there in the market and are used in multiple places. These vehicles can perform differently based on the way they are operated and driven and the usage of a vehicle varies from time to time. Moreover, the European Accident Research and Safety Report from Volvo Organization describes the factors responsible for road fatalities and accidents. It explains that 90\% of road fatalities are caused by the style of the vehicle being driven and 30\% is caused by the external weather and environmental factor. Therefore, in this work, vehicle usage modeling is done based on time to determine the different usage styles of a vehicle and how they can affect a vehicle's performance. The proposed framework is divided into four separate modules namely: Data pre\textendash processing, Data segmentation, Unsupervised machine learning, and Pattern Analysis. Mainly, ensemble clustering methods are used to extract the pattern of the vehicle usage style and vehicle performance in different seasons using truck logged vehicle data (LVD). From the results, we could build a strong correlation between the vehicle usage style and the vehicle performance that would require further investigation.

    Download full text (pdf)
    fulltext
  • 2954.
    Kalidindi, Sai Sushanth Varma
    et al.
    Örebro University, School of Science and Technology.
    Banaee, Hadi
    Örebro University, School of Science and Technology.
    Loutfi, Amy
    Örebro University, School of Science and Technology.
    Transformers and Contextual Information in Temperature Prediction of Residential Buildings for Improved Energy Consumption2022Conference paper (Refereed)
    Abstract [en]

    Energy optimization plays a vital role in decreasing the carbon footprint of residential buildings. In this paper, we present a prediction model of indoor temperature in residential buildings in three different case studies in different towns in Sweden. To predict the indoor temperature accurately, a dataset based on several years of data collection (up to 7 years) has been used. This paper applies both the traditional LSTM model as well as the more recent transformer model. The latter has been used because of its ability to perform a mechanism of self-attention that shows particular promise in multivariate sensor data. In addition to these algorithms, the data set is also modified based on contextual information and compared against an approach where no contextual information is used. Contextual information in this case takes into account the physical location of specific apartment units within the full residence and builds individual models based on the location of the unit. The results demonstrate that transformers are better suited for task of prediction, and that transformers combined with contextual information, provide a suitable approach for energy consumption prediction. 

    Download full text (pdf)
    Transformers and Contextual Information in Temperature Prediction of Residential Buildings for Improved Energy Consumption
  • 2955.
    Kaligotla, Veera Venkata Sai Kashyap
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Sadhu, Susanthika
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Improving The Accuracy Of Plant Leaf Disease Detection And Classification In Images Of Plant Leaves:: By Exploring Various Techniques with the MobileNetV2 Model2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the most recent years, many deep learning models have been used to identify and classify diseases of plant leaves by inputting plant leaf images as input to the model. However, there is still a gap in research on how to improve the accuracy of the deep learning models of plant leaf diseases. This thesis is about investigating various techniques for improving the MobileNetV2 model's accuracy for plant disease detection in leaves and classification. These techniques involved adjusting the learning rate, adding additional layers, and various data-augmented operations. The results of this thesis have shown that these techniques can significantly improve the accuracy of the model, and the best results can be achieved by using random rotation and crop data augmentation. After adding random rotation and crop data augmentation to the model, it achieved an accuracy of 94%, a precision of 91%, a recall of 96%, and an F1-score of 95%. This shows that the proposed techniques can be used to improve the accuracy of plant leaf disease detection and classification models, which can help farmers identify and treat plant diseases.

    Download full text (pdf)
    Improving the Accuracy of Plant Leaf Disease Detection and Classification in Images of Plant Leaves: By Exploring Various Techniques with the MobileNetV2 Model
  • 2956.
    Kalinina, Maria
    et al.
    Dept. of Computer and Systems Sciences, Stockholm University.
    Larsson, Aron
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    Olsson, Leif
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    Easy-Interactive Ordering of the Pareto Optimal Set with Imprecise Weights2013In: World Academy of Science, Engineering and Technology: An International Journal of Science, Engineering and Technology, ISSN 2010-376X, no 76, p. 643-648Article in journal (Refereed)
    Abstract [en]

    In the multi objective optimization, in the case when generated set of Pareto optimal solutions is large, occurs the problem to select of the best solution from this set. In this paper, is suggested a method to order of Pareto set. Ordering the Pareto optimal set carried out in conformity with the introduced distance function between each solution and selected reference point, where the reference point may be adjusted to represent the preferences of a decision making agent. Preference information about objective weights from a decision maker may be expressed imprecisely. The developed elicitation procedure provides an opportunity to obtain surrogate numerical weights for the objectives, and thus, to manage impreciseness of preference. The proposed method is a scalable to many objectives and can be used independently or as complementary to the various visualization techniques in the multidimensional case.

  • 2957.
    Kalinina, Maria
    et al.
    Dept. of Computer and Systems Sciences, Stockholm University.
    Olsson, Leif
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    Larsson, Aron
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information and Communication systems.
    A Multi Objective Chance Constrained Programming Model for Intermodal Logistics with Uncertain Time2013In: International Journal of Computer Science Issues, ISSN 1694-0784, E-ISSN 1694-0814, Vol. 10, no 6, p. 35-44Article in journal (Refereed)
    Abstract [en]

    This paper presents a multi objective chance constrained programming model for matching of goods and transports in an intermodal transport chain under uncertain delivery time. The objectives in the proposed model are cost, emission, and transport time, where time is considered as an uncertain parameter. An approach to solve the model is proposed, and this approach has been implemented in a web-based system for transport matching in order to provide clients with alternative transport routes in a large system of possible transport solutions. A case study of a Swedish shipping company is analyzed, and the results are presented through comparisons of results from deterministic and stochastic models. The suggested model can help a decision maker to select transport alternative compromising between time, cost, emission, and with respect to uncertainty in transport time parameters.

    Download full text (pdf)
    fulltext
  • 2958.
    Kallin Westin, Lena
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Missing data and the preprocessing perceptron2004Report (Other academic)
    Abstract [en]

    In this paper, several ways to handle missing data, e.g. removing cases, mean imputation, and multiple imputation, are described and discussed. The Pima-Indians-Diabetes data set is used as a case study. This particular data set is interesting to use since it has not been obvious to all users that it actually contains a substantial amount of missing data. The data set is described in detail and the methods for coping with missing data mentioned in the text is applied on the data set.

    The preprocessing perceptron is used to train decision support systems on the data sets. A sketch of a way to impute missing data using the preprocessing perceptron is also proposed and discussed. The accuracy of the trained decision support systems, at the optimal efficiency point, lied in the interval 76-82% for the different methods. The highest values were obtained when all missing data cases were removed both from the test and the training set. This is, however, not a good way to handle missing data since the resulting decision support system is biased. Furthermore it will not be able to handle missing data when used on real data in the future. The results of the remaining methods were surprisingly similar, a reason for this might be that the data set used is rather large. Differences between methods would probably be larger in a smaller data set with larger amount of missing data.

  • 2959.
    Kallsäby, Mattias
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Modular MiniTest Tester2017Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    RealTest is a company located in V¨aster˚as, Sweden, that works with embedded systems and test systems. RealTest had a need for a new test system for one of their products, the MiniTester (MT) mk2 that is used to test Drive Control Units (DCUs) used on trains. The problems that had to be solved were, finding out the most common faults of the product, make the test system modifiable and scalable, have a software running on a Windows PC with a working GUI and test logic and design a hardware component measurement unit to generate and measure signals.

    The system described in this report is the software parts of the developed MiniTest tester that runs on a Windows PC as well as the hardware design. The programming of the measurement unit and the testing of that unit is not covered by this report.

    The hardware consist of custom PCBs and Arduino boards. The Windows PC programs implemented a GUI and test logic according to the goals with a few exceptions left for further work. These programs have been evaluated by emulating the hardware. The system is shown to be modifiable in practice by implementation and scalable in theory

    Download full text (pdf)
    fulltext
  • 2960.
    Kalo, Alexander
    Umeå University, Faculty of Science and Technology, Department of Applied Physics and Electronics.
    Hantering av mät-filer från Wi-Fi fjärrkontroll2021Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A measuring system Striton has been developed at the department of biomedicalengineering, University Hospital of Umeå, for motion analysis using motion sensors whichattaches to the patient’s lower body to assess the risk for potential neurological andmusculoskeletal damage. The measuring system is comprised of two motion sensor unitsand a remote control where data is gathered based on step height, step width, theorientation of the calves and step frequency. The motion sensor units which attach to thecalves are comprised of a MCU with a built in Wi-Fi module, a IMU and and time-of-flightsensors. Data is transferred through Wi-Fi and stored on a SD-card as CSV-files on theremote control which is comprised of a Raspberry Pi Zero WH running a Linux operatingsystem (Raspbian). The remote control also has the functions to initiate and complete ameasurement as well as mark an event. The extraction of data from the remote control toanother unit for analysis occurs through SSH and SFTP using third-party programs whichmay require technical knowledge. A unique software was designed specifically for Stritonfor the operating system Windows 10 using Visual Studio (2019) which provides thefunctions to connect to a predefined Wi-Fi access point as well as automatically reconnectto previously connected access point at shutdown, connect through SFTP, list the savedfiles on the remote control, perform file operations, synchronize the date and time on theremote control as well as change settings in the software which is saved locally in a settingsfile. The user interface is minimalistic with the intention to reduce complexity and timerequirement to extract the data from the measuring system Striton.

    Download full text (pdf)
    Management of measurement files from Wi-Fi remote control
  • 2961. Kalogiannidou, Evmorfia
    et al.
    Peters, Christopher E.
    Kungliga tekniska högskolan.
    Facial hair and trustworthiness in virtual faces: towards an evaluation study2015In: Proceedings of SIGRAD 2015: June 1st and 2nd, Stockholm, Sweden / [ed] Christopher E. Peters, Lars Kjelldahl, Stockholm: Svenska föreningen för grafisk databehandling , 2015, p. 59-60Conference paper (Refereed)
    Abstract [en]

    In this paper, we present a work-in-progress towards a perceptual study concerning male and female first impressions of male virtual faces as variations are made in terms of their facial hair (beard) length, colour and the camera viewing angle. Previous studies involving real human faces suggest that these types of variations may impact impressions of trustworthiness and related qualities, such as credibility. This research investigates similar issues, but in the domain of virtual characters, with a view to exploring issues of trustworthiness based on the appearance of virtual faces. This is of great significance to the design of interactive computational social systems.

  • 2962.
    Kalogiannis, Konstantinos
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Khodaei, Mohammad
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Bayaa, Weaam Mostafa Nemr Mohamed
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Papadimitratos, Panagiotis
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Attack Impact and Misbehavior Detection in Vehicular Platoons2022In: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), New York, USA: ACM Digital Library, 2022, p. 45-59Conference paper (Refereed)
    Abstract [en]

    Cooperative Adaptive Cruise Control (CACC), a promising Vehicular Ad-hoc Network (VANET) application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on messages by other vehicles, to keep appropriate distances for safety. Towards deploying secure CACC, several proposals in academia and standardization leave significant questions unanswered. Thwarting adversaries is hard: cryptographic protection ensures access control (authentication and authorization) but falsified kinematic information by faulty insiders (platoon members with credentials, even the platoon leader) can cause platoon instability or vehicle crashes. Filtering out such adversarial data is challenging (computational cost and high false positive rates) but, most important, state-of-the-art misbehavior detection algorithms completely fail during platoon maneuvering. In this paper, we systematically investigate how and to what extent controllers for existing platooning applications are vulnerable, mounting a gamut of attacks, ranging from falsification attacks to jamming and collusion;  including two novel attacks during maneuvering. We show how the existing middle-join and leave processes are vulnerable to falsification or 'privilege escalation' attacks. We mitigate such vulnerabilities and enable vehicles joining and exiting from any position (middle-join and middle-exit). We propose a misbehavior detection system that achieves an F1 score of ≈87 on identifying attacks throughout the lifetime of the platoon formation, including maneuvers. Our cyberphysical simulation framework can be extended to assess any other driving automation functionality in the presence of attackers.

    Download full text (pdf)
    attack_impact_and_detection_in_platooning
  • 2963.
    Kameoka, Masahiro
    et al.
    Tokyo University of Science.
    Furukawa, Toshihiro
    Tokyo University of Science.
    Hayashi, Masaki
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Arts, Department of Game Design.
    発見的手法によるWebニュースからのクイズ自動生成の試み2015In: Proceedings of Art and Science Forum 2015, 2015Conference paper (Other academic)
    Abstract [en]

    In this study, as one of the content production technology aiming at re-use of Web content, we attemp the automatic generation of quiz content from Web News Source. Whereas the related researches mainly use analytical methods, we use a heuristic method to simulate the way of thinking  a person makes a quiz from an original sentence stating the knowledge of the quiz. We examined the automatic quiz generation by our heuristic method and discussed the result.

  • 2964.
    Kameoka, Masahiro
    et al.
    Tokyo University of Science.
    Hayashi, Masaki
    Gotland University, School of Game Design, Technology and Learning Processes.
    Furukawa, Toshihiro
    Tokyo University of Science.
    Improvement of Automatic BBS Visualization in T2V: Animation considering dialogue structure2013Conference paper (Other academic)
    Abstract [en]

    T2V(Text-to-Vision) a technology which is capable of automatic animated movie generation to assist individuals who do not have special knowledge about animation production. This paper shows improvement of the function that animates BBS (Bulletin Board System) with this technology. T2V has a package (2ch convertor) that is capable of animating “2channel” (largest BBS in Japan). The present 2ch convertor, however, does not support dialogue situation based on quotation marks. Therefore, it causes a problem that it cannot produce animation with dialogue. In this paper we propose a method of animation production regarding the conversation structure in BBS to create more natural expression in the animation.

    Download full text (pdf)
    BBSVisualization
  • 2965.
    Kamil, Jaffar
    et al.
    Halmstad University, School of Information Technology.
    Amer, Mohamed
    Halmstad University, School of Information Technology.
    An Integrated Room Booking and Access Control System for Public Spaces2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. This bachelor thesis introduces a proof-of-concept for a cohesive room booking and access control system to address these issues. The proposed solution encompasses two mobile applications, one as the room reservation platform and the other as the access control mechanism. By integrating the management of bookings and access control, this proof-of-concept aims to overcome the prevalent shortcomings in existing systems. Halmstad University's IT department was consulted during the requirement definition phase to ensure a comprehensive understanding of the common problems, their underlying causes, and possible solutions. The proposed system utilizes common technologies such as NodeJS, Android Studio, and PostgreSQL. Additionally, Mobile BankID is integrated as a unique feature for secure user authentication, providing a trusted and widely-accepted method to verify users' identities. The final results were tested in a simulated environment and indicate that the developed system satisfies the initial requirements, addressing the problems of double bookings and unauthorized access identified during the consultation with the IT department.

    Download full text (pdf)
    fulltext
  • 2966.
    Kamma, Aditya
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    An Approach to Language Modelling for Intelligent Document Retrieval System2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 2967.
    Kampik, Timotheus
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Empathic agents: A hybrid normative/consequentialistic approach2019In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, ACM Digital Library, 2019, p. 2423-2425Conference paper (Refereed)
    Abstract [en]

    Complex information systems operate with increasing degrees of autonomy. Consequently, such systems should not only optimize for simple metrics (like clicks and views) that reflect the system provider's preferences but also consider norms or rules, as well as the preferences of other agents that are affected by the systems' actions. As a means to achieve such behavior, we propose the design and development of empathic agents that use a mixed rule/utility-based approach when deciding on how to act, considering both their own and others' utility functions. The agents make use of formal argumentation to reach an agreement on how to act in case of inconsistent beliefs. A promising domain for applying our empathic agents is recommender systems.

  • 2968.
    Kampik, Timotheus
    et al.
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Nieves, Juan Carlos
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Toward consistent agreement approximation in abstract argumentation and beyond2021In: Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS / [ed] U. Endriss, A. Nowé, F. Dignum, A. Lomuscio, International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS) , 2021, p. 1551-1553Conference paper (Refereed)
    Abstract [en]

    In cooperative human decision-making, agreements are often not total; a partial degree of agreement is sufficient to commit to a decision and move on, as long as one is somewhat confident that the involved parties are likely to stand by their commitment in the future, given no drastic unexpected changes. In this work, we introduce models that allow autonomous agents to reach such agreements, using abstract argumentation as the underlying model.

  • 2969.
    Kamrani, Farzad
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Simulation-based Optimization and Decision Making with Imperfect Information2011Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The purpose of this work is to provide simulation-based support for making optimal (or near-optimal) decisions in situations where decision makers are faced with imperfect information. We develop several novel techniques and algorithms for simulation-based optimization and decision support and apply them to two categories of problems: (i) Unmanned Aerial Vehicle (UAV) path planning in search operations, and; (ii) optimization of business process models. Common features of these two problems for which analytical approaches are not available, are the presence of imperfect information and their inherent complexity.

    In the UAV path planning problem, the objective is to define the path of a UAV searching for a target on a known road network. It is assumed that the target is moving toward a goal and we have some uncertain information about the start point of the target, its velocity, and the final goal of the target. The target does not take evasive action to avoid being detected. The UAV is equipped with a sensor, which may detect the target once it is in the sensor’s scope. Nevertheless, the detection process is uncertain and the sensor is subject to both false-positive and false-negative errors. We propose three different solutions, two of which are simulation-based. The most promising solution is an on-line simulation-based method that estimates the location of the target by using a Sequential Monte Carlo (SMC) method. During the entire mission, different UAV paths are simulated and the one is chosen that most reduces the uncertainty about the location of the target.

    In the optimization of the business process models, several different but related problems are addressed: (i) we define a measure of performance for a business process model based on the value added by agents (employees) to the process; (ii) we use this model for optimization of the business process models. Different types of processes are distinguished and methods for finding the optimal or near-optimal solutions are provided; (iii) we propose a model for estimating the performance of collaborative agents. This model is used to solve a class of Assignment Problems (AP), where tasks are assigned to collaborative agents; (iv) we propose a model for team activity and the performance of a team of agents. We introduce different collaboration strategies between agents and a negotiation algorithm for resolving conflicts between agents. We compare the effect of different strategies on the output of the team.

    Most of the studied cases are complex problems for which no analytical solution is available. Simulation methods are successfully applied to these problems. They are shown to be more general than analytical models for handling uncertainty since they usually have fewer assumptions and impose no restrictions on the probability distributions involved. Our investigation confirms that simulation is a powerful tool for providing decision-making support. Moreover, our proposed algorithms and methods in the accompanying articles contribute to providing support for making optimal and in some cases near-optimal decisions: (i) our tests of the UAV simulation-based search methods on a simulator show that the on-line simulation method has generally a high performance and detects the target in a reasonable time. The performance of this method was compared with the detection time when the UAV had the exact information about the initial location of the target, its velocity, and its path (minimum detection time). This comparison indicated that the online simulation method in many cases achieved a near-optimal performance in the studied scenario; (ii) our business process optimization framework combines simulation with the Hungarian method and finds the optimal solution for all cases where the assignment of tasks does not change the workflow of the process. For the most general cases, where the assignment of tasks may change the workflow, we propose an algorithm that finds near-optimal solutions. In this algorithm, simulation, which deals with the uncertainty in the process, is combined with the Hungarian method and hill-climbing heuristics. In the study of assigning tasks to collaborative agents we suggest a Genetic Algorithm (GA) that finds near-optimal solutions with a high degree of accuracy, stability, scalability and robustness. While investigating the effect of different agent strategies on the output of a team, we find that the output of a team is near-optimal, when agents choose a collaboration strategy that follows the principle of least effort (Zipf’s law) and use our suggested algorithm for negotiation and resolving conflicts. 

    Download full text (pdf)
    fulltext
  • 2970.
    Kamrani, Farzad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Ayani, Rassul
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    UAV Path Planning in Search Operations2009In: Aerial Vehicles / [ed] Thanh Mung Lam, InTech , 2009, p. 331-344Chapter in book (Other academic)
    Download full text (pdf)
    fulltext
  • 2971.
    Kamrani, Farzad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Ayani, Rassul
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Karimson, Anvar
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Optimizing a Business Process Model by Using Simulation2010In: 2010 IEEE Workshop on Principles of Advanced and Distributed Simulation, IEEE Press, 2010, p. 1-8Conference paper (Refereed)
    Abstract [en]

    In this paper we present the problem of optimizing a business process model with the objective of finding the most beneficial assignment of tasks to agents, without modifying the structure of the process itself. The task assignment problem for four types of processes are distinguished and algorithms for finding optimal solutions to them are presented: 1) a business process with a predetermined workflow, for which the optimal solution is conveniently found using the well-known Hungarian algorithm. 2) a Markovian process, for which we present an analytical method that reduces it to the first type. 3) a nonMarkovian process, for which we employ a simulation method to obtain the optimal solution. 4) the most general case, i.e. a nonMarkovian process containing critical tasks. In such processes, depending on the agents that perform critical tasks the workflow of the process may change. We introduce two algorithms for this type of processes. One that finds the optimal solution, but is feasible only when the number of critical tasks is few. The second algorithm is even applicable to large number of critical tasks but provides a near-optimal solution. In the second algorithm a hill-climbing heuristic method is combined with Hungarian algorithm and simulation to find an overall near-optimal solution for assignments of tasks to agents. The results of a series of tests that demonstrate the feasibility of the algorithms are included.

    Download full text (pdf)
    Optimizing a Business Process Model by Using Simulation
  • 2972.
    Kamrani, Farzad
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Ayani, Rassul
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Moradi, Farshad
    Swedish Defense Research Agency (FOI).
    A framework for simulation-based optimization of business process models2012In: Simulation (San Diego, Calif.), ISSN 0037-5497, E-ISSN 1741-3133, Vol. 88, no 7, p. 852-869Article in journal (Refereed)
    Abstract [en]

    The Assignment Problem is a classical problem in the field of combinatorial optimization, having a wide range of applications in a variety of contexts. In general terms, the Assignment Problem consists of determining the best assignment of tasks to agents according to a predefined objective function. Different variants of the Assignment Problem have been extensively investigated in the literature in the last 50 years. In this work, we introduce and analyze the problem of optimizing a business process model with the objective of finding the most beneficial assignment of tasks to agents. Despite similarities, this problem is distinguished from the traditional Assignment Problem in that we consider tasks to be part of a business process model, being interconnected according to defined rules and constraints. In other words, assigning a business process to agents is a more complex form of the Assignment Problem. Two main categories of business processes, assignment-independent and assignment-dependent, are distinguished. In the first category, different assignments of tasks to agents do not affect the flow of the business process, while processes in the second category contain critical tasks that may change the workflow, depending on who performs them. In each category several types of processes are studied. Algorithms for finding optimal and near-optimal solutions to these categories are presented. For the first category, depending on the type of process, the Hungarian algorithm is combined with either the analytical method or simulation to provide an optimal solution. For the second category, we introduce two algorithms. The first one finds an optimal solution, but is feasible only when the number of critical tasks is small. The second algorithm is applicable to large number of critical tasks, but provides a near-optimal solution. In the second algorithm a hill-climbing heuristic method is combined with the Hungarian algorithm and simulation to find an overall near-optimal solution. A series of tests is conducted which demonstrates that the proposed algorithms efficiently find optimal solutions for assignment-independent and near-optimal solutions for assignment-dependent processes.

  • 2973.
    Kamrani, Farzad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Ayani, Rassul
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Moradi, Farshad
    Swedish Defense Research Agency (FOI).
    A Model for Estimating the Performance of a Team of Agents2011In: Proceedings of the 2011 IEEE International Conference on Systems, Man and Cybernetics (SMC 2011), IEEE Press, 2011, p. 2393-2400Conference paper (Refereed)
    Abstract [en]

    In this paper, we present a model for estimatingthe performance of a team of agents, based on the capabilities of the agents and importance of these capabilities for the task. Performance of a team is assumed to be the sum of contributions of individual agents and contributions of subgroups built in the team. We introduce a set of notations, which is required for discussing the suggested models. We also propose a model to estimate the benefit of an agent from interaction with other agents in a subgroup. Based on this benefit model and different (common) strategies, the agents devise plans in which they formulate to what extent they are willing to cooperate with other agents. A negotiation algorithm that resolves the conflicts between the desires of the agents is presented. The effect of this algorithm and different strategies are tested on a set of generated data. The test results show that the performance of a team when the agents choose a cooperation strategy that follows the principle of least effort (Zipf’s law) is higher than teams with other cooperation strategies.

    Download full text (pdf)
    A Model for Estimating the Performance of a Team of Agents
  • 2974.
    Kanani, Saleh
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A method to evaluate database management systems for Big Data: focus on spatial data2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Big data of type spatial is growing exponentially with the highest rate due to extensive growth in usage of sensors, IoT and mobile devices’ spatial data generation, therefore maintaining, processing and using such data efficiently, effectively with high performance has become one of the top priorities for Database management system providers, hence spatial database features and datatypes have become serious criteria in evaluating database management systems that are supposed to work as the back-end for spatial applications and services.

    With exponential growth of data and introducing of new types of data, “Big Data” has become strongly focused area that has gained the attention of different sectors e.g. academia, industries and governments to other organizations and studies.

    The rising trend in high resolution and large-scale geographical information systems have resulted in more companies providing location-based applications and services, therefore finding a proper database management system solution that can support spatial big data features, with multi-model big data support that is reliable and affordable has become a business need for many companies.

    Concerning the fact that choosing proper solution for any software project can be crucial due to the total cost and desired functionalities that any product could possibly bring into the solution. Migration is also a very complicated and costly procedure that many companies should avoid, which justifies the criticality of choosing the right solution based on the specific needs of any organization.

    Companies providing spatial applications and services are growing with the common concern of providing successful solutions and robust services. One of the most significant elements that ensures services’ and hence the providers’ reputation and positive depiction is services’ high availability.

    The possible future work for the thesis could be to develop the framework into a decision support solution for IT businesses with emphasize on spatial features. Another possibility for the future works would be to evaluate the framework by testing the evaluation framework on many other different DBMSs.

    Download full text (pdf)
    fulltext
  • 2975. Kanduri, A.
    et al.
    Rahmani, Amir
    KTH, School of Information and Communication Technology (ICT), Industrial and Medical Electronics.
    Liljeberg, P.
    Tenhunen, Hannu
    KTH, School of Information and Communication Technology (ICT), Industrial and Medical Electronics.
    Predictable Application Mapping for Manycore Real-Time and Cyber-Physical Systems2015In: Proceedings - IEEE 9th International Symposium on Embedded Multicore/Manycore SoCs, MCSoC 2015, 2015, p. 135-142Conference paper (Refereed)
    Abstract [en]

    Cyber Physical Systems (CPS) are typically implemented on multicore platforms to handle computational pressure and performance requirements. Complex data flows in those applications cause contention among networked processors, resulting in unpredictable performance. In this work, we explore the impact of application mapping on network contention and predictability. A mapping algorithm focusing on minimizing the number of shared paths while not worsening the total path count is proposed. This algorithm is verified against other recent works over synthetic and realistic traffic patterns. The proposed algorithm considerably improved predictability with 0% shared paths and reasonable latency constraints compared to the other recently proposed algorithms.

  • 2976.
    Kane, Bridget
    et al.
    University of Dublin, Trinity College, Ireland.
    Luz, Saturnino
    University of Dublin, Trinity College, Ireland.
    Medical teamwork, collaboration and patient-centred care2015In: Journal of Behaviour and Information Technology, ISSN 0144-929X, Vol. 34, no 6, p. 543-547Article in journal (Other academic)
  • 2977.
    Kane, John
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    An Analysis of Newspaper and Social Media Responses to Sinn Féin's Internet Trolling Activities in a Post-Conflict Society2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Purpose

    Trolling has emerged as a significant threat to democracy, information integrity, and online freedom of expression, eroding public trust in democratic institutions and election processes. This paper explores the escalating prominence of trolling activities, particularly in the context of major events like the U.S. presidential election and the "Brexit" referendum. It highlights the extensive reach and influence of trolling on social media platforms, surpassing engagement with traditional news media. The study looks into the background of trolling in the post-conflict society of Northern Ireland. It explores the emergence of distinct trolling actors, referred to as 'Shinnerbots,' and their role in spreading disinformation and misinformation. The paper investigates the motivations behind these social media trolling accounts associated with specific political Irish republican ideologies, emphasizing the need for a deeper understanding of their prevalence and implications for post-conflict societies worldwide.

    Design/Methodology/Approach

    This research paper adopts a grounded theory approach to investigate the phenomenon of shinnerbot trolling in post-conflict Northern Ireland, aiming to develop a comprehensive understanding of its dynamics and characteristics. The study utilizes a multi-stage data collection process, involving a sample of 20 digital newspaper articles and 10,000 Twitter comments made by shinnerbots. Through grounded theory coding, recurring patterns and categories related to trolling are identified and analyzed. The findings contribute to a deeper understanding of the impact of internet trolling on political discourse and the role of media in shaping public opinion. Furthermore, the concept of saturation is discussed, indicating the point at which data collection and analysis can be concluded. The limitations of the study include sample size constraints, keyword limitations, and potential inaccuracies in sentiment analysis. The analysis of newspaper articles and Twitter comments will provide insights into the categories and narratives surrounding shinnerbot trolling activities, contributing to a better understanding of its implications on political discourse and media influence.

    Findings

    The grounded theory methodology reveal that shinnerbots have a significant impact on online discussions, spreading disinformation, stifling alternative viewpoints, and promoting an environment of bullying and abuse. These trolling activities have a potential effect on the political landscape and societal dynamics, impacting the integrity of information exchange on political discussions and creating a climate of fear and self-censorship by social media users for fear of retaliation. To address these issues, the study emphasizes the importance of raising awareness about shinnerbots' tactics and influence, fostering media literacy skills, and promoting respectful and civil engagement online within the Northern Ireland political landscape. It calls for robust measures to counter disinformation and online abuse while safeguarding freedom of speech and diversity of opinions within the post conflict society such as Northern Ireland. Building bridges between different political groups and fostering dialogue that respects differing perspectives which is crucial for reconciliation and understanding. Furthermore, the research proposes the development of a theoretical framework called "Disinformation Resilience Theory" to guide the understanding and response to disinformation campaigns in post-conflict societies like Northern Ireland. This theory advocates for a multi-faceted approach that integrates online media literacy, government regulatory measures, and trust restoration initiatives focused on the particular challenges of a post conflict society. It highlights the need to educate communities about disinformation tactics, enhance media literacy, improve content moderation on social media platforms, and rebuild public trust in media and information sources.

    Practical Implications

    The theorical framework can be used to guide the development and implementation of training programs or educational initiatives targeting social media users, journalists, and other stakeholders in post-conflict societies. Policy recommendations based on the study's findings can be disseminated to policymakers and relevant institutions to influence decision-making processes and guide the development of regulations or guidelines related to online political communication and the prevention of trolling behaviours. Collaboration between researchers, social media platforms, policymakers, and law enforcement agencies can be fostered to address the challenges posed by shinnerbot-like activities.

  • 2978.
    Kanestad, Linus
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Visual Information and Interaction.
    Preliminary study of image analysis and machine learning methods to detect cattle on pasture in images taken from DJI drones2022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Automation of tasks are progressing fast together with new improved technology. This together with increased availability of drones in various price-ranges has great potential for many automated computer vision tasks since drones are often equipped with high-tech cameras ofmany different kinds. The task of automated supervision is no more relevant than in the area of agriculture, where farmers are not only by law required to check on their livestock regularly but for their own benefit as well to carefully study their animal’s behaviour. This thesis explores the possibility of detecting cattle on different pastures using computer vision on images taken from drones by DJI. The project trains and evaluates two convolutional neural network models from Tensorflow object detection while discussing future research project of a potential live supervision system of cattle. This is done by comparing the two models and discussing external variables such as image acquisition distance to the cattle and its importance by using the two detection models as reference. This is developed further into arguments on how to acquire future data for a large-scale implementation of such a problem.

    Download full text (pdf)
    fulltext
  • 2979.
    Kang, Jiawen
    et al.
    Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
    Yu, Rong
    Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
    Huang, Xumin
    Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bogucka, Hanna
    Poznan University of Technology, Poznan, Poland.
    Gjessing, Stein
    Zhang, Yan
    University of Oslo, Oslo, Norway & Simula Research Laboratory, Fornebu, Norway.
    Location privacy attacks and defenses in cloud-enabled internet of vehicles2016In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 23, no 5, p. 52-59Article in journal (Refereed)
    Abstract [en]

    As one of the promising branches of the Internet of Things, the cloud-enabled Internet of Vehicles (CE-IoV) is envisioned to serve as an essential data sensing, exchanging, and processing platform with powerful computing and storage capabilities for future intelligent transportation systems. The CE-IoV shows great promise for various emerging applications. In order to ensure uninterrupted and high-quality services, a vehicle should move with its own VM via live VM migration to obtain real-time location-based services. However, the live VM migration may lead to unprecedented location privacy challenges. In this article, we study location privacy issues and defenses in CE-IoV. We first present two kinds of unexplored VM mapping attacks, and thus design a VM identifier replacement scheme and a pseudonym-changing synchronization scheme to protect location privacy. We carry out simulations to evaluate the performance of the proposed schemes. Numerical results show that the proposed schemes are effective and efficient with high quality of privacy. © 2016 IEEE.

  • 2980.
    Kangas, Fredrik
    et al.
    Linköping University, Department of Computer and Information Science.
    Wihlborg, Sebastian
    Linköping University, Department of Computer and Information Science.
    Design and implementation of a collaborative secure storage solution2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the modern enterprises it is common that support and maintenance of IT environments are outsourced to third parties. In this setting, unencrypted confidential data may pose a problem since administrators maintaining the outsourced system can access confidential information if stored unencrypted. This thesis work, performed at ELITS, presents a solution to this problem; a design of a collaborative storage system where all files at rest (i.e. stored on disk) and in transit remain encrypted is proposed.

    The design uses a hybrid encryption scheme to protect the encryption keys used. The keys can safely be stored in a centralized database as well as sent to the clients without risk of unauthorized parties gaining access to the stored data. The design was also implemented as a proof of concept in order to establish that it was possible to realize.

    Download full text (pdf)
    fulltext
  • 2981.
    Kanwar, John
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Smart cropping tools with help of machine learning2019Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Machine learning has been around for a long time, the applications range from a big variety of different subjects, everything from self driving cars to data mining. When a person takes a picture with its mobile phone it easily happens that the photo is a little bit crooked. It does also happen that people takes spontaneous photos with help of their phones, which can result in something irrelevant ending up in the corner of the image. This thesis combines machine learning with photo editing tools. It will explore the possibilities how machine learning can be used to automatically crop images in an aesthetically pleasing way and how machine learning can be used to create a portrait cropping tool. It will also go through how a straighten out function can be implemented with help of machine learning. At last, it is going to compare this tools with other software automatic cropping tools.

    Download full text (pdf)
    fulltext
  • 2982.
    Kanwar, John
    et al.
    RISE Computer Science.
    Finne, Niclas
    RISE Computer Science.
    Tsiftes, Nicolas
    RISE Computer Science.
    Eriksson, Joakim
    RISE Computer Science.
    Voigt, Thiemo
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. RISE Computer Science.
    He, Zhitao
    ASSA ABLOY.
    Åhlund, Christer
    Luleå University of Technology.
    Saguna, Saguna
    Luleå University of Technology.
    JamSense: Interference and Jamming Classification for Low-power Wireless Networks2021In: Proceedings of the 2021 13Th IFIP Wireless and Mobile Networking Conference (WMNC) / [ed] Leila Azouz Saidane, Mohamed Faten Zhani, Aris Leivadeas, Weverton Cordeiro, Eirini Eleni Tsiropoulou, Thi Mai Trang Nguyen, IEEE, 2021, p. 9-16Conference paper (Refereed)
    Abstract [en]

    Low-power wireless networks transmit at low output power and are hence susceptible to cross-technology interference. The latter may cause packet loss which may waste scarce energy resources by requiring the retransmission of packets. Jamming attacks are even more harmful than cross-technology interference in that they may totally prevent packet reception and hence disturb or even disrupt applications. Therefore, it is important to recognize such jamming attacks. In this paper, we present JamSense. JamSense extends SpeckSense, a system that is able to detect multiple sources of interference, with the ability to classify jamming attacks. As SpeckSense, JamSense runs on resource-constrained nodes. Our experimental evaluation on real hardware shows that JamSense is able to identify jamming attacks with high accuracy while not classifying Bluetooth or WiFi interference as jamming attacks.

    Download full text (pdf)
    fulltext
  • 2983.
    Kanza, Grace
    et al.
    University of Bergen, Norway.
    Babic, Ankica
    Linköping University, Department of Biomedical Engineering. Linköping University, The Institute of Technology. Univeristy of Bergen, Norway.
    Agile Development for Smart User Interfaces to Cancer Registries2015Conference paper (Refereed)
    Abstract [en]

    The paper studies different user interfaces developed for visualizing data mined from cancer registries. The motivation behind this research is a need to create more flexible and smart, easy to use interfaces that will assist users in utilizing and exploring clinical information. The design process combined Parallel and Iterative design process models together with Personal Kanban for managing the development process. The developed prototype provides users with a choice of several data visualization possibilities, depending on the user’s tasks and goals. A preliminary user interface was evaluated resulting in recommendations for further development. Heuristic evaluation with potential experts had scores on all the high scores on all the design dimensions: H1=visibility of system status; H2=match between the system and the real world; H3=user control and freedom; H4=consistency and standards; H5=error prevention; H6=recognition rather than recall; H7=flexibility and efficiency of use; H8=aesthetic and minimalist design; H9=help users recognize, diagnose, and recover from errors; and H10=help and documentation.

  • 2984. Kappos, I.
    et al.
    Kouveliotis Lysikatos, Iasonas
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electric Power and Energy Systems.
    Hatziargyriou, N.
    A Blockchain Platform for the Decentralized Operation of Active Distribution Networks2021In: 2021 IEEE Madrid PowerTech, PowerTech 2021 - Conference Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2021, article id 9494980Conference paper (Refereed)
    Abstract [en]

    Blockchain technologies and smart contracts are getting more attention for potential smart grids applications as they are able to decentralize the data management in a secure and transparent way. In this work, a smart contract deployed in a simulated Ethereum blockchain is used to coordinate the decentralized solution of the Economic Dispatch (ED) problem of Distributed Generation (DG) units. The distributed optimization problem is first formulated and solved using the Alternating Directional Method of Multipliers (ADMM) and then a smart contract plays the role of the decentralized coordinator and data aggregator. Results from the combined simulation of the method are provided through a variety of scenarios, that investigate the efficacy and practical applicability of the method. 

  • 2985.
    Kapur, Jyoti
    University of Borås, Faculty of Textiles, Engineering and Business.
    Engaging with Sense of Smell through Textile Interactions2019In: Distributed, Ambient and Pervasive Interactions: 7th International Conference, DAPI 2019 Held as Part of the 21st HCI International Conference / [ed] Norbert Streitz, Shin’ichi Konomi, Switzerland: Springer, 2019, p. 241-257Conference paper (Refereed)
    Abstract [en]

    This research paper discusses dimension of smell for designing spatial interactions through textiles. The focus in these design examples is combining the sense of touch to actuate the smells. Sense of touch is explored in terms of different tactile sensations that include pressing, rubbing and movement of the body. Through these tactile interactions smells embedded in the textile objects are released. The temporal textile expressions of smells open up for further investigations for designing spaces, as these design examples bring forward the olfactory expressions and proposes frameworks for future research in potential human-computer interactions through our everyday objects and surroundings. The proposal of textile interactions that engage sense of smell and create slow interactions with objects and situations from our daily lives opens up the opportunity to encourage more social interactions within the physical world. These interactions will include computational things, however, in a discreet manner, helping build deep bonds between human to human and human to environment.

    Download full text (pdf)
    fulltext
  • 2986. Karagiannidis, Savvas
    et al.
    Antaris, Stefanos
    Zigkolis, Christos
    Vakali, Athena
    Hydra: an open framework for virtual-fusion of recommendation filters2010Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 2987. Karakostas, Vasileios
    et al.
    Goumas, Georgios
    Bayuh Lakew, Ewnetu
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Elmroth, Erik
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Gerangelos, Stefanos
    Kolberg, Simon
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Nikas, Konstantinos
    Psomadakis, Stratos
    Siakavaras, Dimitrios
    Svärd, Petter
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Koziris, Nectarios
    Efficient Resource Management for Data Centers: The ACTiCLOUD Approach2018In: 2018 International conference on embedded computer systems: architectures, modeling, and simulation (SAMOS XVIII) / [ed] Mudge T., Pnevmatikatos D.N., Association for Computing Machinery (ACM), 2018, p. 244-246Conference paper (Refereed)
    Abstract [en]

    Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast resources efficiently. Resources are stranded and fragmented, limiting cloud applicability only to classes of applications that pose moderate resource demands. In addition, the need for reduced cost through consolidation introduces performance interference, as multiple VMs are co-located on the same nodes. To avoid such issues, current providers follow a rather conservative approach regarding resource management that leads to significant underutilization. ACTiCLOUD is a three-year Horizon 2020 project that aims at creating a novel cloud architecture that breaks existing scale-up and share-nothing barriers and enables the holistic management of physical resources, at both local and distributed cloud site levels. This extended abstract provides a brief overview of the resource management part of ACTiCLOUD, focusing on the design principles and the components.

  • 2988.
    Karami, Masoomeh
    et al.
    Univ Turku, Dept Future Technol, Turku, Finland..
    Haghbayan, Mohammad-hashem
    Univ Turku, Dept Future Technol, Turku, Finland..
    Ebrahimi, Masoumeh
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems, Electronic and embedded systems.
    Nejatollahi, Hamid
    Univ Calif Irvine, Irvine, CA USA..
    Tenhunen, Hannu
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems, Integrated devices and circuits.
    Plosila, Juha
    Univ Turku, Dept Future Technol, Turku, Finland..
    High-Performance Parallel Fault Simulation for Multi-Core Systems2021In: 2021 29th euromicro international conference on parallel, distributed and network-based processing (PDP 2021), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 207-211Conference paper (Refereed)
    Abstract [en]

    Fault simulation is a time-consuming process that requires customized methods and techniques to accelerate it. Multi-threading and Multi-core approaches are two promising techniques that can be exploited to accelerate the fault simulation process by using different parts of the hardware at the same time. However, an efficient parallelization is obtained only by the refinement of software with respect to the hardware platform. In this paper, a parallel multi-thread fault simulation technique is proposed to accelerate the simulation process on multi-core platforms. In this approach, the gate input values are independently assigned to each thread. Each input value carries the information of several parallel simulation processes. This provides a multithread parallel fault simulation environment. The experimental results show that the proposed technique can efficiently use the hardware platform. In a single-core platform. the proposed technique can reduce the time by 25% while in a dual-core increasing the thread approximately halves the execution time.

  • 2989.
    Karapantelakis, Athanasios
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. Ericsson Research, Stockholm, Sweden.
    Liang, Hongxin
    Ericsson Research, Stockholm, Sweden.
    Wang, Keven
    Ericsson Research, Stockholm, Sweden.
    Vandikas, Konstantinos
    Ericsson Research, Stockholm, Sweden.
    Fersman, Elena
    Ericsson Research, Stockholm, Sweden.
    Mulas-Viela, Ignacio
    Ericsson Research, Stockholm, Sweden.
    Seyvet, Nicolas
    Ericsson Research, Stockholm, Sweden.
    Giannokostas, Vasileios
    KTH.
    DevOps for IoT Applications using Cellular Networks and Cloud2016Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is a vision of a future society where an ever-increasing number of heterogeneous physical devices (“things”) obtain Internet connectivity, thus enabling a large number of applications for a broad range of industries and society at large. Mobile network operators, expected to provide the network infrastructure for many of these applications, face an unprecedented level of complexity. This complexity not only relates to the number of applications that share the network infrastructure, but also to the different network Quality of Service (QoS) requirements these application have. To achieve economies of scale, automation in management of those applications throughout their lifecycle is essential. In this paper, we propose an architecture that automates allocation, monitoring and deallocation of both cloud and cellular network resources to ensure QoS for applications that involve connected devices communicating with cloud-hosted software. We describe an implementation of this architecture using a combination of open source, commercial, and custom components and evaluate it through a series of measurements. Results show that our implementation can simultaneously support mobile broadband and low latency, high availability mission-critical applications.

    Download full text (pdf)
    fulltext
  • 2990.
    Karasalo, Maja
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Hu, Xiaoming
    KTH, School of Engineering Sciences (SCI), Mathematics (Dept.), Optimization and Systems Theory.
    Martin, Clyde R.
    Contour reconstruction and matching using recursive smoothing splines2007In: MODELING, ESTIMATION AND CONTROL: FESTSCHRIFT IN HONOR OF GIORGIO PICCI ON THE OCCASION OF THE SIXTY-FIFTH BIRTHDAY / [ed] Chiuso, A; Ferrante, A; Pinzoni, S, BERLIN: SPRINGER-VERLAG BERLIN , 2007, Vol. 364, p. 193-206Conference paper (Refereed)
    Abstract [en]

    In this paper a recursive smoothing spline approach is used for reconstructing a closed contour. Periodic splines are generated through minimizing a cost function subject to constraints imposed by a linear control system. The filtering effect of the smoothing splines allows for usage of noisy sensor data. An important feature of the method is that several data sets for the same closed contour can be processed recursively so that the accuracy can be improved meanwhile the current mapping can be used for planning the path for the data-collecting robot.

  • 2991.
    Kargén, Ulf
    et al.
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Mauthe, Noah
    CISPA Helmholtz Ctr Informat Secur, Germany.
    Shahmehri, Nahid
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps2023In: 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, ASSOC COMPUTING MACHINERY , 2023, article id 27Conference paper (Refereed)
    Abstract [en]

    Obfuscation is frequently used by both benign and malicious An-droid apps. Since static analysis of obfuscated apps often produces incomplete or misleading results, the problems of identifying and quantifying the use of specific obfuscation techniques in apps has received significant attention. Even though several existing works have addressed these problems, most studies focus on data obfuscation methods such as identifier renaming and string obfuscation, while more advanced code obfuscation methods, such as reflection and control-flow obfuscation, have received less attention. Moreover, existing approaches to detecting Android code obfuscation have significant limitations, as shown by a detailed survey that we present as part of this paper. This is in part due to a fundamental "bootstrapping" problem: since, on one hand, the landscape of Android code obfuscation is poorly known, researchers have very little guidance when designing new detection methods. On the other hand, the lack of detection methods mean that the obfuscation landscape is bound to remain largely unexplored. In this work, we aim to take the first steps towards addressing this "bootstrapping" problem. To this end, we propose two novel approaches to obfuscation detection and perform a study on over 200,000 malicious apps, in addition to 13,436 apps from Google Play. In particular, we propose a new anomaly-detection-based method for identifying likely control-flow obfuscation, and use it to perform what is, to the best of our knowledge, the first empirical study of control-flow obfuscation in Android apps. In addition to presenting new insights into the use of control-flow obfuscation, we also propose a new approach to characterizing the use of reflection-based obfuscation, which allows us to corroborate earlier findings indicating that this type of obfuscation is much more common in malware than in benign apps.

  • 2992.
    Karim, Ramin
    et al.
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    Galar, Diego
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    Kumar, Uday
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    AI Factory: Theories, Applications and Case Studies2023 (ed. 1)Book (Other academic)
    Abstract [en]

    This book provides insights into how to approach and utilise data science tools, technologies, and methodologies related to artificial intelligence (AI) in industrial contexts. It explains the essence of distributed computing and AI technologies and their interconnections. It includes descriptions of various technology and methodology approaches and their purpose and benefits when developing AI solutions in industrial contexts. In addition, this book summarises experiences from AI technology deployment projects from several industrial sectors. Features:

    • Presents a compendium of methodologies and technologies in industrial AI and digitalisation.

    • Illustrates the sensor-to-actuation approach showing the complete cycle, which defines and differentiates AI and digitalisation.

    • Covers a broad range of academic and industrial issues within the field of asset management.

    • Discusses the impact of Industry 4.0 in other sectors.

    • Includes a dedicated chapter on real-time case studies.

    This book is aimed at researchers and professionals in industrial and software engineering, network security, AI and machine learning (ML), engineering managers, operational and maintenance specialists, asset managers, and digital and AI manufacturing specialists.

  • 2993. Karimi, E.
    et al.
    Haghbayan, M. -H
    Rahmani, Amir
    KTH, School of Information and Communication Technology (ICT), Industrial and Medical Electronics.
    Tabandeh, M.
    Liljeberg, P.
    Navabi, Z.
    Accelerated On-chip Communication Test Methodology Using a Novel High-Level Fault Model2015In: Proceedings - IEEE 9th International Symposium on Embedded Multicore/Manycore SoCs, MCSoC 2015, Institute of Electrical and Electronics Engineers (IEEE), 2015, p. 283-288Conference paper (Refereed)
    Abstract [en]

    A novel high-level fault model to accelerate test process of on-chip communication structures for SoCs is proposed. To this end, bus components are modeled using a simple, yet efficient, graph-based technique and all possible faults on the graph nodes are probed. The proposed method is optimized in terms of test time. The method applies the same test process to all interconnects and components. Compared to the conventional stuck-at fault testing methods, our extensive simulations on the AMBA-AHB bus architecture reveal that our test method can help in achieving a significant test speed improvement.

  • 2994.
    Karlfeldt, Johan
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Kostnadseffektiv nätverksövervakning med Raspberry Pi 2 och Cacti2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Prestandan i våra nätverk spelar en allt större roll i takt med att vi hittar nya sätt att kommunicera och verka genom dem. Nätverk har idag också en viktig roll hos många företag och organisationer. Prestandaförluster och oplanerade driftstopp kan få stora konsekvenser vilket medför att implementeringen av nätverksövervakning i våra nätverk blir viktigt. Det här examensarbetet syftar till att undersöka hur en Raspberry Pi 2, med mjukvaran Cacti, klarar av att hantera de uppgifter som ett nätverksövervakningssystem ställs inför. Datainsamling sker genom att utläsa hur systemets genomsnittliga processorbelastning sett ut under de senaste fem och femton minuterna vid olika typer av scenarion. Systemet har belastats genom att öka antalet övervakade nätverksenheter samt genom att generera grafer av insamlad data. Resultatet visar att en Raspberry Pi 2 med Cacti fungerar utmärkt att använda för övervakning av nätverksmiljöer men får problem med långa laddningstider när flera grafer ska genereras samtidigt, vilket försämrar användarupplevelsen.

  • 2995. Karlsson, A.
    et al.
    Olofsson, N.
    Laure, Erwin
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC. KTH, Centres, SeRC - Swedish e-Science Research Centre. KTH, School of Computer Science and Communication (CSC), High Performance Computing and Visualization (HPCViz). KTH, School of Computer Science and Communication (CSC), Computational Science and Technology (CST).
    Clements, M.
    A parallel microsimulation package for modelling cancer screening policies2017In: Proceedings of the 2016 IEEE 12th International Conference on e-Science, e-Science 2016, IEEE, 2017, p. 323-330Conference paper (Refereed)
    Abstract [en]

    Microsimulation with stochastic life histories is an important tool in the development of public policies. In this article, we use microsimulation to evaluate policies for prostate cancer testing. We implemented the microsimulations as an R package, with pre- and post-processing in R and with the simulations written in C++. Calibrating a microsimulation model with a large population can be computationally expensive. To address this issue, we investigated four forms of parallelism: (i) shared memory parallelism using R; (ii) shared memory parallelism using OpenMP at the C++ level; (iii) distributed memory parallelism using R; and (iv) a hybrid shared/distributed memory parallelism using OpenMP at the C++ level and MPI at the R level. The close coupling between R and C++ offered advantages for ease of software dissemination and the use of high-level R parallelisation methods. However, this combination brought challenges when trying to use shared memory parallelism at the C++ level: the performance gained by hybrid OpenMP/MPI came at the cost of significant re-factoring of the existing code. As a case study, we implemented a prostate cancer model in the microsimulation package. We used this model to investigate whether prostate cancer testing with specific re-testing protocols would reduce harms and maintain any mortality benefit from prostate-specific antigen testing. We showed that four-yearly testing would have a comparable effectiveness and a marked decrease in costs compared with two-yearly testing and current testing. In summary, we developed a microsimulation package in R and assessed the cost-effectiveness of prostate cancer testing. We were able to scale up the microsimulations using a combination of R and C++, however care was required when using shared memory parallelism at the C++ level.

  • 2996.
    Karlsson, Andréas
    Linköping University, Department of Electrical Engineering, Computer Engineering. Linköping University, Faculty of Science & Engineering.
    Design of Energy-Efficient High-Performance ASIP-DSP Platforms2016Doctoral thesis, monograph (Other academic)
    Abstract [en]

    In the last ten years, limited clock frequency scaling and increasing power density has shifted IC design focus towards parallelism, heterogeneity and energy efficiency. Improving energy efficiency is by no means simple and it calls for a reevaluation of old design choices in processor architecture, and perhaps more importantly, development of new programming methodologies that exploit the features of modern architectures.

    This thesis discusses the design of energy-efficient digital signal processors with application-specific instructions sets, so-called ASIP-DSPs, and their programming tools. Target applications for such processors include, but are not limited to, communications, multimedia, image processing, intelligent vision and radar. These applications are often implemented by a limited set of kernel algorithms, whose performance and efficiency are critical to the application's success. At the same time, the extreme non-recurring engineering cost of system-on-chip designs means that product life-time must be kept as long as possible. Neither general-purpose processors nor non-programmable ASICs can meet both the flexibility and efficiency requirements, and ASIPs may instead be the best trade-off between all the conflicting goals.

    Traditional superscalar- and VLIW processor design focus has been to improve the throughput of fine-grained instructions, which results in high flexibility, but also high energy consumption. SIMD architectures, on the other hand, are often restricted by inefficient data access. The result is architectures which spend more energy and/or time on supporting operations rather than actual computing.

    This thesis defines the performance limit of an architecture with an N-way parallel datapath as consuming 2N elements of compute data per clock cycle. To approach this performance, this work proposes coarse-grained higher-order functional (HOF) instructions, which encode the most  frequently executed compute-, data access- and control sequences into single many-cycle instructions, to reduce the overheads of instruction delivery, while at the same time maintaining orthogonality. The work further investigates opportunities for operation fusion to improve computing performance, and proposes a flexible memory subsystem for conflict-free parallel memory access with permutation and lookup-table-based addressing, to ensure that high computing throughput can be sustained even in the presence of irregular data access patterns. These concepts are extensively studied by implementing a large kernel algorithm library with typical DSP kernels, to prove their effectiveness and adequacy. Compared to contemporary VLIW DSP solutions, our solution can practically eliminate instruction fetching energy in many scenarios, significantly reduce control path switching, simplify the implementation of kernels and reduce code size, sometimes by as much as 30 times.

    The techniques proposed in this thesis have been implemented in the DSP platform ePUMA (embedded Parallel DSP processor with Unique Memory Access), a configurable control-compute heterogeneous platform with distributed memory, optimized for low-power predictable DSP computing. Hardware evaluation has been done with FPGA prototypes. In addition, several VLSI layouts have been created for energy and area estimations. This includes smaller designs, as well as a large design with 73 cores, capable of 1280 integer GOPS or 256 GFLOPS at 500MHz and which measures 45mm2 in 28nm FD-SOI technology.

    In addition to the hardware design, this thesis also discusses parallel programming flow for distributed memory architectures and ePUMA application implementation. A DSP kernel programming language and its compiler is presented. This effectively demonstrates how kernels written in a high-level language can be translated into HOF instructions for very high processing efficiency.

    Download full text (pdf)
    Design of Energy-Efficient High-Performance ASIP-DSP Platforms
    Download (pdf)
    omslag
    Download (jpg)
    presentationsbild
  • 2997.
    Karlsson, Anna
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, Faculty of Science & Engineering.
    Device Sensor Fingerprinting: Mobile Device Sensor Fingerprinting With A Biometric Approach2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The number of connected devices connected to the Internet is growing rapidly. When talking about devices it also covers the ones not having any contact with humans. This type of devices are the ones that are expected to increase the most. That is why the field of device fingerprinting is an area that requires further investigation. This thesis measures and evaluates the accelerometer, camera and gyroscope sensor of a mobile device to the use as device fingerprinting. The method used is based on previous research in sensor identification together with methods used for designing a biometric system. The combination with long-proven methods in the biometric area with new research of sensor identification is a new approach of looking at device fingerprinting.

    Download full text (pdf)
    device-sensor-fingerprinting
  • 2998.
    Karlsson, Daniel
    et al.
    Linköping University, Department of Biomedical Engineering, Medical Informatics. Linköping University, Faculty of Science & Engineering.
    Nyström, Mikael
    Linköping University, Department of Biomedical Engineering, Medical Informatics. Linköping University, Faculty of Science & Engineering.
    Kron, Bengt
    Region Västra Götaland.
    An integrated Expression Repository EHR system2012Conference paper (Other academic)
    Abstract [en]

    Introduction: The aim of this work is to develop and test a system for storing and querying pre- and post-coordinated SNOMED CT expressions in an Electronic Health Record (EHR) system. SNOMED CT is here used as a reference terminology and to allow abstraction of EHR data for transfer to quality databases.

    Background: Enumerating all combinations of SNOMED CT concepts is not possible due to combinatorial explosion. E.g. pain may be qualified by severity (7 severities), pain character (152), body site (25888 sites), course (31) etc. giving a total of some 800 million possible, although not always sensible, different ways to express pain.

    For SNOMED CT to be useful, terminology services need to be integrated with the other parts of the information infrastructure, e.g. EHRs. As the boundary between terminology and information model representation may vary among use cases, care should be taken in implementing such integrations.

    Results: A system is developed to support the management of post-coordinated SNOMED CT expressions. This expression repository allows subsumption testing of pre- and post-coordinated expressions using a full view, i.e. historical views are possible. A transitive closure of the Is a-relation is updated continuously with new post-coordinated expressions stored in the repository. The repository is also integrated with an openEHR-based EHR system including archetype querying possibilities. The integrated system allows querying of terminology-bound archetype instances using pre- and post-coordinated SNOMED CT expressions.

  • 2999.
    Karlsson, David
    KTH, School of Engineering Sciences in Chemistry, Biotechnology and Health (CBH), Biomedical Engineering and Health Systems, Health Informatics and Logistics.
    Analys och jämförelse av relationsdatabaser vid behandling av spatiala data: En studie kring prestanda hos relationsdatabaser2023Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There are a large number of databases that are used in many different areas. Among these, some have a function for processing spatial data. The problem that this entails is the choice of a database that can handle a certain type of spatial data with the best possible performance. This report presents an analysis of this based on a dataset obtained from Norconsult Digital. Among the chosen databases are three SQL databases (PostgreSQL, MySQL and SQLite) and one NoSQL database (MongoDB). These databases underwent five identical operations/tests resulting in PostgreSQL with its GiST/SP-GiST index and MongoDB performing at a level well above the rest of the databases tested. Based on this work, it can be concluded that more detailed performance tests should be carried out, where larger and more complex datasets, as well as more alternatives to databases and spatial indexes, should be included. This is to give a better picture of which databases, with support for spatial data, perform better.

    Download full text (pdf)
    fulltext
  • 3000.
    Karlsson, Eric
    Linköping University, Department of Computer and Information Science, Software and Systems.
    The evolution and erosion of a service-oriented architecture in enterprise software: A study of a service-oriented architecture and its transition to a microservice architecture2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this thesis project, a company’s continuously evolved service-oriented software architecture was studied for signs of architectural erosion. The architecture has been continuously developed over some time and the company have experienced a reduction in architectural quality and felt that it no longer fulfilled its design goals and therefore decided to start working on a replacement architecture based on the microservice archi-tectural style. This thesis project therefore aimed to study how the current architectures quality have changed during its evolution, find the causes of these changes in quality, andestimate how the planned microservice migration will effect these changes in quality. This study was performed in three steps. First, a suite of suitable quality metrics where gathered based on the stated architectural design goals and what information can be ex-tracted from the history of the implemented architecture. A tool was developed to model the architecture and to gather the quality metrics from the current architecture and how ithas changed over one year’s worth of development and evolution. Secondly, the causes ofthese changes in architectural quality was investigated through developer interviews with a wide range of developers that had worked on the architecture and the web application that it provides the structure for. The interviews focused on the topics of architectural knowledge, what consideration is taken to its design during component development, maintenance of existing components and architecture, as well as questions regardingspecific components and anomalies. Thirdly and finally, the migration to a microserviceand its effects on the quality of the current architecture is estimated through performing microservice reengineering on the model used to evaluate the current architecture. The tools developed during this thesis allowed for an analysis of the architecture didshow an increase in consistency violations, structural problems and level the of coupling have substantially increased over the version history that the model tracked. It was discov-ered by the developer interviews that some of the causes of this erosion was due to among other reasons an abandonment of some architectural deign decisions, lack of architectural knowledge on certain topics, and none-optimal development conditions and priorities. The microservice reengineering showed how the migration could be used to improve themeasured quality metrics and that a migration alongside some other architectural erosionprevention and repair methods could create an architecture that are more modular and erosion tolerant.

    Download full text (pdf)
    fulltext
57585960616263 2951 - 3000 of 6263
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf