Change search
Refine search result
45678910 301 - 350 of 46741
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 301.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Menntavegur 1, IS 101 Reykjavik, Iceland.
    Cimini, Matteo
    ICE-TCS, School of Computer Science, Reykjavik University, Menntavegur 1, IS 101 Reykjavik, Iceland.
    Ingolfsdottir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Menntavegur 1, IS 101 Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, Netherlands.
    Reniers, Michel A.
    Department of Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, Netherlands.
    SOS Rule Formats for Zero and Unit Elements2011In: Theoretical Computer Science, ISSN 0304-3975, Vol. 412, no 28, 3045-3071 p.Article in journal (Refereed)
    Abstract [en]

    This paper proposes rule formats for Structural Operational Semantics guaranteeing that certain constants act as left or right unit/zero elements for a set of binary operators. Examples of left and right zero, as well as unit, elements from the literature are shown to fit the rule formats offered in this study. © 2011 Elsevier B.V. All rights reserved.

  • 302.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Cimini, Matteo
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Ingólfsdóttir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Reniers, Michael A.
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    On Rule Formats for Zero and Unit Elements2010Report (Other academic)
    Abstract [en]

    This paper proposes a rule format for Structural Operational Semantics guaranteeing that certain constants act as left or right zero elements for a set of binary operators. Our design approach is also applied to reformulate an earlier rule format for unit elements developed by some of the authors. Examples of left and right zero, as well as unit, elements from the literature are shown to be checkable using the provided formats.

  • 303.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Cimini, Matteo
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Ingólfsdóttir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Reniers, Michael A.
    Department of Mechanical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Rule Formats for Distributivity2010Report (Other academic)
    Abstract [en]

    This paper proposes rule formats for Structural Operational Semantics guaranteeing that certain binary operators are left distributive with respect to a set of binary operators. Examples of left-distributivity laws from the literature are shown to be instances of the provided formats.

  • 304.
    Aceto, Luca
    et al.
    School of Computer Science, Reykjavik University, Iceland.
    Cimini, Matteo
    School of Computer Science, Reykjavik University, Iceland.
    Ingólfsdóttir, Anna
    School of Computer Science, Reykjavik University, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, Netherlands.
    Reniers, Michel A.
    Department of Mechanical Engineering, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, Netherlands.
    Rule Formats for Distributivity2011In: Language and Automata Theory and Applications: 5th International Conference : Proceedings / [ed] Adrian Horia Dediu, Heidelberg: Springer Berlin/Heidelberg, 2011, Vol. 6638, 79-90 p.Conference paper (Refereed)
    Abstract [en]

    This paper proposes rule formats for Structural Operational Semantics guaranteeing that certain binary operators are left distributive with respect to a set of binary operators. Examples of left-distributivity laws from the literature are shown to be instances of the provided formats. © 2011 Springer-Verlag.

  • 305.
    Aceto, Luca
    et al.
    Reykjavík University, Kringlan 1, IS-103, Reykjavík, Iceland.
    Fokkink, Wan
    Vrije Universiteit Amsterdam, NL-1081HV, The Netherlands.
    Ingólfsdóttir, Anna
    Reykjavík University, Kringlan 1, IS-103, Reykjavík, Iceland.
    Mousavi, Mohammad Reza
    Eindhoven University of Technology, NL-5600MB Eindhoven, The Netherlands.
    Lifting non-finite axiomatizability results to extensions of process algebras2008In: Fifth Ifip International Conference On Theoretical Computer Science – Tcs 2008 / [ed] Ausiello, G, Karhumaki, J, Mauri, G, Ong, L, New York: Springer-Verlag New York, 2008, Vol. 273, 301-316 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a general technique for obtaining new results pertaining to the non-finite axiomatizability of behavioral semantics over process algebras from old ones. The proposed technique is based on a variation on the classic idea of reduction mappings. In this setting, such reductions are translations between languages that preserve sound (in)equations and (in)equational proofs over the source language, and reflect families of (in)equations responsible for the non-finite axiomatizability of the target language. The proposed technique is applied to obtain a number of new non-finite axiomatizability theorems in process algebra via reduction to Moller’s celebrated non-finite axiomatizability result for CCS. The limitations of the reduction technique are also studied.

  • 306.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Fokkink, Wan J.
    Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands.
    Ingólfsdóttir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Lifting non-finite axiomatizability results to extensions of process algebras2008Report (Other academic)
  • 307.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Goriac, Eugen-Ioan
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Ingolfsdottir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Reniers, Michel A.
    Department of Mechanical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Exploiting Algebraic Laws to Improve Mechanized Axiomatizations2013In: Algebra and Coalgebra in Computer Science: 5th International Conference, Calco 2013, Warsaw, Poland, September 2013, Proceedings, Berlin: Springer Berlin/Heidelberg, 2013, 36-50 p.Conference paper (Refereed)
    Abstract [en]

    In the field of structural operational semantics (SOS), there have been several proposals both for syntactic rule formats guaranteeing the validity of algebraic laws, and for algorithms for automatically generating ground-complete axiomatizations. However, there has been no synergy between these two types of results. This paper takes the first steps in marrying these two areas of research in the meta-theory of SOS and shows that taking algebraic laws into account in the mechanical generation of axiomatizations results in simpler axiomatizations. The proposed theory is applied to a paradigmatic example from the literature, showing that, in this case, the generated axiomatization coincides with a classic hand-crafted one. © 2013 Springer-Verlag Berlin Heidelberg.

  • 308.
    Aceto, Luca
    et al.
    School of Computer Science, Reykjavík University, Kringlan 1, 103 Reykjavík, Iceland.
    Ingólfsdóttir, A.
    School of Computer Science, Reykjavík University, Kringlan 1, 103 Reykjavík, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, 5600 MB Eindhoven, Netherlands.
    Reniers, M. A.
    Algebraic properties for free!2009In: Bulletin of the European Association for Theoretical Computer Science, ISSN 0252-9742, Vol. 99, 81-103 p.Article in journal (Refereed)
    Abstract [en]

    Algebraic properties specify some natural properties of programming and specification constructs. This paper provides an overview of techniques to guarantee or generate algebraic properties of language constructs by investigating the syntactic shape of the deduction rules defining their operational semantics.

  • 309.
    Aceto, Luca
    et al.
    Department of Computer Science, Reykjavík University, Kringlan 1, IS-103, Reykjavík, Iceland.
    Ingólfsdóttir, Anna
    Department of Computer Science, Reykjavík University, Kringlan 1, IS-103, Reykjavík, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Reykjavík University, Kringlan 1, IS-103, Reykjavík, Iceland.
    Impossibility results for the equational theory of timed CCS2007In: Algebra and Coalgebra in Computer Science: Second International Conference, CALCO 2007, Bergen, Norway, August 20-24, 2007. Proceedings, Berlin: Springer Berlin/Heidelberg, 2007, Vol. 4624, 80-95 p.Conference paper (Refereed)
    Abstract [en]

    We study the equational theory of Timed CCS as proposed by Wang Yi in CONCUR'90. Common to Wang Yi's paper, we particularly focus on a class of linearly-ordered time domains exemplified by the positive real or rational numbers. We show that, even when the set of basic actions is a singleton, there are parallel Timed CCS processes that do not have any sequential equivalent and thus improve on the Gap Theorem for Timed CCS presented by Godskesen and Larsen in FSTTCS'92. Furthermore, we show that timed bisimilarity is not finitely based both for single-sorted and two-sorted presentations of Timed CCS. We further strengthen this result by showing that, unlike in some other process algebras, adding the untimed or the timed left-merge operator to the syntax and semantics of Timed CCS does not solve the axiomatizability problem.

  • 310.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University Kringlan 1, IS-103 Reykjavik, Iceland.
    Ingólfsdóttir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University Kringlan 1, IS-103 Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology P.O. Box 513, NL-5600 MB Ei ndhoven, The Netherlands.
    Reniers, Michel A.
    Department of Computer Science, Eindhoven University of Technology P.O. Box 513, NL-5600 MB Ei ndhoven, The Netherlands.
    A rule format for unit elements2010In: SOFSEM 2010: Theory and Practice of Computer Science: Proceedings / [ed] VanLeeuwen, J, Muscholl, A, Peleg, D, Pokorny, J, Rumpe, B, Berlin: Springer Berlin/Heidelberg, 2010, Vol. 5901, 141-152 p.Conference paper (Refereed)
    Abstract [en]

    This paper offers a meta-theorem for languages with a Structural Operational Semantics (SOS) in the style of Plotkin. Namely, it proposes a generic rule format for SOS guaranteeing that certain constants act as left- or right-unit elements for a set of binary operators. We show the generality of our format by applying it to a wide range of operators from the literature on process calculi.

  • 311.
    Aceto, Luca
    et al.
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Ingólfsdóttir, Anna
    ICE-TCS, School of Computer Science, Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad Reza
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Reniers, Michel A.
    Department of Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    A Rule Format for Unit Elements2009Report (Other academic)
    Abstract [en]

    This paper offers a meta-theorem for languages with a Structural Operational Semantics (SOS) in the style of Plotkin. Namely, it proposes a generic rule format for SOS guaranteeing that certain constants act as left- or right-unit elements for a set of binary operators. We show the generality of our format by applying it to a wide range of operators from the literature on process calculi.

  • 312. Aceto, Luca
    et al.
    Longo, GiuseppeVictor, BjörnUppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science.
    The difference between concurrent and sequential computation2003Collection (editor) (Other (popular science, discussion, etc.))
  • 313.
    Aceto, Luca
    et al.
    Reykjavik University, Reykjavik, Iceland.
    Mousavi, Mohammad RezaEindhoven University of Technology, Eindhoven, The Netherlands.
    Proceedings First International Workshop on Process Algebra and Coordination2011Conference proceedings (editor) (Other academic)
    Abstract [en]

    Process algebra provides abstract and rigorous means for studying communicating concurrent systems. Coordination languages also provide abstract means for the specifying and programming communication of components. Hence, the two fields seem to have very much in common and the link between these two research areas have been established formally by means of several translations, mainly from coordination languages to process algebras. There have also been proposals of process algebras whose communication policy is inspired by the one underlying coordination languages. The aim of this workshop was to push the state of the art in the study of the connections between process algebra and coordination languages by bringing together experts as well as young researchers from the two fields to communicate their ideas and findings. It includes both contributed and invited papers that have been presented during the one day meeting on Process Algebra and Coordination (PACO 2011) which took place on June 9, 2011 in Reykjavik, Iceland.

  • 314. Aceto, Luca
    et al.
    Victor, BjörnUppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science.
    EXPRESS'00: 7th International Workshop on Expressiveness in Concurrency2000Conference proceedings (editor) (Other academic)
  • 315.
    Acharya, Jaldeep
    et al.
    KTH, School of Computer Science and Communication (CSC).
    Fröberg, Ludvig
    KTH, School of Computer Science and Communication (CSC).
    A comparison of interfaces in choice driven games: Investigating possible future applications of NLIs in choice driven games by comparing a menu- based interface with an NLI in a text-based game2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Natural language processing has for a long time been a field of research and has been regarded as a thing of the future. Due to its complexity it stopped being featured in computer games in the early 2000s. It has however had a recent revival as a consequence of advancements made in speech recognition, making the possible applications of natural language processing much larger. One market that hasn’t seen much in the way of natural language interfaces recently is that of computer games. This report covers the basics of natural language processing needed to implement two versions of a simple text-based adventure game, one with a menu-based interface and one with a natural lan- guage interface. These were then played by a test group from which usability statistics were gathered to determine if it is likely that NLP will find its way back in to choice driven games in the future.

    The results showed that even though the menu-based interface has a faster rate of progression, the NLI version of the game was perceived as more enjoyable by users with experience in gaming. The reason being that the NLI al- lowed for more thinking on the user’s part and therefore the game presented a greater challenge, something that is perceived as attractive by users with experience in com- puter games. Also the measured usability was roughly the same for both interfaces while it was feared that it would be much lower for NLIs. Therefore, the conclusion was that it is highly plausible that NLI will find its way back into the gaming world, since it adds a new dimension to adventure games, which is something that attracts users. However, this is given that NLP development continues in the same fast pace as it is today, making it possible to implement a more accurate NLI. 

  • 316.
    Acharya, Mod Nath
    et al.
    Blekinge Institute of Technology, School of Computing.
    Aslam, Nazam
    Blekinge Institute of Technology, School of Computing.
    Coordination in Global Software Development: Challenges, associated threats, and mitigating practices2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Global Software Development (GSD) is an emerging trend in today's software world in which teams are geographically dispersed, either in close proximity or globally. GSD provides certain advantages to development companies like low development cost, access to cheap and skilled labour etc. This type of development is noted as a more risky and challenging as compared to projects developed with teams under same roof. Inherently the nature of GSD projects are cooperative in which many software developers work on a common project, share information and coordinate activities. Coordination is a fundamental part of software development. GSD comprises different types of development systems i.e. insourcing, outsourcing, nearshoring, or farshoring, whatever the types of development systems selected by a company there exist the challenges to coordination. Therefore the knowledge of potential challenges, associated threats to coordination and practices to mitigate them plays a vital role for running a successful global project.

  • 317.
    Acharya, Soam
    et al.
    Cornell University, Ithaca.
    Smith, Brian P
    Cornell University, Ithaca.
    Parnes, Peter
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Characterizing user access to videos on the World Wide Web1999In: Multimedia computing and networking 2000 / [ed] Klara Nahrstedt, Bellingham, Wash: SPIE - International Society for Optical Engineering, 1999, 130-141 p.Conference paper (Refereed)
    Abstract [en]

    Despite evidence of rising popularity of video on the web (or VOW), little is known about how users access video. However, such a characterization can greatly benefit the design of multimedia systems such as web video proxies and VOW servers. Hence, this paper presents an analysis of trace data obtained from an ongoing VOW experiment in Lulea University of Technology, Sweden. This experiment is unique as video material is distributed over a high bandwidth network allowing users to make access decisions without the network being a major factor. Our analysis revealed a number of interesting discoveries regarding user VOW access. For example, accesses display high temporal locality: several requests for the same video title often occur within a short time span. Accesses also exhibited spatial locality of reference whereby a small number of machines accounted for a large number of overall requests. Another finding was a browsing pattern where users preview the initial portion of a video to find out if they are interested. If they like it, they continue watching, otherwise they halt it. This pattern suggests that caching the first several minutes of video data should prove effective. Lastly, the analysis shows that, contrary to previous studies, ranking of video titles by popularity did not fit a Zipfian distribution.

  • 318.
    Acheampong, Faustina
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Development of Web-based Health Care Services in Swedish County Councils: Strategies, Usage and Challenges2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    eHealth has been adopted by many countries across the globe in response to cut down cost and improve the quality of life. Sweden has been engaged in providing web-based health care services for its citizens for the past decade and county councils have the responsibility to develop them. The main aim of this thesis is to present answers to the following research questions:What strategies (formal and informal) guide the development of web-based health care services provided by the Swedish county councils?What barriers exist in relation to the development and usage of web-based health care services provided by the county councils from the viewpoint of their IT leaders?From the perspective of IT leaders in the county councils and in their capacity to develop, manage and monitor their organizations‘ website content, which web-based health care services are mostly accessed by users and what age group utilize the services most?The thesis is an exploratory research conducted through a survey based on a mail questionnaire that was posted to all 21 county councils in Sweden with 18 councils responding. The results show that all county councils have formally adopted the National eHealth Strategy to guide the development of web-based health care services and some have other informal strategies as well. Technological barriers, resistance to use the web-based services and changing business process to integrate ICTs have been identified by IT leaders as major challenges that impede the development of web-based health care services in Swedish county councils. Swedish citizens more frequently access prescription renewal and booking and cancellation of appointments than other available web-based health care services which depicts a trend towards the use of advanced interactive services than basic information seeking, and people in the ages of 46 to 55 have been identified as the frequent users of web-based health care services according to IT leaders from the county councils.

  • 319.
    Acheampong, Faustina
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Vimarlund, Vivian
    Jönköping University, Jönköping International Business School, JIBS, Informatics. Jönköping University, Jönköping International Business School, JIBS, Centre for Information Technology and Information Systems (CenITIS).
    Business models for telemedicine services: A literature review2015In: Health Systems, ISSN 2047-6965, E-ISSN 2047-6973, Vol. 4, no 3, 189-203 p.Article in journal (Refereed)
    Abstract [en]

    Telemedicine has been acknowledged to improve the quality of healthcare. However, many telemedicine services fail beyond the pilot phase. A literature review on business model components for telemedicine services was conducted. Based on specified inclusion criteria, 22 publications were included in the review. To facilitate the analysis of literature, a business model framework with value as its central focus was proposed. Improvement in quality, efficiency and accessibility of care were identified to be the outcomes of telemedicine, with patients and healthcare personnel being the main users of the services, which are delivered through home, institutional and community-based care. Patients, health providers, vendors, payers and government agencies are actors involved in the delivery of telemedicine services, which require investments in resources like videoconferencing technologies, home monitoring devices and other IT infrastructure. Subscriptions, reimbursements and pay-per-use revenue streams were identified as feasible for commercializing telemedicine services.

  • 320.
    Acheampong, Faustina
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Vimarlund, Vivian
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Effects of a Home-based Monitoring Device on Innovation in Healthcare Delivery: A Pilot Study2013In: Information Systems and Technology for Organizations in a Networked Society / [ed] Tomayess Issa, Pedro Isaias and Piet Kommers, Hershey, PA, USA: IGI Global, 2013, 316-334 p.Chapter in book (Refereed)
    Abstract [en]

    Information technology has been suggested to improve patient health outcomes and reduce the burden of care. In this study, we explored the effects of collaborative innovation between caregivers and patients on healthcare delivery as a consequence of the use of an IT-based device by patients with atrial fibrillation. Two cardiologists and two nurses were interviewed while questionnaires were mailed to 75 patients querying them about the use of a home-based ECG for remote monitoring. Findings indicated that the caregivers considered the device to enhance the quality of clinical decision-making. Patients found the device to be useful and felt more involved in their own care. However, the introduction of the device presented work overload for the caregivers. Thus, the facilitation of timely diagnostics and decision-making were not realized. IT is an enabler through which innovation in healthcare delivery can be realized, but it must be integrated into work practices to realize potential benefits.

  • 321.
    Achichi, Manel
    et al.
    LIRMM/University of Montpellier, France.
    Cheatham, Michelle
    Wright State University, USA.
    Dragisic, Zlatan
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
    Euzenat, Jerome
    INRIA & Univ. Grenoble Alpes, Grenoble, France.
    Faria, Daniel
    Instituto Gulbenkian de Ciencia, Lisbon, Portugal.
    Ferrara, Alfio
    Universita degli studi di Milano, Italy.
    Flouris, Giorgos
    Institute of Computer Science-FORTH, Heraklion, Greece.
    Fundulaki, Irini
    Institute of Computer Science-FORTH, Heraklion, Greece.
    Harrow, Ian
    Pistoia Alliance Inc., USA.
    Ivanova, Valentina
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
    Jiménez-Ruiz, Ernesto
    University of Oslo, Norway and University of Oxford, UK.
    Kuss, Elena
    University of Mannheim, Germany.
    Lambrix, Patrick
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
    Leopold, Henrik
    Vrije Universiteit Amsterdam, The Netherlands.
    Li, Huanyu
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Meilicke, Christian
    University of Mannheim, Germany.
    Montanelli, Stefano
    Universita degli studi di Milano, Italy.
    Pesquita, Catia
    Universidade de Lisboa, Portugal.
    Saveta, Tzanina
    Institute of Computer Science-FORTH, Heraklion, Greece.
    Shvaiko, Pavel
    TasLab, Informatica Trentina, Trento, Italy.
    Splendiani, Andrea
    Novartis Institutes for Biomedical Research, Basel, Switzerland.
    Stuckenschmidt, Heiner
    University of Mannheim, Germany.
    Todorov, Konstantin
    LIRMM/University of Montpellier, France.
    Trojahn, Cassia
    IRIT & Universit ́ e Toulouse II, Toulouse, France.
    Zamazal, Ondřej
    University of Economics, Prague, Czech Republic.
    Results of the Ontology Alignment Evaluation Initiative 20162016In: Proceedings of the 11th International Workshop on Ontology Matching, Aachen, Germany: CEUR Workshop Proceedings , 2016, 73-129 p.Conference paper (Refereed)
  • 322. Achilleos, Antonis
    et al.
    Lampis, Michael
    City University of New York.
    Mitsou, Valia
    Parameterized Modal Satisfiability2010In: ICALP 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part II, 2010, 369-380 p.Conference paper (Refereed)
    Abstract [en]

    We investigate the parameterized computational complexity of the satisfiability problem for modal logic and attempt to pinpoint relevant structural parameters which cause the problem’s combinatorial explosion, beyond the number of propositional variables v. To this end we study the modality depth, a natural measure which has appeared in the literature, and show that, even though modal satisfiability parameterized by v and the modality depth is FPT, the running time’s dependence on the parameters is a tower of exponentials (unless P=NP). To overcome this limitation we propose possible alternative parameters, namely diamond dimension and modal width. We show fixed-parameter tractability results using these measures where the exponential dependence on the parameters is much milder (doubly and singly exponential respectively) than in the case of modality depth thus leading to FPT algorithms for modal satisfiability with much more reasonable running times. We also give lower bound arguments which prove that our algorithms cannot be improved significantly unless the Exponential Time Hypothesis fails.

  • 323. Achilleos, Antonis
    et al.
    Lampis, Michail
    City University of New York.
    Mitsou, Valia
    Parameterized Modal Satisfiability2012In: Algorithmica, ISSN 0178-4617, E-ISSN 1432-0541, Vol. 64, no 1, 38-55 p.Article in journal (Refereed)
    Abstract [en]

    We investigate the parameterized computational complexity of the satisfiability problem for modal logic and attempt to pinpoint relevant structural parameters which cause the problem’s combinatorial explosion, beyond the number of propositional variables v. To this end we study the modality depth, a natural measure which has appeared in the literature, and show that, even though modal satisfiability parameterized by v and the modality depth is FPT, the running time’s dependence on the parameters is a tower of exponentials (unless P=NP). To overcome this limitation we propose pos- sible alternative parameters, namely diamond dimension and modal width. We show fixed-parameter tractability results using these measures where the exponential dependence on the parameters is much milder (doubly and singly exponential respectively) than in the case of modality depth thus leading to FPT algorithms for modal satisfiability with much more reasonable running times. We also give lower bound arguments which prove that our algorithms cannot be improved significantly unless the Exponential Time Hypothesis fails.

  • 324.
    Achu, Denis
    Linköping University, Department of Computer and Information Science.
    Application of Gis in Temporal and Spatial Analyses of Dengue Fever Outbreak: Case of Rio de Janeiro, Brazil2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Since Dengue fever (DF) and its related forms, Dengue Hemorrhagic fever (DHF) and Dengue Shock Syndrome (DSS) have become important health concerns worldwide, it is also imperative to develop methods which will help in the analysis of the incidences. Dengue fever cases are growing in number as it also invades widely, affecting larger number of countries and crossing climatic boundaries. Considering that the disease as of now has neither an effective vaccine nor a cure, monitoring in order to prevent or control is the resorted alternative. GIS and its related technologies offer a wealth of interesting capabilities towards achieving this goal.

    The intention of this study was to develop methods to describe dengue fever outbreaks taking Rio de Janeiro, Brazil as a case study. Careful study of Census data with appropriate attributes was made to find out their potential influence on dengue fever incidence in the various regions or census districts. Dengue incidence data from year 2000 to year 2008 reported by the municipal secretariat of Rio was used to extract the necessary census districts. Base map files in MapInfo format were converted to shape files.  Using ArcGIS it was possible to merge the dengue fever incidence data with the available base map file of the City of Rio according to corresponding census districts. Choropleth maps were then created using different attributes from which patterns and trends could be used to describe the characteristic of the outbreak with respect to the socio-economic conditions. Incidence data were also plotted in Excel to see temporal variations. Cluster analysis were performed with the Moran I technique on critical periods and years of dengue outbreak. Using the square root of dengue incidence from January to April 2002 and 2008, inverse distance was selected as the conceptualised spatial relationship, Euclidean distance as the distance method. More detailed analyses were then done on the selected critical years of dengue outbreak, (years 2002 and 2008), to investigate the influence of socio-economic variables on dengue incidence per census district.

     

    Dengue incidence rate appeared to be higher during the rainy and warmer months between December and May. Outbreaks of dengue occurred in years 2002 and 2008 over the study period of year 2000 to 2008. Some factors included in the census data were influential in the dengue prevalence according to districts. Satisfactory results can be achieved by using this strategy as a quick method for assessing potential dengue attack, spread and possible enabling conditions. The method has the advantage where there is limited access to field work, less financial means for acquisition of data and other vital resources.

    A number of difficulties were encountered during the study however and leaves areas where further work can be done for improvements. More variables would be required in order to make a complete and comprehensive description of influential conditions and factors.  There is still a gap in the analytical tools required for multi-dimensional investigations as the ones encountered in this study.  It is vital to integrate ‘GPS’ and ‘Remote Sensing’ in order to obtain a variety of up-to-date data with higher resolution.

     

  • 325.
    Acin, Medya
    et al.
    KTH, School of Computer Science and Communication (CSC).
    Stansvik, Elvis
    KTH, School of Computer Science and Communication (CSC).
    Improving Player Engagement inTetris Through EDR Monitoring2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    When designing computer games, one is often interested in evoking feelings of

    engagement, enjoyment and challenge in the player. One way of doing so is

    dynamically adjusting the difficulty of the game. Traditionally, this adjustment

    has been based on the performance of the player. However, in recent years there

    has been an increased interest in dynamically adjusting the difficulty level of a

    game based on physiological signals from the player. In this Bachelor’s project,

    we have studied the effect of using an electrodermal activity (EDA) wristband

    sensor as the source signal for the difficulty adjustment algorithm and compared

    it to the traditional approach of using the performance of the player.

    We developed two Tetris games, one EDA controlled and one performance controlled,

    and let participants play them both. Each game session was followed

    by a questionnaire. Our results show that, although participants reported an

    increased sense of engagement and challenge when playing the EDA version,

    further research is necessary before the usefulness of EDA in this setting can be

    established.

  • 326.
    Ackfjärd, Rickard
    et al.
    Örebro University, Örebro University School of Business.
    Karlsson, Mattias
    Örebro University, Örebro University School of Business.
    Förslag till ett nytt ramverk för utvärdering och utveckling av ARP-poisoning-skydd2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 327.
    Ackland, Patrik
    KTH, School of Computer Science and Communication (CSC).
    Fast and Scalable Static Analysis using Deterministic Concurrency2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis presents an algorithm for solving a subset of static analysis data flow problems known as Interprocedural Finite Distribute Subset problems. The algorithm, called IFDS-RA, is an implementation of the IFDS algorithm which is an algorithm for solving such problems. IFDS-RA is implemented using Reactive Async which is a deterministic, concurrent, programming model. The scalability of IFDS-RA is compared to the state-of-the-art Heros implementation of the IFDS algorithm and evaluated using three different taint analyses on one to eight processing cores. The results show that IFDS-RA performs better than Heros when using multiple cores. Additionally, the results show that Heros does not take advantage of multiple cores even if there are multiple cores available on the system.

  • 328. Acx, A. G.
    et al.
    Berg, M
    Karlsson, M
    Lindström, M
    Pettersson, Stefan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Slanina, P
    Zander, J
    Radio Resource Management2000In: Third generation mobile communication systems, Boston, Mass: Artech House, 2000, 386- p.Chapter in book (Other academic)
  • 329.
    Adaba, Godfried Bakiyem
    et al.
    Birkbeck, University of London, , Department of Computer Science and Information Systems.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    E-trade Facilitation in Ghana: a Capability Approach Perspective2014In: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, Vol. 63, no 5, 1-13 p.Article in journal (Refereed)
  • 330. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    ICT-based trade facilitation and the MDGs: a case study of a public–private partnership in Ghana2014In: ICTs and the Millennium Development Goals: a United Nations Perspective, Springer, 2014, no 2013, 223-235 p.Chapter in book (Other academic)
    Abstract [en]

    The strategic and innovative deployment and use of information and communication technologies (ICT) is important to development and the attainment of the millennium development goals (MDGs). Previous studies have suggested that ICT-based trade facilitation promotes development through better integration into global markets. Through an interpretive case study, this chapter explores an ICTbased initiative to connect members of the trading community in Ghana on an electronic data interchange (EDI) platform. More specifi cally, it explored the contributions of the initiative to effi cient trade facilitation and discusses the broader mplications for achieving the MDGs in Ghana. The research confi rms that the initiative has improved operational effi ciency at Ghana’s ports and borders. Furthermore, it has enabled effi cient and reliable collection of duties and taxes. The findings reinforce the view that government support and private sector expertise and funding are important factors in ICT-based e-government solutions in developing countries. The chapter contends that ICT-based trade facilitation can make a significant contribution to the attainment of the MDGs in Ghana.

  • 331. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    IT Governance Practices in a Public Organization in Ghana2014In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, E-ISSN 1947-8313, Vol. 5, no 2, 14-23 p.Article in journal (Refereed)
    Abstract [en]

    The strategic importance of information technology (IT) in today's organizations and dependence on IT to support e-government strategies has increased the interest in IT Governance (ITG) in public sector organizations. From this perspective, this paper examines ITG practices in a public organization in Ghana (that has a responsibility to mobilize revenue for national development) in order to gain an insight into IT governance structures, processes and relational mechanisms and understand how this contributes to adding value through IT. The findings have revealed that this public organization has a centralized approach to IT governance, with inadequate board involvement concerning how IT investments can bring value and improve organizational performance. Furthermore, there are no IT steering and strategy committees to oversee IT governance as best practice requires.

  • 332.
    Adaba, Godfried Bakiyem
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    El Mekawy, Mohamed Sobih Aly
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Business-IT Alignment in Trade Facilitation: A Case Study2010In: Organizational, Business, and Technological Aspects of the Knowledge Society / [ed] Lytras, M.D.; Ordonez De Pablos, P.; Ziderman, A.; Roulstone, A.; Maurer, H.; Imber, J.B., Berlin Heidelberg: Springer-Verlag , 2010, Vol. 112, 146- p.Conference paper (Other academic)
    Abstract [en]

    In the information age, no organization can thrive without harnessing the power of IT. The effective deployment of IT to achieve business goals and gain competitive advantage requires the alignment of business and IT strategies of organizations. Using the Strategic Alignment Maturity model, this paper evaluates strategic alignment maturity of Customs Excise Preventive service, a frontline public organization charged with trade facilitation in Ghana. Strategic alignment maturity is at level 3; which implies the existence of an established process to leverage IT for efficiency and effectiveness. Efforts are required to strengthen alignment and fully harness the potential of IT to facilitate trade in Ghana.

  • 333.
    Adam, Elena Daniela
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Knowledge management cloud-based solutions in small enterprises2015Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    Purpose – The aim of this study is to determine if adopting cloud-based knowledge management is a viable way forward for small enterprises and to investigate what are the main factors that might facilitate or inhibit these companies to adopt such solutions.Design/Methodology/Approach - In order to understand the main factors that could influence the adoption of a cloud-based knowledge management solution in small enterprises, I used a qualitative research approach, based on four semi-structured interviews with four small companies from Romania.Findings – The results of the study suggest that implementing knowledge management in the cloud is particularly beneficial for small enterprises, as a lower investment in IT infra-structure can create a competitive advantage and help them implement knowledge man-agement activities as a strategic resource. Moreover, the study suggests that relative ad-vantage, compatibility and technology readiness will influence companies in moving their knowledge to the cloud. Also, the study reveals that companies which did not adopt such a solution had already established systems for managing knowledge and failed to realize its benefits, it was not perceived as needed, they had a low level of awareness or cited security and uncertainty reasons.

  • 334.
    Adamala, Szymon
    et al.
    Blekinge Institute of Technology, School of Management.
    Cidrin, Linus
    Blekinge Institute of Technology, School of Management.
    Key Success Factors in Business Intelligence2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Business Intelligence can bring critical capabilities to an organization, but the implementation of such capabilities is often plagued with problems and issues. Why is it that certain projects fail, while others succeed? The theoretical problem and the aim of this thesis is to identify the factors that are present in successful Business Intelligence projects and organize them into a framework of critical success factors. A survey was conducted during the spring of 2011 to collect primary data on Business Intelligence projects. It was directed to a number of different professionals operating in the Business Intelligence field in large enterprises, primarily located in Poland and primarily vendors, but given the similarity of Business Intelligence initiatives across countries and increasing globalization of large enterprises, the conclusions from this thesis may well have relevance and be applicable for projects conducted in other countries. Findings confirm that Business Intelligence projects are wrestling with both technological and nontechnological problems, but the non-technological problems are found to be harder to solve as well as more time consuming than their technological counterparts. The thesis also shows that critical success factors for Business Intelligence projects are different from success factors for IS projects in general and Business Intelligences projects have critical success factors that are unique to the subject matter. Major differences can be predominately found in the non-technological factors, such as the presence of a specific business need to be addressed by the project and a clear vision to guide the project. Results show that successful projects have specific factors present more frequently than nonsuccessful. Such factors with great differences are the type of project funding, business value provided by each iteration of the project and the alignment of the project to a strategic vision for Business Intelligence. Furthermore, the thesis provides a framework of critical success factors that, according to the results of the study, explains 61% of variability of success of projects. Given these findings, managers responsible for introducing Business Intelligence capabilities should focus on a number of non-technological factors to increase the likelihood of project success. Areas which should be given special attention are: making sure that the Business Intelligence solution is built with end users in mind, that the Business Intelligence solution is closely tied to company‟s strategic vision and that the project is properly scoped and prioritized to concentrate on best opportunities first. Keywords: Critical Success Factors, Business Intelligence, Enterprise Data Warehouse Projects, Success Factors Framework, Risk Management

  • 335.
    Adamou, Sofia
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Ntoka, Lamprini
    Linnaeus University, Faculty of Technology, Department of Informatics.
    The impact of Digital Technologies on Academic Libraries: a study in Greece2017Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Purpose: This study explores both library users’ and librarians’ experiences, benefits, and challenges depending on the implementation of digital technologies in academic libraries. The research has been taken place in two Greek academic libraries; In the Panteion University Library and in the Central Library of T.E.I. of Athens.Approach: Two research questions were developed for this research to be conducted and a sample size of 55 respondents (39 library users and 16 librarians) of the Panteion University Library and Central Library of T.E.I. of Athens, was evaluated.Findings: From the findings of the study, it was concluded that the general perception of both library users and librarians towards digital material and E-resources and services of the Panteion University Library and Central Library of T.E.I. of Athens, is satisfactory. Library users were satisfied with the convenience of digital material, the availability of E-resources provided by both academic libraries such as World Wide Web, WIFI, and online databases. They were not satisfied with library technology (i.e., computers) and library staff. Besides, results showed that services such as e-mail and Open Public Access Catalogue were used more often. Librarians were less satisfied with the digital library system, the limited personnel, and the financial funds for academic libraries in general.Implication: The results of this research have implications in the stakeholders of an academic library including the institutional management, the library administration, the librarians, the library users, the researchers, the community at large, and others.Value: This paper identifies critical issues related to the utilization of digital technologies and digital material; their benefits and challenges faced by librarians and library users as well as their effective operation from academic libraries in this information age.

  • 336.
    Adamov, Alexander
    et al.
    Kharkiv Natl Univ Radio Elect, NioGuard Secur Lab, Kharkov, Kharkiv Oblast, Ukraine..
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    A Sandboxing Method to Protect Cloud Cyberspace2015In: PROCEEDINGS OF 2015 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), IEEE Communications Society, 2015Conference paper (Refereed)
    Abstract [en]

    This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted attacks have been discovered by Kaspersky Lab. One of them - Duqu2 - successfully attacked the Lab itself. In this context, security researchers show rising concern about protecting corporate networks and cloud infrastructure used by large organizations against such type of attacks. This article describes a possibility to apply a sandboxing method within a cloud environment to enforce security perimeter of the cloud.

  • 337.
    Adams, Allison
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Languages, Department of Linguistics and Philology.
    Dependency Parsing and Dialogue Systems: an investigation of dependency parsing for commercial application2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this thesis, we investigate dependency parsing for commercial application, namely for future integration in a dialogue system. To do this, we conduct several experiments on dialogue data to assess parser performance on this domain, and to improve this performance over a baseline. This work makes the following contributions: first, the creation and manual annotation of a gold-standard data set for dialogue data; second, a thorough error analysis of the data set, comparing neural network parsing to traditional parsing methods on this domain; and finally, various domain adaptation experiments show how parsing on this data set can be improved over a baseline.  We further show that dialogue data is characterized by questions in particular, and suggest a method for improving overall parsing on these constructions. 

  • 338. Adams, Liz
    et al.
    Börstler, Jürgen
    What It's Like to Participate in an ITiCSE Working Group2011In: ACM SIGCSE Bulletin, Vol. 43, no 1Article in journal (Other academic)
  • 339. Adams, R.
    et al.
    Fincher, S.
    Pears, A.
    Börstler, Jürgen
    Umeå universitet, Institutionen för datavetenskap.
    Bousted, J.
    Dalenius, P.
    Eken, G.
    Heyer, T.
    Jacobsson, A.
    Lindberg, V.
    Molin, B.
    Moström, J.-E.
    Umeå universitet, Institutionen för datavetenskap.
    Wiggberg, M.
    What is the Word for Engineering in Swedish: Swedish Students' Conceptions of their Discipline2007Report (Other academic)
  • 340. Adams, Robin
    et al.
    Fincher, Sally
    Pears, Arnold
    Börstler, Jürgen
    Boustedt, Jonas
    University of Gävle, Department of Mathematics, Natural and Computer Sciences, Ämnesavdelningen för datavetenskap.
    Dalenius, Peter
    Eken, Gunilla
    Heyer, Tim
    Jacobsson, Andreas
    Lindberg, Vanja
    Molin, Bengt
    Moström, Jan-Erik
    Wiggberg, Mattias
    What is the word for 'Engineering' in Swedish: Swedish students conceptions of their discipline2007Report (Other academic)
    Abstract [en]

    Engineering education in Sweden – as in the rest of the world – is experiencing a decline in student interest. There are concerns about the ways in which students think about engineering education, why they join an academic programme in engineering, and why they persist in their studies. In this context the aims of the Nationellt ämnesdidaktiskt Centrum för Teknikutbildning i Studenternas Sammanhang project (CeTUSS) is to investigate the student experience and to identify and support a continuing network of interested researchers, as well as in building capacity for disciplinary pedagogic investigation.

    The Stepping Stones project brings together these interests in a multi-researcher, multi-institutional study that investigates how tudents and academic staff perceive engineering in Sweden and in Swedish education. The first results of that project are reported here. As this study is situated uniquely in Swedish education, it allows for exploration of “a Swedish perspective” on conceptions of engineering. The Stepping Stones project was based on a model of research capacity-building previously instantiated in the USA and Australia (Fincher & Tenenberg, 2006).

  • 341. Adams, Robin
    et al.
    Fischer, Sally
    Pears, Arnold
    Börstler, Jürgen
    Boustedt, Jonas
    Dalenius, Peter
    Eken, Gunilla
    Heyer, Tim
    Jacobsson, Andreas
    Lindberg, Vanja
    Molin, Bemgt
    Moström, Jan-Erik
    Wiggberg, Mattias
    What is the Word for "Engineering" in Swedisch: Swedish Students Conceptions of their Discipline2007Report (Refereed)
  • 342.
    Adamsson, Gustav
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, Faculty of Science & Engineering.
    Fast and Approximate Text Rendering Using Distance Fields2015Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Distance field text rendering has many advantages compared to most other text renderingsolutions. Two of the advantages are the possibility  to scale the glyphs without losing the crisp edge and less memory consumption. A drawback with distance field text renderingcan be high distance field generation time. The solution for fast distance field text renderingin this thesis generates the distance fields by drawing distance gradients locally over the outlines of the glyphs. This method is much faster than the old exact methods for generating distance fields that often includes multiple passes over the whole image.

    Using the solution for text rendering proposed in this thesis results in good looking text that is generated on the fly. The distance fields are generated on a mobile device in less than 10 ms for most of the glyphs in good quality which is less than the time between two frames.

  • 343.
    Adamsson, Marcus
    et al.
    KTH, School of Computer Science and Communication (CSC).
    Vorkapic, Aleksandar
    KTH, School of Computer Science and Communication (CSC).
    A comparison study of Kd-tree, Vp-tree and Octree for storing neuronal morphology data with respect to performance2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis we investigated performance of Kdtree, Vptree and Octree for storing neuronal morphology data. Two naive list structures were implemented to compare with the space partition data structures. The performance was measured with different sizes of neuronal networks and different types of test cases. A comparison with focus on cache misses, average search time and memory usage was made. Furthermore, measurements gathered quantitative data about each data structure. The results showed significant difference in performance of each data structure. It was concluded that Vptree is more suitable for searches in smaller populations of neurons and for specific nodes in larger populations, while Kdtree is better for volume searches in larger populations. Octree had highest average search time and memory requirement.

  • 344.
    Adamsson, Tim
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Kravrekommendation: En undersökning för kravrekommendationer för Nya Intranätets forum på Karlstad Universitet2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 345. Adawi, Tom
    et al.
    Berglund, Anders
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology.
    Ingerman, Åke
    Booth, Shirley
    On context in phenomenographic research on understanding heat and temperate2002In: EARLI, Bi-annual Symposium, Fribourg, Switzerland, 2002Conference paper (Refereed)
    Abstract [en]

    Starting from an empirical study of lay adults' understanding of heatand temperature, we distinguish between different meanings of "context" inphenomenographic research. To confuse the variation in ways of experiencingthe context(s) of the study with the variation in ways of experiencing thephenomenon of study is to risk losing fundamental insights. We discuss contextas experienced and as interwoven with the experience of the phenomenon, andanalyse its significance in two dimensions: (1) the stage of the research project:formulating the question, collecting data, analysing data and deploying results;and (2) "who is experiencing" the context: the individual, the collective, or theresearcher. The arguments are illustrated from the empirical study.

  • 346.
    Adborn, Mats
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Visualisering av datastrukturer: Utveckling av ett tolkningsverktyg2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Interpretation and assimilation of data structures, organized information andsource code files are frequently occuring during software development. This kindof information is stored in text-based form and its understanding requires greatthoroughness and investment in time from the developer's part. This thesisdescribes the development of a utility program prototype, which automates theparsing of XML data and source code files from the programming languages Cand C++, in purpose of trying to simplify the interpretation process. The programcreates and presents a visual graph of the structure found, using an algorithmwhich can present arbitrary large XML files as well as a limited number ofconcurrent source code files. The effects on the interpretation time and itsreliablity has been evaluated in a survey among software development students.The result showed a certain increase in the number of correct conclusions fromthe participants' side after studying the visual representation compared to itsorignial text-based form. The amount of time used was not measured other thansubjectively by the users themselves, of which a predominant proportionconsidered a reduction in needed time when using the graphical representation.The thesis shows that the use of this or an equivalent utility can enhance theassimilation of data structures by increasing the rate of reliabilty whilesimultaneously decreasing the needed amount of time. Still, the quantifyable gainsof these results remains statistically largely uncertain.

  • 347. Addario-Berry, L
    et al.
    Chor, B
    Hallett, M
    Lagergren, Jens
    KTH, Superseded Departments, Numerical Analysis and Computer Science, NADA.
    Panconesi, A
    Wareham, T
    Ancestral maximum likelihood of evolutionary trees is hard2004In: Journal of Bioinformatics and Computational Biology, ISSN 0219-7200, Vol. 2, no 2, 257-271 p.Article in journal (Refereed)
    Abstract [en]

    Maximum likelihood (ML) (Felsenstein, 1981) is an increasingly popular optimality criterion for selecting evolutionary trees. Finding optimal ML trees appears to be a very hard computational task - in particular, algorithms and heuristics for ML take longer to run than algorithms and heuristics for maximum parsimony (MP). However, while MP has been known to be NP-complete for over 20 years, no such hardness result has been obtained so far for ML. In this work we make a first step in this direction by proving that ancestral maximum likelihood (AML) is NP-complete. The input to this problem is a set of aligned sequences of equal length and the goal is to find a tree and an assignment of ancestral sequences for all of that tree's internal vertices such that the likelihood of generating both the ancestral and contemporary sequences is maximized. Our NP-hardness proof follows that for MP given in (Day, Johnson and Sankoff, 1986) in that we use the same reduction from VERTEX COVER; however, the proof of correctness for this reduction relative to AML is different and substantially more involved.

  • 348.
    Adebomi, OYEKANLU Emmanuel
    et al.
    Blekinge Institute of Technology, School of Computing.
    Mwela, JOHN Samson
    Blekinge Institute of Technology, School of Computing.
    Impact of Packet Losses on the Quality of Video Streaming2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In this thesis, the impact of packet losses on the quality of received videos sent across a network that exhibit normal network perturbations such as jitters, delays, packet drops etc has been examined. Dynamic behavior of a normal network has been simulated using Linux and the Network Emulator (NetEm). Peoples’ perceptions on the quality of the received video were used in rating the qualities of several videos with differing speeds. In accordance with ITU’s guideline of using Mean Opinion Scores (MOS), the effects of packet drops were analyzed. Excel and Matlab were used as tools in analyzing the peoples’ opinions which indicates the impacts that different loss rates has on the transmitted videos. Statistical methods used for evaluation of data are mean and variance. We conclude that people have convergence of opinions when losses become extremely high on videos with highly variable scene changes

  • 349.
    Adegoke, Adekunle
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Osimosu, Emmanuel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Service Availability in Cloud Computing: Threats and Best Practices2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model. This allows organizations to focus on core business goals instead of managing in-house IT infrastructure.                    

    However, as more business critical applications and data are moved to the cloud, service availability is becoming a growing concern. A number of recent cloud service disruptions have questioned the reliability of cloud environments to host business critical applications and data. The impact of these disruptions varies, but, in most cases, there are financial losses and damaged reputation among consumers.        

    This thesis aims to investigate the threats to service availability in cloud computing and to provide some best practices to mitigate some of these threats. As a result, we identified eight categories of threats. They include, in no particular order: power outage, hardware failure, cyber-attack, configuration error, software bug, human error, administrative or legal dispute and network dependency. A number of systematic mitigation techniques to ensure constant availability of service by cloud providers were identified. In addition, practices that can be applied by cloud customers and users of cloud services, to improve service availability were presented.

  • 350.
    Adelöf, Anna
    et al.
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Lindberg, Christina
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Barlow, Lotti
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Gerdin, Ulla
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Bränd Persson, Kristina
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Ericsson, Erika
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Testi, Stefano
    Fackspråk och informatik, Regler och tillstånd, Socialstyrelsen.
    Nyström, Mikael
    Linköping University, Department of Biomedical Engineering, Medical Informatics. Linköping University, The Institute of Technology.
    Förvaltning av SNOMED CT som en del i det nationella fackspråket för vård och omsorg2011Report (Other (popular science, discussion, etc.))
    Abstract [sv]

    Förvaltningsrapporten fokuserar på Snomed CT, eftersom det redan i dag finns rutiner för förvaltningar av termbanken och nationella hälsorelaterade klassifikationer. Ett särskilt utvecklingsarbete kommer att krävas för dessa delar.

    Rapporten tar upp syfte och mål med förvaltningen. Utöver det redogör rapporten för vilka konkreta ansvarsområden som ingår i förvaltningen av Snomed CT. Målet för förvaltningen är att Socialstyrelsen regelbundet ska kunna tillhandahålla en kontrollerad och uppdaterad release av Snomed CT. Det skulle möjliggöra användning inom vård och omsorg. Rapporten tar även upp behovet av kompetens, utbildning och finansiella resurser.

45678910 301 - 350 of 46741
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf