Change search
Refine search result
1234567 151 - 200 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Eriksson, Camilla
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Eriksson, Linda
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Jeansson, Therese
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Brandväggar ur hemanvändarens perspektiv2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Det huvudsakliga syftet med denna rapport var att undersöka några av marknadens brandväggsprogram som kunde tänkas vara lämpliga för vår målgrupp, det vill säga en hemanvändare. Detta eftersom det idag inte finns någon lättillgänglig information inom detta område. I sökandet av brandväggsprogram fann vi en uppsjö av olika typer av brandväggar och därför har denna undersökning avgränsats till endast fyra brandväggsprogram, nämligen Norton Personal Firewall, Sygate Personal Firewall, Tiny Personal Firewall samt Zone Alarm. Denna avgränsning gjordes genom att välja ut de som experter inom området utvärderat och har ansett vara de som är säkerhetsmässigt bäst på marknaden. Undersökningsgruppen bestod av 28 testare som passade in i vår definition av en hemanvändare. Tyngdpunkten i vår rapport har lagts på brandväggsprogrammens användarvänlighet, eftersom vår hemanvändare oftast inte besitter de tekniska kunskaper som i allmänhet krävs. Med denna undersökning ville vi få fram vilka kriterier ett brandväggsprogram skulle uppfylla för att det skall klassas som användarvänligt. Vi behandlade även områdena informationslänkar/hjälpfunktioner, användarmanual, installation, programdelen och avinstallation för varje brandväggsprogram. I undersökningen har vi använt oss av tidigare gjorda tester om brandväggsprogram, och när det gäller användarvänlighet har vi använt oss av litteratur som behandlar detta ämne. Undersökningen omfattar inte brandväggarnas säkerhet eftersom vi valde att fokusera rapporten på användarvänligheten hos brandväggsprogrammen. Vår empiriska studie bestod av frågeformulär och egna utvärderingar av undersökningens brandväggsprogram. Samtliga i undersökningsgruppen bedömde att brandväggsprogrammens användarvänlighet var hög, förutom hos ett av programmen. Dessutom visade undersökningen att användarvänligheten hos ett brandväggsprogram var ett av de kriterier som vi inte trodde skulle rankas så högt. Det visade sig dock vara väldigt viktigt för vår målgrupp. Slutsatsen från denna undersökning blev att Norton Personal Firewall, Sygate Personal Firewall samt Zone Alarm var de brandväggsprogram som var användarvänliga enligt undersökningsgruppen. Dock var Norton Personal Firewall det brandväggsprogram som klassades som mest användarvänligt. Tiny Personal Firewall var det enda brandväggsprogram som inte kunde klassas som användarvänligt.

  • 152.
    Eriksson, Daniel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Resource Allocation Guidelines: Configuring a large telecommunication application2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Changing the architecture of the Ericsson Billing Gateway application has shown to solve the problem with dynamic memory management that decreased the performance. The new architecture that is focused on processes instead of threads showed increased performance. It also allowed for the possibility to adjust the process / thread configuration towards the network topology and hardware. Measurements of different configurations showed the importance of an accurate configuration and also that certain guidelines could be established based on the results.

  • 153.
    Eriksson, David
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Designing an object-oriented decompiler: Decompilation support for Interactive Disassembler Pro2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Decompilation, or reverse compilation, takes a computer program and produces high-level code that works like the original source code. This makes it easier to understand a computer program when source code is not available. However, there are very few tools for decompilation available today. This report describes the design and implementation of Desquirr, a decompilation plug-in for Interactive Disassembler Pro. Desquirr has an object-oriented design and performs basic decompilation of programs running on Intel x86 processors. The low-level analysis uses knowledge about specialized compiler constructs, called idioms, to perform a more accurate decompilation. Desquirr implements data flow analysis, meaning the conversion from primitive machine code instructions into code in a high-level language. The major part of the data flow analysis is the Register Copy Propagation which builds high-level expressions from primitive instructions. Control flow analysis, meaning to restore high-level language constructs such as if/else and for loops, is not implemented. A high level representation of a piece of machine code contains the same information as an assembly language representation of the same machine code, but in a format that is easier to comprehend. Symbols such as ?*? and ?+? are used in high-level language expressions, compared to instructions such as ?mul? and ?add? in assembly language. Two small test cases which compares decompiled code with assembly language shows promising results in reducing the amount of information needed to comprehend a program.

  • 154.
    Eriksson, Jeanette
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Interaction Views in Architectures for ActionBlocks: To Each His Own2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This master thesis is done in collaboration with Space and Virtuality studio of the Interactive Institute in Malmö. The project ActionBlocks, at the Space studio, relate to the requirements concerning hardware for ubiquitous computing. A system of intelligent building blocks is developed to be able to build functional HiFi prototypes fast. The building blocks are distributed in space and small, cheap web servers, called TINI, integrate the devices. ActionBlocks may be regarded as physical interfaces. The intention is that systems of different ActionBlocks (tag readers, digital cameras, loud-speakers, lamps, buttons etc.) may easily be constructed to support interaction with digital media in different projects. To be able to do this the ActionBlocks need to be assembled by a flexible architecture that can change when the needs alter. The goal with this thesis is to propose a concept for such an architecture. Except for the concept the thesis also contains an investigation of related architectures to explore what user aspect they have in the various projects and an implementation of a minor prototype to discover if the concept is valid in practice. ActionBlocks consist of an intelligent (digital) part and a physical part and it is possible to discern three different approaches towards the ActionBlocks. There are: · Physical - Action approach where the physical part and what happens in the real world is what matters. · Physical - Computational - Action approach where both parts are integrated on equal terms. · Computational approach where the intelligent part is most important and this view makes it possible for an ActionBlock to only contain an intelligent part. The approaches are entertained by three different user roles: the user, the interaction designer and the programmer. The user only interacts with the physical part of the ActionBlocks and is therefore only concerned about that part. He designs in use of ActionBlocks. The interaction designer assembles the ActionBlocks into a system. He configures the system and is concerned about the performance and the appearance of the ActionBlocks. Therefore he focuses on both the intelligent and the physical part. The interaction designer designs the interaction with the ActionBlocks. The programmer is the one that controls what can be done with an ActionBlock. He designs ActionBlocks. In development only the computational part is of interest because it is the only thing the programmer interacts with. The three ways to interact with ActionBlocks have an internal relationship. Development is needed to alter the possibilities to do configuration and use. The configuration forms a platform to use, because it provides new possibilities to customize it. This leads to a division into three aspects: Use, configuration and development. The partition makes it possible to focus on one aspect at a time. The three aspects have it counterparts in three different architectures: Pure Peer-to-Peer, Peer-to-Peer with distributed service and client-server architecture. The result is that the concept for an architecture for ActionBlocks is divided into three parts. One for each aspect. The concepts suggests that when the user interacts with the system the architecture is Peer-to-Peer and when the interaction designer interact with the system it is a Peer-to-Peer architecture with distributed service and when the programmer interacts with the system he can regard it as an client-server architecture. The concluding question is if there really is a reason to adapt the architecture to different aspects. My answer is that there is always an reason to adapt the technology to the human if it is possible.

  • 155. Eriksson, Jeanette
    et al.
    Dittrich, Yvonne
    Leaving Variability Management to the End User; A Comparison Between Different Tailoring Approaches2003Conference paper (Refereed)
  • 156. Eriksson, Jeanette
    et al.
    Lindeberg, Olle
    Dittrich, Yvonne
    Leaving Variability Management to the End User; A Comparison Between Different Tailoring Approaches2003Report (Other academic)
    Abstract [en]

    To enable software to fulfill user requirements over time and meet changes in, for example, business environments, software variability is needed. One way to achieve variability is through tailoring. However, some kind of variability management is needed in order to take advantage of variability. With a tailorable system we mean a system that is designable when it is in use. This means that some design decisions are postponed until the system is up and running. It is the end-user who will adjust the program to fit altered requirements through, for example, run-time configuration. In other words, tailoring requires that the variability management of the system is left to the end user. In this article we present three different examples of tailoring and in the form of a comparison between the three approaches we identify and discuss some issues which must be considered when variability management is left to the end user.

  • 157. Eriksson, Jeanette
    et al.
    Warren, P.
    Lindeberg, Olle
    An Adaptable Architecture for Continuous Development. User roles reflected in the architecture2003Conference paper (Refereed)
  • 158.
    Eriksén, Sara
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Dittrich, Yvonne
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Exploring issues of accountability in design of ICT for public services2002Conference paper (Refereed)
    Abstract [en]

    In the inter-disciplinary research and development project Design of IT in Use; supportive technologies for citizens? services (DitA), we are studying the use, design and continual support and development of computer support for public administration and information services offered by one-stop shops. Our main focus is on the ongoing integration of such systems with public electronic information systems, and on new developments and design to meet the increasing complexity and diversity of ICT (Information and Communication Technologies). One of the aims of our research is to participate in developing new forms for citizens' access to public services via Internet. The DitA-project is funded by the Swedish Agency for Innovation Systems, VINNOVA, During our ethnographic field studies of work practices in public service one-stop shops, we have observed how closely interwoven people?s on-going choices of action and use of technology are with issues of accountability. This, in turn, has lead us to question whether the importance of considering and supporting accountability issues and needs is perhaps underestimated in the design and development of ICT. Even when designers deliberately focus on use- and action-oriented concepts such as usability and actability, it doesn?t necessarily follow that accountability surfaces as an explicit issue for design. When it does, it is often narrowed down to questions of human-computer interface design, and focused on system accountability versus the user (form and content of feedback information, etc). However, accountability issues, when explored in specific use contexts, are closely linked to social and organizational issues on a number of different levels. Accountability itself, when focused through the prism of people in action, becomes multifarious and ambiguous, begging further exploration of context and involved relationships. In the DitA project, we have deliberately attempted to focus on the concept of accountability in action and how it can be supported and mediated by the design of ICT infrastructures.

  • 159. Eriksén, Sara
    et al.
    Dittrich, Yvonne
    Fiedler, Markus
    Aurell, Marie
    It Takes More Than Two... Developing a TANGO-Arena for Regional Cooperation around E-government2003Conference paper (Refereed)
    Abstract [en]

    The TANGO e-government arena is an on-going project in Southern Sweden, funded by the Innovative Actions of the European Regional Development Fund. The aim of the project is to establish cooperation between the public sector, private enterprise and university-based research in designing public e-services. Our starting point is e-government understood as co-construction of technology, society and citizenship in everyday life. This approach is based on the Scandinavian Tradition of Participatory Design, but also motivated by on-going technological development. In cooperating around development of new, integrated services, catering to various categories of users as well as to a growing diversity of mobile technologies, we are aiming to establish feedback channels between practice and theory, between use and design, and between different academic disciplines where we see a need to synchronize the models and methods we work with. Our current research questions focus on exploring and managing multi-perspectivity as a resource for design.

  • 160.
    Ewö, Christian
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    A machine learning approach in financial markets2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this work we compare the prediction performance of three optimized technical indicators with a Support Vector Machine Neural Network. For the indicator part we picked the common used indicators: Relative Strength Index, Moving Average Convergence Divergence and Stochastic Oscillator. For the Support Vector Machine we used a radial-basis kernel function and regression mode. The techniques were applied on financial time series brought from the Swedish stock market. The comparison and the promising results should be of interest for both finance people using the techniques in practice, as well as software companies and similar considering to implement the techniques in their products.

  • 161.
    Falck, Tomas
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Quist, Magnus
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Java Teknologi för mobila enheter2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This thesis describes and investigates a technique called JavaTM 2 Micro Edition. Our goal was to show the idea behind J2ME and the negative and positive sides that the technique brings in respect of performance and security. Another goal with the thesis was to investigate the practical usefulness of Java in mobile devices and the consequences that the technique will bring to the mobile infrastructure. J2ME is a platform created for the demands of the fast growing market of embedded devices. This type of devices are smaller than traditional desktop computers which means that they have more physical restrictions in the form of available memory, processing capacity, limited displays and so on. The purpose of the platform is to create an optimised Java-environment for this type of devices. Java-technology in mobile devices means that users, more than before, can influence what the device will be used for. This by downloading applications and run them offline or online on the mobile device. Java is not dependent of the platform that it runs on and the idea is therefore that applications shall be able to run on many different devices as long as they have implemented J2ME. Mobile phones with J2ME technology will soon be available on the Swedish market. This thesis describes possible future applications and the possible suppliers of these applications. Games are expected to dominate the market of MIDlets in the beginning, but we think that different kinds of information services will be the winner in the future. This thesis also shows some shortcomings in the form of portability and security. We have found that J2ME and the profile MIDP are techniques that will play an important role in the development of the mobile Internet. We are convinced that more and more mobile devices will be implemented with Java technology in the future.

  • 162.
    Folbert, Björn
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Persson, Magnus
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Svensson, Henrik
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    peer2peer: hur dyrt är gratis?2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam...

  • 163.
    Folkler, Andreas
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Automated Theorem Proving: Resolution vs. Tableaux2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The purpose of this master thesis was to investigate which of the two methods, resolution and tableaux, that is the most appropriate for automated theorem proving. This was done by implementing an automated theorem prover, comparing and documenting implementation problems, and measuring proving efficiency. In this thesis, I conclude that the resolution method might be more suitable for an automated theorem prover than tableaux, in the aspect of ease of implementation. Regarding the efficiency, the test results indicate that resolution is the better choice.

  • 164.
    Fransson, Elisabeth
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Strand, Maria
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Förstår du vad jag menar?: En undersökning om kommunikation med hjälp av bilder mellan användare och systemutvecklare.2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Ibland kan det förkomma problem mellan utvecklare och kund/användare då de tar fram kraven till ett nytt system. En anledning till detta kan vara att utvecklingsgruppen och användargruppen inte har samma kunskaper och erfarenheter och talar då inte "samma språk". En lösning till detta problem kan vara att ta hjälp av en mockup. En mockup är en fysisk och/eller interaktiv modell av ett gränssnitt. I detta arbete har vi, med hjälp av intervjuer och observationer, undersökt om detta hjälpmedel underlättar kommunikationen i verkligheten.

  • 165.
    Fransson, Henric
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    AgentChess: An Agent Chess Approach2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The game of chess has many times been discussed and used for test purpose by science departments of Artificial Intelligence (AI). Although the technique of agent and as well multi-agent systems is quite old, the use of these offspring of AI within chess is limited. This report describes the project performed applying the use of agents to a chess program. To measure the performance of the logic has tests between the developed program main parts been performed. Further tests against a traditional chess program as well to position test suites have been done. The results and the impact of the different logic parts is presented and discussed. The aim of the project is to take the use of agents in chess a step forward.

  • 166.
    Fransson, Linda
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mattsson, Anneli
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    RUP: i teori och praktik2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    I alla tider har man byggt modeller över saker som skall byggas för att på så sätt åskådliggöra det som skall skapas. Dessa modeller hjälper till att förstå och formulera problem och lösningar, hur sammanhangen är och vilka beståndsdelar som skall ingå. Beroende på vilken typ av produkt som skall konstrueras, kommer olika modeller att få olika betydelse. En utvecklare har ofta en inre bild, en mental modell, av vilken typ av system som skall utformas. Denna bild kan vara detaljerad eller bara en avlägsen idé. Med hjälp av olika typer av modeller kan en utvecklingsgrupp visualisera, specificera, konstruera och dokumentera strukturen och beteendet för den tänkta produkten. Genom att använda ett standardiserat modelleringsspråk, som till exempel Unified Modelling Language, UML, kan samtliga medlemmar i en utvecklingsgrupp meddela sina beslut på ett tydligt sätt. En process för programvaruutveckling är Rational Unified Process, RUP. Denna process är ett väldefinierat sätt för att tilldela och hantera de olika arbetsuppgifter och ansvar som förekommer i en utvecklingsorganisation. Målet för denna process är att, inom givna tidsramar och budget, producera högkvalitativ programvara som uppfyller slutanvändarens behov. RUP kan anpassas för att tillgodose varje enskilt företags speciella behov. Vår undersökning visar på vilket sätt RUP används inom olika företag som bedriver någon form av systemutveckling. Den visar även om dessa företag använder utvecklingsprocessen på det sätt som det rekommenderas i teorin eller om de istället utvecklar en egen utvecklingsprocess, med RUP som utgångspunkt. Undersökningen visar även varför företag väljer just denna process. För att komma fram till svaren på detta har det genomförts en litteraturstudie samt att olika företag har intervjuats. Intervjuerna har utförts genom att en elektronisk enkät har skickats till ett antal företag. De resultat som framkommit genom ovan nämnda undersökning, visar att de företag som idag använder utvecklingsprocessen RUP tycks vara nöjda. Orsaken till detta är framförallt att de olika företagen oftast vill ha en fast grund att utgå ifrån där de sedan kan utveckla processen efter sina egna önskemål och behov. De kan även välja att arbeta med processen på det sätt som rekommenderas i teorin, där RUP fungerar som en databas med råd och riktlinjer som kan användas under ett projektarbetes gång.

  • 167.
    Fredriksen, Monica
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Jönsson, Maria
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    C#: Framtidens språk???2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Denna uppsats handlar om Microsofts nya programmeringsspråk, C# (See Sharp) och .NET Framework. Dessa är fortfarande i betaversion men kommer att släppas på marknaden i februari 2002. I uppsatsen presenteras C#, dock ej i detalj, utan de egenskaper som utmärker språket. En jämförelse görs med C++ och Java, då C# påminner om dessa språk mest. Både C# och Java har utvecklats från moderspråket C++. Microsoft nämner aldrig själva att C# skulle härstamma från Java, men syntaxen och funktionaliteten är mycket snarlik. C# kan endast exekveras på Microsoft nya .NET plattform. Mycket av C#s styrka och egenskaper kommer från plattformens ramverk (.NET Framework), så även ramverket presenteras i uppsatsen. Man kan inte tala om C# utan att tala om .NET, ty de lever i en slags symbios. Vårt syfte med uppsatsen var att undersöka vad C# är för språk och om det har någon framtid. Undersökningen har gjorts genom litteraturstudier, efterforskningar på Internet och en intervju. Intervjun gjordes med en anställd på företaget Wireless Opinion, vilka planerar en övergång till .NET plattformen. Eftersom .NET och C# inte finns på marknaden ännu så går det inte att få konkreta erfarenheter som svar i intervjun. Svaren är mer deras tankegångar om C# och .NET. Slutsatsen av denna undersökning är att C# i sig inte är en ny revolution när det gäller programmeringsspråk trots att det har flera fördelar gentemot andra språk. Däremot bidrar kombinationen av C# och .NET plattformen med nya teknologier som kan ge stora möjligheter i framtiden. För att förstå denna uppsats bör man ha någon erfarenhet av objektorienterad programmering.

  • 168. Fredriksson, Martin
    First Blekinge Institute of Technology Student Workshop on Agent Programming2001Report (Other academic)
    Abstract [en]

    The articles presented in this research report are the results of student efforts in the Agent Programming course, held each year at Blekinge Institute of Technology (Department of Software Engineering and Computer Science). The course aims at giving the students an insight into the vast research and industrial application area of autonomous agents and multiagent systems. Consequently, during the course the students have been introduced to the major areas of the agent domain, including: autonomous agents, multiagent systems, engineering of multiagent systems, and areas of applicability. Of course, these areas of research are quite complex and each unique lecture was therefore held by a specific researcher. Among this staff of expertise were researchers from the Societies of Computation programme (IPD/BIT), Imperial College of London, Royal Institute of Technology (DSV), and Massive Entertainment (a swedish game-development company). A new, and important, aspect of the course this year was that each student was required to participate in the writing of a research paper, on a subject within the domain of autonomous agents and/or multiagent systems. The overall goal with these research papers was to, in a natural manner, introduce the students to the process of gaining scientific knowledge, prior to courses involving thesis material. The articles presented in this report are therefore focused on the identification of a certain problem and a subsequent solution to the problem. The results of this part of the course have now been gathered in this research report, and are to be presented during the Blekinge Institute of Technology Student Workshop on Agent Programming (BITSWAP) 2001. The articles presented during the workshop, but also those that did not make it until the workshop submission deadline, have all focused on very diverse areas of research, still positioning themselves in the paradigm of autonomous agents and multiagent systems. Therefore, it was extremely difficult, if not impossible, to gather any larger number of the students? efforts under certain categories such as; architectures, communication, engineering, mediation, or simulations. Instead, this research report (workshop proceedings) have been divided into two general categories, reflecting the two types of articles produced by the students: theoretical and practical reports. Among the specific topics introduced by the authors are: cooperation, methodologies, societal and security aspects, agents on the web, and agents in the entertainment industry. I am very happy to conclude that the articles produced this year by the students are of exceptional quality and that they have chosen to pursue topics of interest not only to themselves, but to their fellow students as well as the workshop review board. Finally, without mentioning too many specific names, I would just like to give a few acknowledgements to all of you that have contributed to the course, especially to the students and all of the researchers involved in the Societies of Computation programme (Rune Gustavsson, Paul Davidsson, Stefan Johansson, Christer Rindebäck, Anders Johansson, and Johan Lindblom), Keith Clark, Harko Verhagen, and Dan Andersson. Martin Fredriksson, Ronneby - Sweden. December 31, 2000.

  • 169. Fredriksson, Martin
    Ny demonstrator för nätverksbaserat försvar2003In: Teknik & vetenskap, ISSN 1402-5701, Vol. 19, no 5Article in journal (Refereed)
  • 170. Fredriksson, Martin
    On accessibility in open computational environments2001Conference paper (Refereed)
  • 171. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    A methodological perspective on engineering of agent societies2002In: Engineering societies in the agents' world, Lecture notes in artificial intelligence / [ed] Petta, Paolo; Tolksdorf, Robert; Zambonelli, Franco, Springer verlag , 2002, p. 10-24Chapter in book (Refereed)
    Abstract [en]

    We propose a new methodological approach for engineering of agent societies. This is needed due to the emergence of the Embedded Internet. We argue that such communication platforms call for a methodology that focuses on the concept of open computational systems, grounded in general system theory, and natural systems from an engineering perspective. In doing so, it stands clear that forthcoming research in this problem domain initially have to focus on cognitive primitives, rather than domain specific interaction protocols, in construction of agent societies.

  • 172. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    A methodological perspective on engineering of agent societies2001Conference paper (Refereed)
    Abstract [en]

    We propose a new methodological approach for engineering of agent societies. This is needed due to the emergence of the Embedded Internet. We argue that such communication platforms call for a methodology that focuses on the concept of open computational systems, grounded in general system theory, and natural systems from an engineering perspective. In doing so, it stands clear that forthcoming research in this problem domain initially have to focus on cognitive primitives, rather than domain specific interaction protocols, in construction of agent societies.

  • 173. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Articulation of an open computational system for network-centric warfare2003Conference paper (Refereed)
  • 174. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Methodological principles in construction and observation of open computational systems.2002Conference paper (Refereed)
    Abstract [en]

    Research and development of information systems for defense and warfare have changed most dramatically during the last decade; from weapons of mass destruction to sustainable systems of services. The involved information systems can be comprised by a wide range of complex, interacting, and proactive services. Consequently, construction and observation of complex multiagent systems is an important issue to pursue. We argue that methodological principles of the involved systems most appropriately can be dealt with in terms of open computational systems. In this paper we therefore introduce the general characteristics of open computational systems and briefly outline a practical case of such systems in a network-centric warfare setting, in order to identify particular issues of the proposed approach and related tools.

  • 175. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Online engineering and open computational systems2004In: Methodologies and Software Engineering for Agent Systems The Agent-Oriented Software Engineering Handbook / [ed] Gleizes, Federico;; Zambonelli, Marie-Pierre;; , Franco (Eds.), Kluwer Academic Publishers , 2004, p. 377-388Chapter in book (Refereed)
  • 176. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Quality of service in network-centric warfare and challenges in open computational systems engineering2003Conference paper (Refereed)
  • 177. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Sustainable coordination.2002In: Coordination / [ed] Klusch, M; Petta, P, 2002Chapter in book (Other academic)
  • 178. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Theory and Practice of behavior in open computational systems.2002Conference paper (Refereed)
  • 179. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Trustworthy and sustainable operations in marine environments2003Conference paper (Refereed)
    Abstract [en]

    In order to address challenges and opportunities of engineering information systems for network-centric warfare, we have developed a prototype for trustworthy and sustainable operations in marine environments (TWOSOME). The system developed addressed qualities such as information fusion, target acquisition, and self-organization in open computational systems; comprised of distributed services. As such, the system prototype executes on a service-oriented layered architecture for communicating entities (SOLACE) and, furthermore, different perspectives of the prototype are visualized by means of a distributed interaction system for complex entity relation networks (DISCERN).

  • 180. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Ricci, Alessandro
    Sustainable coordination2003In: Intelligent information agents: The AgentLink perspective / [ed] Klusch, M.; Bergamaschi, S.; Edwards, P.; Petta, P., Springer Verlag , 2003Chapter in book (Other academic)
  • 181. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Ricci, Alessandro
    Omicini, Andrea
    First international workshop on theory and practice of open computational systems2003Conference paper (Refereed)
    Abstract [en]

    This report summarizes the presentations and related discussions of the first international workshop on Theory and practice of open computational systems (TAPOCS) at the twelfth international workshop on Enabling technologies: Infrastructure for collaborative enterprises (WETICE). The balance between two topics of open computational systems in particular was in focus during the workshop discussions: theory and practice. As such, we introduced these topics by means of a presentation on Visions of open computational systems and concluded them by means of a presentation on an envisioned Roadmap of open computational systems.

  • 182. Fredriksson, Martin
    et al.
    Ricci, Alessandro
    Omicini, Andrea
    Gustavsson, Rune
    A framework for systemic coordination in open computational systems2002Conference paper (Refereed)
    Abstract [en]

    The material presented in this paper is focused on the characteristics of open computational systems and, in particular, the issue of coordinating behavior in such systems, i.e. systemic coordination. Firstly, we introduce a conceptual framework for characterizing systemic coordination at different levels abstraction. Secondly, challenges and opportunities of this framework is outlined as a matter of exploiting a Service-oriented layered architecture for communicating entities (SOLACE) in combination with a particular coordination model (TuCSoN). In the context of systems engineering, we consider SOLACE and TuCSoN to be examples of the basic tools required for support of systemic coordination, i.e., the continuous process of construction and observation of open computational systems and their evolving interaction space. Finally, we outline the impact of these tools on empirical aspects of systemic coordination.

  • 183.
    Friberg, Hanna
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Use and Needs in Contexts: An Ethnographic Study on Cell Phone Use from a Contextual Usability Perspective2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The focus of this thesis is usability of an everyday used product; the cell phone seen from a Human – Computer Interaction perspective. The purpose with the thesis is to create an understanding of how cell phones are used by persons in natural /public settings and in everyday activities. Further the purpose is to describe users’ experiences of using cell phones. In this study, ethnography was used as method. The theoretical framework is the contextual usability perspective. The cell phone is used in many contexts and in different ways. We can make the conclusion from what the study shows, that the cell phone is outermost used and need for social issues. From a subjectivity perspective on usability, we can see that the cell phone is a product which needs and goals are highly subjective to the user. From a flexibility perspective on usability, we see that the cell phone is used in different contexts and therefore must be flexible in use. From a subjectivity perspective on usability, we see that it is a product that exists and is used in a social environment. A design suggestion that correspond to these aspects is the module cell phone. We can also make the conclusion that goals, needs and use are inseparable and constitute prerequisites for each other.

  • 184.
    Fälth, Karin
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Svahn, Linda
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Parprogrammering: Ökad tidsåtgång uppvägs av dess fördelar?2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syftet med arbetet var att ta reda på om den ökade tidsåtgången som parprogrammeringen leder till uppvägs av de fördelar som den genererar i jämförelse med enskild programmering där arbetet delas mellan två programmerare och sedan integreras. I arbetet presenteras resultatet från en enkätundersökning som sju personer från fyra olika företag i Sverige har besvarat. Samtliga personer som besvarat enkäten har arbetat både med enskild programmering och parprogrammering. Vårt arbete bidrar till forskningsområdet programvaruteknik som intresserar sig för mjukvaruutvecklingsmetoder. På senare tid har detta forskningsområde också intresserat sig för lättrörlig mjukvaruutveckling där utvecklingsmetoden Extreme Programming (XP) ingår. XP tillämpar parprogrammering och är en mjukvaruteknisk metod som har att göra med klassisk mjukvaruteknik som bl.a. utgår ifrån kodkvalite och samspel mellan utvecklare. (Rittenbruch m.fl, 2002) I den litteratur vi läst har det presenterats en undersökning som gjorts i USA om parprogrammering. I den konstaterades att detta arbetssätt ger en ökad tidsåtgång och det framkom också ett antal fördelar med att programmera i par. Vi har utgått ifrån tidsåtgången och fördelarna när vi gjorde vår enkätundersökning. Vi fann att vår undersökning styrker de fördelar som finns med parprogrammering, men däremot bekräftar inte undersökningen att tidsåtgången ökar. Samtliga i undersökningen tycker att kodkvalitén förbättrats, dvs bättre struktur och design samt mindre fel på koden. Sammanhållningen och kommunikationen har blivit bättre och fler programmerare är involverade i samma kod. Detta innebär att projektgruppen inte påverkades så mycket när en person lämnar projektet. Det har också framkommit att parprogrammering inte är lämpligt att använda vid enklare uppgifter.

  • 185. Gorschek, Tony
    et al.
    Svahnberg, Mikael
    Tejle, Kaarina
    Introduction and Application of a Lightweight Requirements Engineering Process2003Conference paper (Refereed)
    Abstract [en]

    The lack of an adequate requirements specification is often blamed for the failure of many IT investments. Naturally, the requirements specification is the product of a requirements engineering process. Methods are required to evaluate the current requirements engineering process and identify where improvements are necessary making it possible to produce requirement specifications of high quality. Existing requirements engineering evaluation methods are often large, costly and time-consuming to use. Therefore we introduce a lightweight evaluation method, which we use to evaluate four industry projects. In this paper we outline the evaluation method, describe four industrial applications of the method and present an analysis of the findings. The results suggest that the proposed evaluation method is useful and the studied cases to a large extent have adequate requirements engineering processes although many important aspects are missing from their respective processes.

  • 186.
    Gorschek, Tony
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Tejle, Kaarina
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    A Method for Assessing Requirements Engineering Process Maturity in Software Projects2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The area of Requirements Engineering is often underestimated in value in the area of Software Engineering. According to certain sources the failure rate of IT investments is over 60%. In addition problems introduced through the Requirements Engineering of a project accounts for something like 50% of the total debugging costs. The main reason for this is a low level of maturity pertaining to the Requirements Engineering process. This thesis introduces a model that can help organizations improve their Requirements Engineering process. A first step in process improvement is process evaluation. The REPM model has the purpose of measuring the maturity level of the Requirements Engineering process in projects, and to give a basis for what steps to take in order to improve on it. In addition to the model a method for using the model is introduced. The model and method are subsequently designed, implemented and validated. The validation takes the form of interviews and case-studies in industry featuring four companies and four projects of varying size. The project evaluations were conducted on-site in both Sweden and in Ireland. It is shown that the REPM model in combination with the method is a good way to evaluate the Requirement Engineering process of a project. It gives a picture of the current state of the Requirements Engineering process in a project and, more importantly, how the results of the evaluation can be used for process improvement.

  • 187. Gorschek, Tony
    et al.
    Wohlin, Claes
    Identification of Improvement Issues Using a Lightweight Triangulation Approach2003Conference paper (Refereed)
    Abstract [en]

    One of the challenges in requirements engineering is the ability to improve the process and establish one that is “good-enough”. The objective of this paper is to present a lightweight approach to identify process improvement issues. The approach is developed to capture both the views of different stakeholders and different sources of information. An industrial investigation from a small company is presented. In the investigation both projects and the line organization have been interviewed and documentation from them has been studied to capture key issues for improvement. The issues identified from one source are checked against other sources. The dependencies between the issues have been studied. In total nine issues for improvement of the requirements engineering work at the company were identified. It is concluded that the approach is effective in capturing issues, and that the approach helps different stakeholders to get their view represented in the process improvement work.

  • 188. Grahn, Håkan
    et al.
    Holgersson, Marcus
    An Approach for Performance Measurements in Distributed CORBA Applications.2002Conference paper (Refereed)
    Abstract [en]

    One way to construct distributed systems is to use a communication model with distributed objects such as CORBA (Common Object Request Broker Architecture). Distributed objects give many advantages, but suffer from some performance problems. In order to handle the performance problem it is important to find where in the event chain the delays occur. Therefore, a tool for performance measurement and for identifying the performance bottlenecks in a distributed system should be a great help. In this paper we present an approach for performance measurements in distributed CORBA applications. Our approach is based on Interceptors, which is the technique we use for insertion of measurement points. This approach gives sufficient information for identifying many performance problems. In order to verify our approach, a prototype tool for profiling and performance measurements is constructed. A presentation program is built for making the captured information more readable. The tool and presentation programs show the execution flow of the system in different call graphs and also produces some call statistics at different levels. Finally, the tool is tested and verified in a distributed environment.

  • 189. Grahn, Håkan
    et al.
    Stenström, Per
    A Comparative Evaluation of Hardware-Only and Software-Only Directory Protocols in Shared-Memory Mulitprocessors2004In: Journal of Systems Architecture, ISSN 1383-7621 , Vol. 50, no 9, p. 537-561Article in journal (Refereed)
    Abstract [en]

    The hardware complexity of hardware-only directory protocols in shared-memory multiprocessors has motivated many researchers to emulate directory management by software handlers executed on the compute processors, called software-only directory protocols. In this paper, we evaluate the performance and design trade-offs between these two approaches in the same architectural simulation framework driven by eight applications from the SPLASH-2 suite. Our evaluation reveals some common case operations that can be supported by simple hardware mechanisms and can make the performance of software-only directory protocols competitive with that of hardware-only protocols. These mechanisms aim at either reducing the software handler latency or hiding it by overlapping it with the message latencies associated with internode memory transactions. Further, we evaluate the effects of cache block sizes between 16 and 256 bytes as well as two different page placement policies. Overall, we find that a software-only directory protocol enhanced with these mechanisms can reach between 63% and 97% of the baseline hardware-only protocol performance at a lower design complexity.

  • 190.
    Grahn, Håkan
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Stenström, Per
    Comparative evaluation of latency-tolerating and -reducing techniques for hardware-only and software-only directory protocols2000In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 60, no 7, p. 807-834Article in journal (Refereed)
    Abstract [en]

    We study in this paper how effective latency-tolerating and -reducing techniques are at cutting the memory access times for shared-memory multiprocessors with directory cache protocols managed by hardware and software. A critical issue for the relative efficiency is how many protocol operations such techniques trigger. This paper presents a framework that makes it possible to reason about the expected relative efficiency of a latency-tolerating or -reducing technique by focusing on whether the technique increases, decreases, or does not change the number of protocol operations at the memory module. Since software-only directory protocols handle these operations in software they will perform relatively worse unless the technique reduces the number of protocol operations. Our experimental results from detailed architectural simulations driven by six applications from the SPLASH-2 parallel program suite confirm this expectation, We find that while prefetching performs relatively worse on software-only directory protocols due to useless prefetches, there are examples of protocol optimizations, e.g., optimizations For migratory data, that do relatively better on software-only directory protocols. Overall, this study shows that latency-tolerating techniques must be more carefully selected for software-centric than for hardware-centric implementations of distributed shared-memory systems. (C) 2000 Academic Press.

  • 191.
    Grahn, Håkan
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Stenström, Per
    Evaluation of a Competitive-Update Cache Coherence Protocol with Migratory Data Detection1996In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 39, no 2, p. 168-180Article in journal (Refereed)
    Abstract [en]

    Although directory-based write-invalidate cache coherence protocols have a potential to improve the performance of large-scale multiprocessors, coherence misses limit the processor utilization. Therefore, so-called competitive-update protocols-hybrid protocols that on a per-block basis dynamically switch between write-invalidate and write-update-have been considered as a means to reduce the coherence miss rate and have been shown to be a better coherence policy for a wide range of applications. Unfortunately, such protocols may cause high traffic peaks for applications with extensive use of migratory objects. These traffic peaks can offset the performance gain of a reduced miss rate if the network bandwidth is not sufficient. We propose in this study to extend a competitive-update protocol with a previously published adaptive mechanism that can dynamically detect migratory objects and reduce the coherence traffic they cause. Detailed architectural simulations based on five scientific and engineering applications show that this adaptive protocol outperforms a write-invalidate protocol by reducing the miss rate and bandwidth needed by up to 71 and 26%, respectively.

  • 192.
    Guerra, Adrien
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Peirone, Sebastien
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Evaluation and Selection of Software Architectures: A Case Study of Positioning Systems2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The explosion of the mobile telecommunications market has resulted in the apparition of multiple applications and services. However the particular business pressure has often lead to that these systems have poor quality design and, consequently, implementation. Software system builders have realized the importance of the overall system organization to address quality requirements. Practically, they started to use, idiomatically, a number of commonly recognized solutions to guide their design of system structures. This report analyses and evaluates these solutions and comments on the result obtained when one of them was carefully selected and applied to a system of mobile positioning services.

  • 193.
    Gunnarsson, Annicka
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Ekberg, Siri
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Invasion of Privacy: Spam - one result of bad privacy protection2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Our personal privacy is being eroded from various directions as modern technologies bring lots of new threats towards our personal privacy. Unfortunately, people are often oblivious about it and accept invasion of privacy to a great extent without questions. This thesis is a presentation of our study dealing with privacy violations while using the Internet. It also includes a further investigation about unsolicited bulk email, which is one of many consequences of bad privacy protection. We have also examined the differences between the United States and the European Union and found that the fundamental privacy protection is better in the European Union. We have used different methods to complete this thesis such as studies of literature and articles as well as performing a spam study. Using these methods we have concluded that privacy violations on the Internet is a significant problem and that the Internet users have a right to an adequate privacy protection.

  • 194.
    Gunnarsson, Annicka
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Lindros, Eva
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Winter, Jeff
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Viewing patients' x-rays in the radiologist's home2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Our assignment was to present a report to the radiology clinic at the County Hospital in Blekinge, evaluating the risks inherent in transferring patient information via Internet between the radiologist?s home and the hospital and presenting suggestions to the clinic for mechanisms by which the privacy and personal health of the patient can be ensured. Our aim was to investigate how to maintain an acceptable level of security to ensure that the patient?s privacy and security are not threatened. We wanted to present a list of measures that the clinic should take to ensure that security is maintained. We have used several different methods during our investigation: literature studies; a case study at Blekinge County Council?s x-ray clinic that includes interviews with the head of the clinic, the System Manager and System Administrators and e-mail interviews with other relevant personnel. Using these methods, we have concluded that the present working method does not fulfil the requirements stated in the theories concerning medical security. To ensure a level of computer security in accordance with the recommendations made in this thesis, it is necessary to take certain measures, which we have listed here. These include the introduction of single session login, the formulation of explicit security policies, a program for user education, the encryption of transmissions, and the use of the audit trail to track system use. All of these measures concern the intended new working method with the introduction of an outside connection; some of them concern the existing system and working method. A system fulfilling these measures will however always encompass risks, even in the safest distributed system. With today?s technologies is there always a risk that could threaten the patient?s privacy or security. This does not mean that a sufficient security level cannot be reached. By following the recommendations presented in this thesis, the x-ray clinic can maintain an acceptable level of security, when the radiologists on back-up duty are viewing x-rays and making diagnoses from home.

  • 195.
    Gurp, Jilles van
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Design Principles for Reusable, Composable and extensible Frameworks1999Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Frameworks have been used since the early eighties. Now that frameworks are becoming increasingly popular, several problems are surfacing. Those problems can be categorized into evolution problems (i.e. problems with changes over time) and composition problems (i.e. problems that occur when more than one framework is used in an application). This master thesis focusses on preventing these problems in an early stage in the development of a framework. Guidelines for building OO Frameworks are presented and the guidelines are tried out in the domain of communication protocols.

  • 196. Gurp, Jilles van
    Variability in Software Systems2000Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Reuse of software assets has been, and continues to be the holy grail of software engineering. In this thesis we argue that a prerequisite for reusability is variability. In order to reuse a piece of software, it needs to be adapted to the environment in which it will be reused. With the arrival of object oriented frameworks and software product lines, variability and the associated variability techniques are becoming more and more important. In this thesis, four papers are included that all, in some way, are related to variability. In the introduction we discuss object oriented frameworks and software product lines; we introduce a conceptual model for reasoning about variability; we take a closer look at so called late variability and examine the consequences of variability for the development process of software product lines and software product line based applications.

  • 197. Gustafsson, Inger
    et al.
    Törnquist, Johanna
    Customer oriented rail traffic management: a pragmatic approach to facilitate competition on the tracks.2002Conference paper (Refereed)
  • 198.
    Gustavsson, Hanna
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Karlsson, Hanna
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    The Virtual Learning Environment: Patterns for Structuring Web based Teaching2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Online education creates new demands on organization and structure in order to make use of its advantages with the technology for learning. Research in this area elucidates new possibilities with the computer as a medium, to individualize and make the learning more flexible. Meanwhile, the empirical study shows practical limitations, which affects the design of web-based teaching. As a result, we have started to develop a guideline, which describes these new possibilities and common problems with the new learning environment. We have structured the guideline by first defining the problem area and then giving recommendation or in some cases proposal of improving the technique. The purpose with the guideline is to illustrate and support teachers with knowledge and inspiration to make the design of this new form of education suitable in its practice.

  • 199.
    Gustavsson, Ingegerd
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Folkesson, Birgitta
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Hantering av systemdokument2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    All systemdokumentation som finns på Flextronics är dokumenterad på en mall i Word. Utvecklingen inom Flextronics WE, Karlskrona är stor. Många datasystem används på företaget inom olika avdelningar lokalt men även i Europa, och ingen gemensam ruin för hanteringen av systemdokument finns. Helpdesken på Flextronics servar hela Karlskrona och västra Europa på deras datasystem och nätverk. Vår uppgift är att ta fram en kravspecifikation för hantering av systemdokumentationen. För att helpdesken skall kunna utnyttja denna information krävs att informationen lagras på ett enkelt och överskådligt sätt där man lätt kan söka uppgifter. Lösningen skall vara Web-baserad så att alla användare skall kunna utnyttja informationen både internt och externt via företagets intranet.

  • 200. Gustavsson, Rune
    Agents with power1999In: Communications of the ACM, ISSN 0001-0782, E-ISSN 1557-7317, Vol. 42, no 3, p. 41-47Article in journal (Refereed)
1234567 151 - 200 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf