Change search
Refine search result
1234567 101 - 150 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101. Carlsson, Jimmy
    Interoperability issues in large-scale multi-agent systems2003Conference paper (Refereed)
  • 102.
    Carlsson, Jimmy
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Sustainability and service-oriented systems in network-centric environments2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Our modern information society provides us with a tremendous amount of information. Several issues have surfaced due to the complexity inherent in the handling of the information systems. One of the most important issues is that of providing an architecture and methodology that provide for the development and maintenance of complex, distributed information systems. As the information flow and quantity hinders us from having qualitative information when needed, the architecture must address the reach, richness and value of the information. Network-centric warfare is a problem domain that has been initiated to meet the power of information. To be able to support such continouos sustainability, a robust network infrastructure is critical. A systemic perspective on network-centric environments as well as a technical perspective on network-centric environment shows that, although promising, contemporary implementations having a service-oriented architecture lack support for physical scalability and a cognitive decoupling that would provide for multiple users acting on the same environment. Consequently, a service-oriented layered architecture for communicating entities is presented where these issues are addressed. For verification, a demonstrator is developed upon a service-oriented layered architecture for communicating based on a network-centric warfare scenario.

  • 103.
    Chervyakov, Anatoly
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Simulation-based evaluation of berth allocation policies of container terminals2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The aim of this investigation is to test and verify a hypothesis concerning policies for berth allocation to ships in a container terminal. The chosen domain is a rich research area where simulation could be used. Because of the high amount of variables involved and demand for optimal usage of available resources management of a container terminal is a great challenge.

  • 104.
    Collin, Helena
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Karlsson, Veronica
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    EDI eller ebXML: för automatisering av affärsprocesser2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Sammanfattning EDI är ett välkänt och beprövat sätt för företag att automatisera sina affärsprocesser. Det är också välkänt att EDI är dyrt att både inverstera i och att använda. EDI anses också som krångligt att lära sig och att förstå. Detta har gjort att EDI aldrig riktigt har slagit igenom bland små och medelstora företag. Det internationella standardiseringsprojektet ?ebXML?, som sponsras av bland annat av UN/CEFACT och OASIS, har släppt ett ramverk för hur XML ska kunna användas för elektronisk handel, även B2B. Visionen för ebXML är att det ska vara en enkel global standard som ska kunna användas av alla, även små och medelstora företag. Syftet med uppsatsen är att ge en vägledning för små och stora företag vilket av EDI och ebXML som skulle vara bäst för just deras företag. För att få fram detta har vi utgått från fyra olika kriterier, marknadsnisch, kundrelationer, ekonomi och kompetens. Sedan har vi analyserat små företag för både EDI och ebXML i varje kriterium och stora företag för både EDI och ebXML i varje kriterium. Efter varje del har vi gjort en bedömning om hur väl EDI eller ebXML stämmer överens med de krav som finns för företaget under respektive kriterium och gjort en poängbedömning från 1 ? 4, där 4 är bäst. Slutsatsen av analysen blev att för små företag är ebXML bäst, då EDI både är dyrt och kompetenskrävande, vilket kan vara svårt för små företag att klara av. Vår slutsats stämmer väl överens med både visionen för ebXML och erfarenheten som finns kring användandet av EDI. Slutsatsen för stora företag blev ingen markant fördel för något av alternativen. De båda alternativen fick nästan lika många poäng. Stora företag får se vilka kriterier som är viktigast för just deras företag och göra bedömningen utifrån detta. Vi konstaterar också att det finns andra aspekter att titta på när man väljer mellan EDI och ebXML. Det vi trycker mest på är säkerheten som vi inte behandlat i denna uppsats men som är ett viktigt område. Slutligen konstaterar vi att om visionen för ebXML uppfylls så kommer ebXML att bli revolutionerande för utvecklingen av B2B.

  • 105.
    Damm, Lars-Ola
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Evaluating and Improving Test Efficiency2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Test efficiency measures the cost-effectiveness of a test organisation and it is measured by dividing the number of defects found in a test by the effort needed to perform the test. This thesis project investigated whether the Mobile Positioning Centre (MPC) site at Ericsson AB could improve their test efficiency or not. The purpose of the project was to identify areas that could increase the test efficiency by investigating state of the art literature and evaluating the test process at MPC. The evaluation identified unit testing and debugging as the areas at MPC where the test efficiency could be increased the most. The project work resulted in an implementation proposal containing a number of actions that would increase the test efficiency at MPC. Primarily, the actions comprised an improved test tool environment; both enhancements for the existing tools and design suggestions for new test tools. The implementation proposal also included suggestions for how to integrate the test tool improvements with the organisation and processes at MPC.

  • 106. Damm, Lars-Ola
    et al.
    Lundberg, Lars
    Olsson, David
    Automated Software Component Verification and Test-Driven Development2003Conference paper (Refereed)
  • 107. Davidsson, Paul
    A Framework for Preventive State Anticipation2003In: Anticipatory Behavior in Adaptive Learning Systems, Springer , 2003Chapter in book (Other academic)
  • 108. Davidsson, Paul
    A framework for preventive state anticipation2003Conference paper (Refereed)
    Abstract [en]

    A special kind of anticipation is when an anticipated undesired situation makes an agent adapt its behavior in order to prevent that this situation will occur. In this chapter an approach is presented that combines low level reactive and high level deliberative reasoning in order to achieve this type of anticipatory behavior. A description of a general framework for preventive state anticipation is followed by a discussion of different possible instantiations. We focus on one such instantiation, linear anticipation, which is evaluated in a number of empirical experiments in both single- and multi-agent contexts.

  • 109. Davidsson, Paul
    Agent Based Social Simulations: A Computer Science View2002In: JASSS: Journal of Artificial Societies and Social Simulation, ISSN 1460-7425, E-ISSN 1460-7425, Vol. 5, no 1Article in journal (Refereed)
    Abstract [en]

    A description of the area of Agent Based Social Simulation (ABSS) from a computer scientist's perspective is presented. We begin by defining ABSS by positioning it with respect to the three research areas that it is related to, i.e., agent-based computing, the social sciences, and computer simulation. We then discuss the role of ABSS and how it may aid cross-fertilisation between these areas.

  • 110. Davidsson, Paul
    Agent-Based Social Simulation SIG2003In: AgentLink News, ISSN 1465-3842 , no 13Article in journal (Refereed)
  • 111. Davidsson, Paul
    Emergent societies of information agents2000Conference paper (Refereed)
    Abstract [en]

    In the near future, billions of entities will be connected to each other through the Internet. The current trend is that an increasingly number of entities, from smart personal devices to legacy databases, are controlled by software agents. Such agents often also posses a large amount of information about both the entity and its owner. Thus, a likely scenario is that the Internet will be populated by millions of information agents, all potentially able to communicate with each other. Unfortunately, we cannot assume that these agents are benevolent and are willing to cooperate in an altruistic fashion. As the amount of money transferred via the Internet is rapidly increasing caused by the breakthrough of e-commerce, we should actually expect a similar increase in the number of malicious agents. Another aspect that contributes to the complexity of agent interaction on the Internet is a desired openness, making it difficult to engineer agent societies in a top-down manner. Rather, we will here investigate the prerequisites necessary to form stable and trustworthy societies of information agents, and discuss some open problems and methodologies for studying them. The general conclusion is that more research is needed that takes into account the presence of malicious agents.

  • 112. Davidsson, Paul
    Multi agent based simulation: Beyond social simulation2001Conference paper (Refereed)
    Abstract [en]

    Multi Agent Based Simulation (MABS) has been used mostly in purely social contexts. However, compared to other approaches, e.g., traditional discrete event simulation, object-oriented simulation and dynamic micro simulation, MABS has a number of interesting properties which makes it useful also for other domains. For instance, it supports structure preserving modeling of the simulated reality, simulation of pro-active behavior, parallel computations, and very dynamic simulation scenarios. It is argued that MABS is a useful technique for simulating scenarios also in more technical domains. In particular, this hold for the simulation of technical systems that are distributed and involve complex interaction between humans and machines. To illustrate the advantages of MABS, an application concerning the monitoring and control of intelligent buildings is described.

  • 113. Davidsson, Paul
    et al.
    Boman, Magnus
    A multi-agent system for controlling intelligent buildings2000Conference paper (Refereed)
  • 114. Davidsson, Paul
    et al.
    Boman, Magnus
    Saving Energy and Providing Value Added Services in Intelligent Buildings: A multi-agent system approach2000Report (Other academic)
    Abstract [en]

    In a deregulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a collection of software agents that monitor and control an office building. It uses the existing power lines for communication between the agents and the electrical devices of the building, such as sensors and actuators for lights, heating, and ventilation. The objectives are both energy saving and increasing customer satisfaction through value added services. Results of qualitative simulations and quantitative analysis based on thermodynamical modeling of an office building and its staff using four different approaches for controlling the building indicate that significant energy savings, up to 40 per cent, can be achieved by using the agent-based approach. The evaluation also show that customer satisfaction can be increased in most situations. In fact, this approach makes it possible to control the trade-off between energy saving and customer satisfaction (and actually increase both in comparison with current approaches).

  • 115.
    Davidsson, Paul
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Johansson, Stefan J.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Evaluating multi-agent system architectures: A case study concerning dynamic resource allocation2003Conference paper (Refereed)
    Abstract [en]

    Much effort has been spent on suggesting and implementing new architectures of Multi-Agent Systems. However, we believe the time has come to compare and evaluate these architectures in a more systematic way. Rather than just studying a particular application, we suggest that more general problem domains corresponding to sets of applications should be studied. Similarly, we argue that it is more useful to study the properties of classes of multi-agent system architectures than particular architectures. Also, it is important to evaluate the architectures in several dimensions, both different performance-related attributes, which are domain dependent and more general quality attributes, such as, robustness, modifiability, and scalability. As a case study we investigate the general problem of "dynamic resource allocation" and present four classes of multi-agent system architectures that solve this problem. These classes are discriminated by their degree of distribution of control and degree of synchronization. Finally, we instantiate each of these architecture classes and evaluate, through simulation experiments, how they solve a concrete dynamic resource allocation problem, namely load balancing and overload control of Intelligent Networks.

  • 116. Davidsson, Paul
    et al.
    Johansson, Stefan J.
    Persson, Jan A.
    Wernstedt, Fredrik
    Agent-based Appoaches and Classical Optimization Techniques for Dynamic Distributed Resource Allocation: A preliminary study2003Conference paper (Refereed)
  • 117. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    A Framework for Evaluation of Multi-Agent System Approaches to Logistics Network Management2004In: An Application Science for Multi-Agent Systems / [ed] Wagner, Thomas A., Springer , 2004Chapter in book (Refereed)
  • 118. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    A Multi-Agent System Architecture for Coordination of Just-in-time Production and Distribution2002Conference paper (Refereed)
    Abstract [en]

    A multi-agent system architecture for coordination of just-in-time production and distribution is presented. The problem to solve is two-fold: first the right amount of resources at the right time should be produced, and then these resources should be distributed to the right consumers. In order to solve the first problem, which is hard when the production and/or distribution time is relatively long, each consumer is equipped with an agent that makes predictions of future needs that it sends to a production agent. The second part of the problem is approached by forming clusters of consumers within which it is possible to redistribute resources fast and at a low cost in order to cope with discrepancies between predicted and actual consumption. Reallocation agents are introduced (one for each cluster) to manage the redistribution of resources. The suggested architecture is evaluated in a case study concerning management of district heating systems. Results from a preliminary simulation study show that the suggested approach makes it possible to control the trade-off between quality-of-service and degree of surplus production. We also compare the suggested approach to a reference control scheme (approximately corresponding to the current approach to district heating management), and conclude that it is possible to reduce the amount of resources produced while maintaining the quality of service. Finally, we describe a simulation experiment where the relation between the size of the clusters and the quality of service was studied.

  • 119. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    A Multi-Agent System Architecture for Coordination of just-in-time Production and Distribution2003In: Knowledge Engineering Review, ISSN 0269-8889 , Vol. 17, no 4, p. 317-329Article in journal (Refereed)
  • 120. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    A Multi-Agent System Architecture for Coordination of Just-in-time Production and Distribution (extended version).2002In: Knowledge engineering review (Print), ISSN 0269-8889, E-ISSN 1469-8005, Vol. 17, no 4, p. 317-329Article in journal (Refereed)
    Abstract [en]

    A multi-agent system architecture for coordination of just-in-time production and distribution is presented. The problem to solve is twofold: first the right amount of resources at the right time should be produced, then these resources should be distributed to the right consumers. In order to solve the first problem, which is hard when the production and/or distribution time is relatively long, each consumer is equipped with an agent that makes predictions of future needs that it sends to a production agent. The second part of the problem is approached by forming clusters of consumers within which it is possible to redistribute resources fast and at a low cost in order to cope with discrepancies between predicted and actual consumption. Redistribution agents are introduced (one for each cluster) to manage the redistribution of resources. The suggested architecture is evaluated in a case study concerning management of district heating systems. Results from a simulation study show that the suggested approach makes it possible to control the trade-off between quality of service and degree of surplus production. We also compare the suggested approach to a reference control scheme (approximately corresponding to the current approach to district heating management), and conclude that it is possible to reduce the amount of resources produced while maintaining the quality of service. Finally, we describe a simulation experiment where the relation between the size of the clusters and the quality of service was studied.

  • 121. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    Characterization and Evaluation of Just-in-Time Production and Distribution2002Conference paper (Refereed)
  • 122. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    Intelligent fjärrvärme2003In: Teknik & Vetenskap, ISSN 1402-5701, no 4Article in journal (Refereed)
  • 123. Davidsson, Paul
    et al.
    Wernstedt, Fredrik
    Software agents for bioprocess monitoring and control2002In: Journal of chemical technology and biotechnology (1986), ISSN 0268-2575, E-ISSN 1097-4660, Vol. 77, no 7, p. 761-66Article in journal (Refereed)
    Abstract [en]

    We argue for the appropriateness of using software agents for the monitoring and control of bioprocesses. Different approaches to the design of individual agents as well as complete multi-agent systems are discussed. This is followed by a brief discussion of a number of successful agent-based monitoring and control applications from different domains. We conclude by discussing the advantages and disadvantages of agent technology for monitoring and control of bioprocesses. © 2002 Society of Chemical Industry.

  • 124.
    Denebo, Petra
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Linder, Anna-Katrine
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Privacy: Plug the Internet Peep Hole2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The Internet is a relatively new technology that has developed explosively during the last 10 years. The Internet-technology has been accepted rapidly by users, but the legal and ethical aspects have not been updated at the same rapid rate. Trust in electronic services or products is founded on knowledge and an understanding of what happens during a session and of the effects that might occur. Within electronically based services there are obvious risks for invisible and undesired results such as intrusions on privacy. In the traditional relationship of a service provider and a user, the question of privacy is clear, whereas in the new, Internet-related relationship between a service provider and a user, it is not. We have performed an informed survey concerning privacy, carried out through interviews. From the answers in the interviews it is clear that the threat against privacy is perceived as a problem, but that it is overshadowed by other issues such as safe conducts of payment, functioning distribution systems and reclamation etc. This could be due to the difficulty of addressing an intangible problem such as privacy when there are other issues that are as important and easier to address since they concern an actual purchase. To increase the trust of the users in the Internet and e-commerce branch, we believe that the Internet peephole needs to be plugged from within the branch. A user should neither have to worry about where his or her personal information goes or who has access to it nor for which purpose it will be used. The users must be made aware of what threats their information faces and which certificates that can protect it. If the providers of products and services on the Internet do not gain the trust of the users, in the end, cyberspace will be a desolate place.

  • 125. Dittrich, Yvonne
    Anwendungsorientierung und Empirische Forschung in der Softwaretechnik.2001Conference paper (Refereed)
    Abstract [en]

    Empirische Forschung und Kooperation mit Industrie werden für die Softwaretechnik immer wichtiger. Methoden und Werkzeuge aus der Forschung müssen sich in dieser Praxis bewähren. Sinnvoll ist daher, sie zusammen mit denjenigen zu entwickeln, die sie später vielleicht anwenden werden. Anwendbarkeit von Software ist immer noch eine der problematischsten Eigenschaften. Mehr als 70% der Softwareentwicklungskosten entfallen auf Wartung, (Nosek, Palvia 1990) ein Grossteil davon auf ?perfektive' Wartung, die Anpassung von Software an sich ändernde oder sich mit erst in der Nutzung herauskristallisierende Anforderungen. Evolutionäre Softwareentwicklung und Methoden, die die Teilnahme von künftigen Anwendern bei der Gestaltung von Software zulassen, sind mittlerweile fast 15 Jahre alt. Trotzdem werden sie in industriellen Kontexten kaum, zumindest nicht bewusst, eingesetzt. Mittels empirischer Forschung, die eine kooperative Methodenentwicklung unterstützt, kann es gelingen, anwendbarere Methoden zu entwickeln.

  • 126. Dittrich, Yvonne
    Computeranwendungen und sprachlicher Kontext. Zu den Wechselwirkungen zwischen normaler und formaler Sprache bei Einsatz und Entwicklung von Software1997Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Menschliche Sprache wird in der traditionellen Softwaretechnik als Problem betrachtet. Sie gilt als ungenuegend zur Spezifikation und Entwicklung von Computeranwendungen. Die Flexibilität und Offenheit normaler Sprache ermöglicht es auf der anderen Seite, ueber immer neue Bereiche auf verschiedenste Art zu kommunizieren und zu reflektieren. Wie kann diese kreative Seite menschlicher Sprache bei Entwicklung und Gestaltung von Software beruecksichtigt werden? Anhand des Begriffs der symbolischen Maschine von Sybille Krämer und der Sprachtheorien Humboldts und Wittgensteins werden die im Kontext der Argumentation wichtigen Eigenschaften formaler und normaler Sprache herausgearbeitet. Ansätze zur Gestaltung von Computeranwendungen, die ihre Einbettung in nrmale Sprache beruecksichtigen, und zur Einbeziehung von normlaer Sprache bei der Softwareentwicklung werden aufgezeigt.

  • 127. Dittrich, Yvonne
    Doing Empirical Research on Software Development: Finding a Path between Understanding, Intervention and Method Development2002In: Social Thinking: Social Practice / [ed] Dittrich, Yvonne; Floyd, Christiane; Klischewski, Ralf, MIT Press , 2002, p. 243-262Chapter in book (Other academic)
  • 128. Dittrich, Yvonne
    Doing empirical research on Software Development: Finding a path between Understanding, Intervention, and Method Development.2002In: Social Thinking Software Practice. / [ed] Dittrich, Y; Floyd, C; Klischewski, R, MIT Press , 2002Chapter in book (Other academic)
  • 129. Dittrich, Yvonne
    Shopping Web-shopping Web-shop Web-selling Selling Teaching Software Development together with Work Practice Studies1999Conference paper (Refereed)
    Abstract [en]

    In this article I want to share the experiences of developing an interdisciplinary course which brings together design oriented work practice studies and software development. The development and the teaching of this course took place as part of the study program 'People, Computers, and Work' bringing together human work science and computer science. To relate work practice studies and software development in a fruitful way, we had to change not only the organization of the projects and the layout of the course. It required also relating paradigms and methods on both sides. The teachers had to learn about each other's disciplines, too. An example of one of the projects - a web-shop for stationary - illustrates the way the students worked. Us teachers learned also a lot: Both ethnographic methods to study the workplace and software development methods change if really brought together. The variety of ways of relating work practice studies to software development surprised us. We explored common themes relevant for the interdisciplinary practice. And we learned a lot about how to teach this kind of projects.

  • 130. Dittrich, Yvonne
    We are not yet there! in debate with Eevi Beck's P for Political2003In: Scandinavian Journal of Information Systems, ISSN 0905-0167 , Vol. 15, p. 91-94Article in journal (Refereed)
  • 131.
    Dittrich, Yvonne
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Eriksén, Sara
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Situated Innovation. Exploring co-operation in innovation and design between researchers and users and providers of ICT2003Conference paper (Refereed)
    Abstract [en]

    Co-operation between research and industry and society, and the notion of innovation systems, are high on the agenda of national as well as international research politics. However, how to make co-operation between researchers and practitioners work, and what kind of research results could come out of such co-operation, is hardly discussed. The article uses evidence from three projects in the areas e-government and telecommunication to reflect on such co-operation. Scientific understanding and practices of design, development and use of ICT challenge and inform each other in these co-operative projects, which we have started to refer to as ‘situated innovation’. The article discusses the role of the researcher in such contexts, the character of the research results, and means to co-ordinate different rhythms and rationales in order to make research and practices of ICT development and use mutually enhancing.

  • 132.
    Dittrich, Yvonne
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Floyd, ChristianeKlischewski, Ralf
    Social Thinking Software Practice2002Collection (editor) (Other academic)
  • 133. Dittrich, Yvonne
    et al.
    Lindeberg, Olle
    Can Software Development be too Use Oriented? Going Native as an issue in Participatory Design.2001Conference paper (Refereed)
    Abstract [en]

    In participatory design there is a risk that the emphasis on the co-operation with future users let the developers forget to step back and reflect on what they learned. In this article we report about a case study of a software project and the resulting system. In spite of a user oriented way of developing the system, problems showed up both when using the software and when the developers later tried to modify it. Part of the reason for the problems was the (lack of) structure in the system. We use the 'going native' - a well discussed methodological issue in ethnography - as a metaphor. The ethnographer have to both 'go native' to be able to understand the culture studied but also step back and reflect. In the same way the software developer has to 'step back' and reflect and form their own conceptual model.

  • 134. Dittrich, Yvonne
    et al.
    Lindeberg, Olle
    Designing for changing Work and Buisness Practices.2002In: Evolutionary and Adaptive Information Systems, Idea Group Publishing , 2002Chapter in book (Other academic)
  • 135. Dittrich, Yvonne
    et al.
    Lindeberg, Olle
    How use-oriented development can take place2004In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 46, no 9, p. 603-617Article in journal (Refereed)
    Abstract [en]

    Usability is still a problem for software development. As the introduced software changes the use context, use qualities cannot be fully anticipated. Close co-operation between users and developers during development has been proposed as a remedy. Others fear such involvement of users as it might jeopardize planning and control. Based on the observation of an industrial project, we show how user participation and control can be achieved at the same time. The present article discusses the specific measures that allowed for co-operation between users and developers in an industrial context. It indicates measures to improve software development by focusing on use-orientation, i.e. allowing for user-developer co-operation.

  • 136. Dittrich, Yvonne
    et al.
    Lindeberg, Olle
    Ludvigsson, Ingela
    Lundberg, Lars
    Wessman, Bengt
    Diestelkamp, Wolfgang
    Tillman, Marie
    Design for Change2001Report (Other academic)
    Abstract [en]

    The report summarises the first year of the research project 'Design for Design in Use of Database Applications'. It focuses on end user tailoring and adaptable systems.

  • 137. Dittrich, Yvonne
    et al.
    Lundberg, Lars
    Lindeberg, Olle
    End-User Development by Tailoring. Blurring the border between Use and Development2003Conference paper (Refereed)
  • 138.
    Dittrich, Yvonne
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mörch, Anders
    Wulf, Volker
    Tailoring Co-operation2003Report (Refereed)
    Abstract [en]

    Tailoring is an area of research in CSCW that allows interlacing design and use in a radical new way. Tailoring is closely related to end-user programming (e.g. spreadsheet development)and a general term to encompass both endeavours is End-User Development. This workshop address tailorability in context of evolving existing systems and applications to the needs of cooperative work practices and organisations. It includes also the cooperative activates of tailoring itself; i.e. collaboration between end users to accomplish tailoring and indirect collaboration between developers and end users to simplify the understanding of tailorable systems. The goal of the workshop is to compare and relate existing research on tailoring and enduser development in the CSCW community, to explore the challenges and future potentials of these technologies, and to identify further directions for research on end-user development in cooperative settings. The workshop is organised in co-operation with the European network of excellence on End-User development. (http://giove.cnuce.cnr.it/eud-net.htm

  • 139. Dittrich, Yvonne
    et al.
    Rönkkö, Kari
    Talking Design: Co-Construction and Use of Representations in Software Development1999Conference paper (Refereed)
    Abstract [en]

    Software development differs from other design work insofar as the object to be designed is not visible. Representations play an important role. Even as they only describe aspects of the later software, they mediate the common design work. Software engineering literature focuses on persistent representations, documents, diagrams, mock-ups, or similar things. Our article puts 'talking design', where the software is represented in utterances, sounds, and enactment, in the centre. With the help of concepts from the CSCW discourse, we conceptualise what is happening here; the collaborative object for the design talk is not given, it has to be collectively constructed. Software development can be regarded as routine co-construction. In our case the protocol of that design meeting seemed to serve as a reminder for the participants rather than as in itself representing the design decided upon. The design meeting, we focus in this article, was part of a distributed software development project, with a larger project situated in Ronneby, Sweden and a smaller one in Oulu, Finland. If important parts of design are collectively constructed during such meetings, what does that imply for co-operation, co-ordination and division of labour in software development projects? How can a common practice be developed among distributed work groups?

  • 140.
    Djurström, Ann-Chatrin
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Holgersson, Ewa
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Jonsson, Isabell
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Automated Test Activity for Software2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Software producing companies want to increase their quality and efficiency. They often look at automated test tools as a part of a solution. Not many company's use test tools, the time it takes to evaluate which test tool that suites the company best costs much in both money and time. The development process within the IT world is so fast, this makes it difficult for any enterprise to put money in a test tool that may be useless within a few years. For a test tool to be valuable for a company it must be used during at least a few years. An automated test takes a lot of time to implement and introduce in the company. To get the whole picture when to automate test we have looked at different test methodologies. Step-by Step Method uses tables and lists to create the test document. Product Life Cycle Method (CPU) describes implementing of software test in the product life cycle. Well-developed test methods can save a lot of time and make it possibly for developers to work effectively. We have also investigated some general information about automated test like cost and when to automate. ATLM (Automated Test Life-Cycle Methodology) is a methodology that is used in order to take the correct decisions such as when to automate or not, (ATLM) is a structured methodology aiming toward ensuring a successful implementation. We have also described some methods of automated tools. The Record/Playback Method is a feature that executes the test manually while the test tool sits in the background and remembers what has happened. It generates a script that can re-execute the test. The Functional Decomposition Method and The Key-Word Driven Method are a data-driven automated testing methodology. That allows developing automated test scripts that are more "generic". It requires only that the input and the expected results have been updated. In this study we have examined automated test tools offered by Rational, Segue Software Inc and Mercury Interactive to survey the tools on the market. Segue Software Inc is aimed for e-business systems. Rational is a big company and has solutions for all parts in a software project. Mercury Interactive has several test solutions for testing and monitoring business- critical Web applications, and the WinRunner is most complex of the offered tools.

  • 141.
    Dowert, Michael
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Karlsson, Tommy
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Software Monitoring & Repair2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Web-hosting is a well established industry with a wide range of actors with different size and quality of service. One of the challenges for these companies is to setup a system that guarantee uptime around the clock. Web-hosts must be able to assure high reliability to its customer, in order to provide better services than the many competitors that exist on the market. This requires a lot of resources from the companies in form of hardware, software or personnel that monitor the operation 24 hours per day each day of the week. A problem is that small and medium sized companies with up to approximately 10000 customers can’t afford these extra costs for personnel and must therefore rely on other monitoring solutions to be competitive. This thesis will show how automatic monitoring tools can replace some of the responsibilities, performed by human personnel. The tools will also be evaluated and compared with similar tools available on the market. An economic model, that can be used to determine if the solution is worth investing in , is also described.

  • 142.
    Dzamashvili, Nina
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Improving process efficiency: a case study2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Almost everybody in the software engineering world has read about or has heard of the importance and benefits of the mature software process. This master thesis aims to answer the question why despite all the efforts; software organizations still have difficulties to achieve the mature and effective software process. The results of the literature survey and a case study performed at a real software company have shown that there is a set of factors that may cause process inefficiency in the software companies. These factors are connected with the soft aspects of the software process such as motivation of the software engineers, process understanding and the process training.

  • 143.
    Edström, Tobias
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Rosberg, Christian
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Adopting Mobile Internet? Findings from a Study on Mobile Internet Services Using a User Centred Perspective2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this master thesis we investigate Mobile Internet with the help of a user perspective and discuss the problems of Mobile Internet today. As the Internet revolution evolves into the Mobile Internet revolution the need for usable and desirable wireless services is increasing. Designing web based services for mobile devices and mobile users is significantly different than designing web based services for desktop use. Not only are there differences in the underlying technology but also, and perhaps most important, in the way people use the services. Our main purpose in this thesis is to investigate the occurrence of Mobile Internet from a user’s perspective, to present a definition of Mobile Internet and provide a deeper understanding of the phenomenon. The main objective is to present a theoretical framework regarding Mobile Internet usage and to investigate which user related factors to consider when developing services adapted for mobile use.

  • 144.
    Edström, Tobias
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Rosberg, Christian
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Artefakter i utveckling: Om designartefakters betydelse i en utvecklingsprocess2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Genom att föra samman människor med olika bakgrund och utbildning kan åtskilliga idéer skapas, nya metoder utvecklas och mer kreativa och originella designlösningar produceras. Baksidan är, att ju fler olika människor med olika bakgrund som är involverade i ett projekt desto svårare blir det att kommunicera inom gruppen av olika individer och svårare att komma vidare i en design- och utvecklingsprocess. Vi har under våren deltagit som en del i ett större programvaruutvecklingsprojekt och skapat och använt oss av flera olika designartefakter som medel för att främja samarbete, kommunikation och designarbetet av den produkt vi utvecklade. I denna uppsats beskriver vi hur dessa designartefakter har kommit till, förändrats och hur de har påverkat oss och vårt designarbete. Syftet med uppsatsen är att visa på vilket sätt man kan integrera metoder från olika discipliner i ett programvaruutvecklingsprojekt och framförallt hur arbetet med, och kring designartefakter spelar en viktig roll i utvecklingen av en produkt.

  • 145. Ekdahl, Bertil
    Approximation of anticipatory systems1998Conference paper (Refereed)
    Abstract [en]

    In Systems Science and Computer Science, it is still customary to consider systems from a syntactically point of view. It is argued that, unlike causal systems, anticipatory systems should be studied from a linguistic point of view. Since language is complementarity in the sense that it consist of a description part and an interpretation part, language has to be considered holistically, i.e. language can not be fragmented into its part. Ibis has the consequence that anticipatory systems should be divided into description based and model-based where model is taken in its semantical meaning. The complementarity view now implies that model-based anticipatory systems, like planning creatures, is not describable and at first glance this seems to be a serious limitation. However, it can effectively be overcome by the productivity of Turing machines, meaning that every acting model-based anticipatory system can, with arbitrary accuracy, be approximated by a description-based anticipatory system. It has the consequence that there will be no limitation in understanding and building systems although we will never be able to construct a system which contain its own interpretation (model).

  • 146.
    Eklund, Eva
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Henriksson, Eva
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    UML i teori och praktik2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Abstract During object-oriented system development, programming should be preceded by analysis and design to assure that the system fulfils the demands of the customer and simplify during the development phase and documentation. When modeling the analysis and design phases, several different notations may be used. One of these is the UML (Unified Modeling Language) which this thesis will cover. The aim is to compare the use of the UML i practice versus what is said in the literature. The investigation is built upon interviews at different companies to receive their reflections about the UML. Questions at issue are why and when the selected companies use the UML and what diagrams they use. We also investigate whether they strictly follow the UML notation or complement it with another kind of notation. Moreover two companies not using the UML was interviewed to find out why they have chosen not to. The thesis starts with an introduction to object-oriented system development with analysis and design followed by the history of the UML and its most common diagrams according to Larman [1]. These diagrams are use case, conceptual model, system-sequence diagram, contract, interaction diagram, class diagram and state diagram. Each diagram is explained with text and graphics. The most important results are that the UML is considered being adequate to the system developers. They use a number of the most common diagrams. Furthermore the CASE-tools showed not to meet the demands of the developers. We believe that inadequate tools hinders the future diffusion of the UML on the market. Improved tools for modeling and documentation are desired for all of the interviewed companies.

  • 147.
    Eklund, Sophie
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Gunnarsson, Daniel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    The Rational Unified Process: A study on risk awareness2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Introduction to problem: Many software development projects today have a tendency to fail on some level. Even though they may not fail entirely, they might be completed with schedule delays, budget overrun or with poor quality that do not meet the customer?s requirements. When a project fails in some way, it is because one or many project risks have occurred. Our own opinion in this matter is that if the project team members are more aware of the project?s risks, it might increase the probability of project success. Therefore, we wanted to explore the area of risk awareness. We contacted Volvo Information Technology AB and through discussions we decided to investigate risk awareness when using one of their software project methods. That method was the Rational Unified Process. This report has not been conducted because Volvo IT considers this to be a problem that they wanted to investigate. Instead, we wanted to investigate this since we find the area of risk awareness among project team members interesting and we were able to do this with help from Volvo IT. Even though we mention the term ?project success? in this report, we will not investigate this in the report. Hypothesis: ?By using the Rational Unified Process, a higher awareness of the risks can be achieved by all team members of the project? Aim: The aim of this report is to investigate if risk awareness among project team members increases when software development projects make use of the Rational Unified Process. Method: We have used a web-based questionnaire to gather information. Four projects at Volvo Information Technology AB were contacted and asked to participate in the questionnaire. Two of these were using RUP and two did not use RUP. Personal e-mails were later sent out to each of the project managers with a description of the aim of our research and the way it would be carried out. The participants had a total of seven workdays to fill out the questionnaire. After seven days the site of the questionnaire were closed down. Conclusion: The differences in answers to certain questions have been rather significant between the two project methods. On the whole though, the answers have been positive for both project methods from a risk awareness point of view. Therefore, it seems to us that risk awareness is not dependent on the project method that is being used. We feel that we have not received enough convincing proof that members of RUP projects possess a higher awareness of project risks than non-RUP project members. Therefore we are of the opinion that we cannot verify our hypothesis.

  • 148.
    Ekström, Dan
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Securing a wireless local area network: using standard security techniques2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Wireless equipment offers several possibilities which make it more attractive than the wired alternative. Meetings or temporary office spaces could be assigned with less consideration of the presence of permanent networking facilities. It also makes it possible for users to create ad-hoc networks simply by being within a certain range of each other, which facilitates information sharing. Since information is broadcasted in the air, it also requires stringent security measures. Vendors of wireless equipment have their non-standard security solutions which lock-in the acquirer. For this purpose I study standard security schemes which could be applied independent of the wireless device manufacturer. The techniques that I have chosen are IPSec, Kerberos and MS Passport. The study describes each technique from the perspectives of manageability, security, performance, compatibility, cost and ease of implementation. The result is a comparison of the studied techniques. I conclude with a recommendation to use a combination of IPSec and Kerberos to enhance the security of a wireless local area network and a reservation towards MS Passport.

  • 149.
    Elofsson, Fredrik
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Larsson, Anders
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Analys av webbservertrafik2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    ABSTRACT This essay is about traffic analysis of Web servers. The purpose is to investigate if companies analyse the traffic on the Web server and if they use this information to create more than simple statistic reports. The questions that we will answer are the following: ? How common is traffic analysis on the Web server among companies? ? Is the Web administrator limited in analysing the Web traffic, if the company has the website on a Web hotel? ? Does the company uses the results they get from analysing the traffic on the Web server for updates and changes on the Web page? To answer these questions we made a questionnaire investigation by telephone interviewing the companies? webmasters. The extent of the investigation was 20 companies in Blekinge. The information we gathered from the investigation showed that it is becoming more common that companies analyse the traffic on the Web page and that they uses the information to more than statistic reports, for example updates and changes of the Web page. Based on the investigation we did a statistical comparison between the companies which analysed their traffic and the companies which not analysed their traffic on the Web server. We compared the turnover?s growth for the last four years. From the results of the comparison we could not draw any statistical conclusions that the traffic analysis can have any direct influence on the company?s business activity, but we may discern a trend that the companies, which analyse the traffic, had a stronger growth of the turnover. Because of these conclusions we couldn?t confirm the hypothesis as follows: ?The information that you can extract by analyse the traffic on the Web server can be used to improve the business activity of companies.? Our essay has however led us to gather some trends. The analysing tools have developed essentially the last years, but it?s hard to se that analyse has a direct influence on the business activity, which implies that our hypothesis is false. The development of analysing tools where more than one data source is connected to traffic analysing is probably going to make it easier to se the influence on the business activity in the future.

  • 150. Elwing, Robert
    et al.
    Paulsson, Ulf
    Lundberg, Lars
    Performance of SOAP in Web Service Environment Compared to CORBA.2002Conference paper (Refereed)
    Abstract [en]

    Web Services is a new concept that promises flexibility and interconnection between different systems. The communication in Web Services uses SOAP $Simple Object Access Protocol, which is based on XML. We have together with an industrial partner made experiments with SOAP in a Web Service environment to find out the response time using SOAP compared to CORBA. It turns out that a direct and naive use of SOAP would result in a response time degradation of a factor 400 compared to CORBA. We identified the major reasons for the poor performance of SOAP and evaluated some performance improvement techniques. After applying these the techniques, the performance of CORBA is 7 times better compared to SOAP.

1234567 101 - 150 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf