Change search
Refine search result
3456789 251 - 300 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 251.
    Johansson, Christian
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Computer Forensic Text Analysis with Open Source Software2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Detta papper koncentrerar sig på kriminaltekniska undersökningar av text, med fokus på användande av mjukvara med öppen källkod. Pappret diskuterar och undersöker olika tekniker för framtida automatisering av dessa undersökningar.

  • 252.
    Johansson, Christian
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Evertsson, Gustav
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Optimizing Genetic Algorithms for Time Critical Problems2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Genetic algorithms have a lot of properties that makes it a good choice when one needs to solve very complicated problems. The performance of genetic algorithms is affected by the parameters that are used. Optimization of the parameters for the genetic algorithm is one of the most popular research fields of genetic algorithms. One of the reasons for this is because of the complicated relation between the parameters and factors such as the complexity of the problem. This thesis describes what happens when time constraints are added to this problem. One of the most important parameters is population size and we have found by testing a well known set of optimization benchmark problems that the optimal population size is not the same when time constraints were involved.

  • 253. Johansson, Conny
    Early Practise and Integration: The Key to Teaching Difficult Subjects1997Conference paper (Refereed)
    Abstract [en]

    Software Engineering is a young area compared to other engineering disciplines. The subject is rapidly moving and more questions than answers seem to appear. Usually, Software Engineering projects involve several people for a prolonged time. Large projects range over several months or years and involve considerable groups of people developing massive systems. Such systems are complex because of their size, and because they need to be regularly modified in order to meet new and changed customer requirements, and because of the need to correct faulty products. We have found it very important to highlight as many questions as possible that appear within Software Engineering already in the education programme. The strategy is to provide as much practical experience from projects as possible, and to let the students be aware of questions and problems before they get possible answers and solutions to those questions. In order to have the right practical training, you have to initiate active tasks on the courses. Some parts come automatically from initiatives from students, but some parts need to be coerced by the teachers. We have noticed that it is important to introduce specific fields in Software Engineering, with a successively increasing emphasis. To achieve high understanding, the order and emphasis need to be carefully considered. This paper describes five fields that we think should be emphasized in this way. These fields are specification, system decomposition, planning, tracking and verification.

  • 254. Johansson, Conny
    et al.
    Dittrich, Yvonne
    Juustila, Antti
    Software Engineering Across Boundaries: Student Project in Distributed Collaboration1999In: IEEE Transactions on Professional Communication, ISSN 0361-1434, E-ISSN 1558-1500, Vol. 42, no 4, p. 286-296Article in journal (Refereed)
    Abstract [en]

    Geographically distributed software development projects have been made possible by rapid developments primarily within the data communication area. A number of companies recognize that distributed sollaboration has great potential for the near future. This report describes the empirical study of a cooperative student project located at two different geographical sites. The project was carried out at two universities, one in Sweden and one in finland. The initial goals were to give the students the opportunity to learn about the practical aspects of cooperation between two geographically seperate institutions and to study specific problems anticipated by the teachers with regard to communication, coordination, language, culture, requirements' handling, testing, and bug fixing. This report focuses on communication and coordination within the cooperative project as these were identified as the most significant problem areas. We also thought that these areas were the most interesting and the ones most likely to lead to improvements. This report not only describes our findings but also gives hints about what to think about when running similar projects both with respect to project related issues and teaching issues.

  • 255. Johansson, Conny
    et al.
    Molin, Peter
    Maturity, motivation and effective learning in projects: benefits from using industrial clients1996Conference paper (Refereed)
    Abstract [en]

    Software Engineering Education is often associated with teaching computer concepts, programming languages, database technology, etc. This approach of teaching traditional Computer Science courses leads to some difficult problems, both when training the students, and for the students their first years working in industry. In the Software Engineering programme at the University of Karlskrona/Ronneby, we have taken a more practical, problem-related approach by complementing the Computer Science courses with project courses at undergraduate level. In these project courses, we train the students to handle client contacts, contracts, negotiations, and most important: to keep their promises concerning time, quality and cost. After such projects the students are more able to handle and solve problems independently in a responsible way. By simulating the real world, and emphasizing the problems rather than the solutions, the students gain experience very similar to the professional situation. The experience gained inc reases the student’s maturity within the subject, and facilitates the understanding and application of more advanced concepts such as ISO 9000, Capability Maturity Model (CMM), function point analysis, etc.

  • 256. Johansson, Conny
    et al.
    Ohlsson, Lennart
    Molin, Peter
    TEACHING OBJECT-ORIENTATION: FROM SEMI-COLONS TO FRAMEWORKS1994Conference paper (Refereed)
  • 257. Johansson, Conny
    et al.
    Rönkkö, Kari
    Commitment as an Underlying Principle for Learning2004Conference paper (Refereed)
    Abstract [en]

    The prevailingmodel of software development on which most educational programs are based is in conflict with general practice in industry. As following paper demonstrates Software Engineering education lacks an approach to teach the skills needed to master coalitions of existing recourses that are hard to control. In order to prepare students to handle unpredictable, non-technical and moving targets, an adequate curriculum is needed. Since 1990 software engineering education at Blekinge Institute of Technology has used commitment as the underlying principle for learning. This principle has made it possible to address the discrepancies between education and industry. This paper describes and evaluates our experience of using six elements of commitment in the education of software engineers.

  • 258.
    Johansson, David
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Lehtovirta, Daniel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    PERFORMANCE-ORIENTED VS. MAINTAINABILITY-ORIENTED IMPLEMENTATION: A CASE STUDY OF THE REACTIVE PLANNER OF TEAM SWEDEN.2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Our work is a case study for Team Sweden, which is a national effort to produce a team of soccer playing robots. We took the present structure of the Reactive Planner, which is the game-planning module of the system, and made two new parallel versions of the Reactive Planner. One where we tried to optimize for CPU and memory usage called the performance-oriented implementation. We also made one implementation where we tried to optimize for maintainability called the maintainability-oriented implementation. To evaluate the implementations we ran a series of CPU and memory usage tests to assess the performance. We also estimated the maintainability of both implementations. The test results where later used to decide which implementation we should recommend to Team Sweden. The results showed that the difference in maintainability did outweigh the difference in performance. The conclusion is that the maintainability-oriented implementation is in this case the preferred

  • 259.
    Johansson, John
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    An Electric Field Approach: A Strategy for Sony Four-Legged Robot Soccer2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Using physical analogies when solving computational problems is not uncommon. The Electric Field Approach is such an analogy using potential fields for describing the situation in a robotic soccer match and for proposing the next step in optimizing the situation. The approach was developed and implemented during the summer of 2000 and was later used and tested during the fourth Robot Soccer World Cup in Melbourne, Australia. The results of the games prove that the approach is applicable in this narrow but interesting domain, combining artificial intelligence and robotics. The theory of the approach is general and can also be applied on various other domains. This is not the first potential field approach, but the ability of both handling navigation and manipulation of the environment is unique.

  • 260. Johansson, Stefan J.
    An extended potential field based Control System for Mobile Robots2003Conference paper (Refereed)
  • 261. Johansson, Stefan J.
    Game Theory and Agents1999Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    A fundamental problem in multi agent systems is conflict resolution. A conflict occurs in general when the agents have to deal with inconsistent goals, such as a demand for shared resources. We investigate how a game theoretic approach may be a helpful and efficient tool in examining a class of conflicts in multi agent systems. We consider the hawk-and-dove game both from an evolutionary and from an iterated point of view. An iterated hawk-and-dove game is not the same as an infinitely repeated evolutionary game because in an iterated game the agents are supposed to know what happened in the previous moves. In an evolutionary game evolutionary stable strategies will be most successful but not necessarily be a unique solution. An iterated game can be modeled as a mixture of a prisoner's dilemma game and a chicken game. These kinds of games are generally supposed to have successful cooperating strategies. We also discuss situations where a chicken game (CG) is a more appropriate model than a prisoner's dilemma (PD) game and describe a simulation of iterated prisoner's dilemma (IPD) and iterated chicken (ICG) games. We study a parameterized class of cooperative games, with these classical games as end cases, and we show that chicken games to a higher extent reward cooperative strategies than defecting strategies. We then introduce generous, even-matched, and greedy strategies as concepts for analyzing games. A two person PD game is described by the four outcomes (C,D), (C,C), (D,C), and (D,D), where the outcome (X,Y) is the probability of that the opponent acts Y, when the own player acts X. In a generous strategy the proportion of (C,D) is larger than that of (D,C), i.e. the probability of facing a defecting agent is larger than the probability of defecting. An even-matched strategy has the (C,D) proportion approximately equal to that of (D,C). A greedy strategy is an inverted generous strategy. The basis of the partition is that it is a zero-sum game given that the sum of the proportions of strategies (C,D) must equal that of (D,C). In a population simulation, we compare the PD game with the CG, given complete as well as partial knowledge of the rules for moves in the other strategies. In a traffic intersection example, we expected a co-operating generous strategy to be successful when the cost for collision was hig h in addition to the presence of uncertainty. The simulation indeed showed that a generous strategy was successful in the CG part, in which agents faced uncertainty about the outcome. If the resulting zero-sum game is changed from a PD game to a CG, or if the noise level is increased, it will favor generous strategies rather than an even-matched or greedy strategies. Four different PD like games were studied by running a round robin as well as a population tournament, using 15 different strategies. The results were analyzed in terms of definitions of generous, even-matched, and greedy strategies. In the round robin, PD favored greedy strategies. CG and coordinate game were favoring generous strategies, and compromise dilemma the unstably even-matched strategy Anti Tit-for-Tat. These results were not surprising because all strategies used were fully dependent on the mutual encounters, not the actual payoff values of the game. A population tournament is a zero-sum game balancing generous and greedy strategies. When strategies disappear, the population will form a new balance between the remaining strategies. A winning strategy in a population tournament has to do well against itself because there will be numerous copies of that strategy. A winning strategy must also be good at resisting invasion from other competing strategies. These restrictions make it natural to look for winning strategies among originally generous or even-matched strategies. For three of the games, this was found true, with original generous strategies being most successful. The most diverging result was that compromise dilemma, despite its close relationship to PD, had two greedy strategies almost entirely dominating the population tournament. In game theory, iterated strategic games are considered harder to analyze than repeated games (for which the theory of mixed strategies is a suitable tool). However, iterated games are in many cases more fit to describe the situation of computerized agents, since it take into account previous moves of the opponents, rather than just assigning each possible action a certain probability. We introduce the notion of characteristic distributions and discuss how it can be used to simplify and structure the analysis of strategies in order to provide a good basis for choosing strategies in games to come and formulate a No free lunch theorem for game theory.

  • 262. Johansson, Stefan J.
    No free lunches in Multi-agent Systems,: a Characteristic Distribution approach to game theoretic modelling2001Conference paper (Refereed)
    Abstract [en]

    We introduce the notion of Characteristic Distributions which is a way of representing information about the payoffs of different behaviors in a Multi-agent System. Me discuss how they can be used to simplify and structure the analysis of strategies and prove i) the existence of optimal environments, given a certain behavior and ii) that all behaviors payoff equally, when taken over all possible environments (no free lunch theorem for strategies).

  • 263. Johansson, Stefan J.
    On Coordination in Multi-agent Systems2002Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Agent technology enables the designers of computer based systems to construct software agents that are able to model attitudes. We present a frame-work in which these artifacts aim to express the preferences of both their designers and their owners. Just like human societies need rules, regula-tions, norms and social laws, in order to function, societies of agents need coordination mechanisms in order to work efficiently. We show why some higher level goals of agents are incompatible, e.g. the automatic creation of coalitions among agents, and at the same time being self-interested and boundedly rational. One way to model the outcome of planned interactions between agents is to apply game theory. We use game theory for proving some results, e.g. a \No free lunch" theorem. For more practical applications, however, other approaches are often needed. One such domain is dynamic resource allocation, where agents through auction mechanisms or different kinds of mobile broker techniques solve the problem of coordinating the allocation. We present comparisons of the results of simulations of several of these approaches in a telecommunication networks application. Another interesting domain concerns mobile robots for playing soccer. To model this problem, a novel approach called artificial electrical fields, is used for both navigation and manipulation of objects.

  • 264. Johansson, Stefan J.
    et al.
    Davidsson, Paul
    Carlsson, Bengt
    Coordination models for dynamic resource allocation2000Conference paper (Refereed)
    Abstract [en]

    A number of different coordination models for dynamic resource allocation are proposed, The models are based on an asynchronous and distributed approach which makes use of mobile agents to distribute the resources of the providers between the consumers. Each provider has a broker, i.e., the mobile agent, that continually visits all or a subset of the consumers, offering the resources currently available at the corresponding provider. The models are increasingly complex, starting with a rather simple static mechanism, and ending with a sophisticated solution that balance the allocations both from the consumer and the provider perspective. Finally, an evaluation of the models in a realistic Intelligent Network domain is presented.

  • 265. Johansson, Stefan J.
    et al.
    Davidsson, Paul
    Kristell, Martin
    Four Multi-Agent Architectures for Intelligent Network Load Management2002Conference paper (Refereed)
    Abstract [en]

    Four different multi-agent system architectures for a dynamic resource allocation problem are presented and evaluated. Although all the architectures use three types of agents, i.e., quantifiers that act on the behalf the providers, allocators that act on the behalf of the customers, and distributors that decide how the available resources should be divided between the customers, they differ with respect to the degree of distribution of control and the degree of synchronization. The architectures are evaluated through simulation experiments concerning load balancing and overload control of intelligent networks. A number of aspects are compared, e.g., how fast the system re-allocates the resources when there are sudden changes in demand, how well the load is balanced between the providers, how well the resources are utilized, how fast a customer gets response, how fairly the system treats the customers, how robust the system is, and the amount of communication overhead. Some of the conclusions are that the asynchronous architectures react faster and that the centralized architectures balance the load better. On the other hand, the centralized architectures have a single point of failure and the asynchronous architectures tend to use more communication overhead.

  • 266.
    Jönsson, Dennis
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Stålhammar, Ted
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Informationskrigföring: den nya teknikens hot2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    The new information society has revolutionised almost the entire world. But the new technique does not only bring good. That which was before only available on paper may today only be available on a computer system. This makes it possible to send data electronically. In the wrong hands that information can become a threat against the security of an individual, a company or even a nation. The possibility to protect oneself against attacks from the outside becomes increasingly difficult. There are a lot of factors involved but a major factor is the fast technical development we now see within this area. Our defence minister, Björn von Sydow, writes in an article that it is almost impossible to protect one self against the unexpected. Björn Andersson (SÄPO) says as well that there are no secure systems, only more or less easy penetrable systems for the attacker to attack. The threat against Sweden is quite diffuse. The old threat of invasion is no longer which can make it difficult to identify a specific threat. The word of the governments today is terrorism. The purpose of our paper, considering this background, is to take a look at the possible threats against swedish information systems and to see the seriousness of the threats these systems are facing. It mainly consists of systems for ensuring we are provided with power and water and that finance and communication works. The questions that we ask ourselves are if information warfare indeed is a threat ? Who are the attackers and what drives them to perform the actions they perform ? Which are the targets they aim their attacks against ? Are the techniques behind information warfare realistic and is there really a threat, or is it all just blown out of proportions ? To get answers to our questions we have gone through a lot of material. A lot of it was downloaded from the Internet and has been of varying character. We have also been given a lot of material from our government and we have read some literature about the area of interest. We have finally done some interviews with staff from Lunds Energi, Skanova Networks and Säkerhetspolisen.

  • 267.
    Jönsson, Sandra
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Melin, Therese
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    En guide till antivirusprogram: ett hjälpmedel för hemanvändare2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Detta arbete handlar om antivirusprogram och vad det finns för hjälpmedel för hemanvändare utan teknisk bakgrund att finna det antivirusprogram som passar dem bäst. Målet med arbetet är att producera en guide för hemanvändare som ska hjälpa dem inför deras val av antivirusprogram. I detta arbete har tre olika metoder använts för att besvara de frågor och den hypotes som ställts. Först gjordes en litteraturstudie där bakgrundsmaterial inhämtades. Nästa steg var att genomföra intervjuer med experter inom området för att ta reda på vad guiden skulle innehålla. Som sista steg utfördes en enkätundersökning som riktade sig till hemanvändare för att ta reda på om den framtagna guiden besvarade hypotesen. Enkätundersökningen besvarades av både hemanvändare med och utan teknisk bakgrund. Detta gjordes för att få fram synpunkter på om guiden var tillräckligt lättförståelig för en hemanvändare utan teknisk bakgrund och för att ta reda på om guiden skulle hjälpa dem inför deras val av antivirusprogram. Resultaten av enkätundersökningen ledde oss fram till slutsatsen att en guide för hemanvändare behövs och att den guide som producerats i detta arbete skulle kunna vara till hjälp för hemanvändare inför deras val av antivirusprogram.

  • 268.
    Karlsson, Hanna
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Andreasson, Martina
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Intranät En kommunikationskanal för alla?2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Intranet is today a common technical groupware to communicate in many organisations. People can interact through the Intranet and communicate within the organization and get relevant information according to their workplace. It can be difficult to get everybody to use the Intranet as an information- and communication tool. This causes problems when people want to reach out with information. With these thoughts we entered our work at Luftfartsverket at Arlanda airport. The main goal for us has been to find out how they reach out with information in a large company where there are many different employees with different work situations. We choose to be in a department where the computer is not used in their daily work situations. The reason for our choice of department was because the problem of information is most common where the computer is not used as a natural extension of their work situations. We have also focused on how the employees get information today, and which ways they appreciate the most. To find out the reasons why the Intranet is not used as much as the head of department wishes, we have used several qualitative methods such as interviews, mock-up, Future Workshop etc. From the reflections and results of our methods we have found several solutions on how the presentation of the information can be improved

  • 269.
    Karlsson, Johanna
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Nomadic Computing: Security assessment of remote access to workplace systems2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.

  • 270.
    Karlsson, Johanna
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Samuelsson, Per
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Choosing a technique for digital signatures from the customers' perspective2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, we have during our work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a way of making them mobile is required. In our thesis we give an overall understanding of digital signatures and how they can be used. Our main goal is trying to find out what technique customers want to use for carrying their digital signature and if information positively affects customers? will to use the new service. We have found theories about the customers from literature, articles and Nordea IT. The most important theories state the importance of listening to customers and the importance of creating a trust between bank and customer. The main method used for the investigation is a questionnaire. This questionnaire is used to find out public opinions regarding the use of digital signatures. As seen from the result of our investigation most theories about the customers are confirmed. The answers from the questionnaire showed that it is important that the technique fulfils the customers? desire. Every other person could consider using digital signatures, if the number of uncertain can be convinced. From those who are negative or uncertain, one fifth are affected by information from the bank. The importance of information about security and bank policies is thus also confirmed. Both the choices of technique and the information positively affects customers? will to use digital signatures.

  • 271.
    Karlsson, Jonas
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    TEMPEST attacks: Using a simple radio receiver2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    There are no public records that give an idea of how much emanation monitoring is actually taking place. However, there are a few data points that lead us to believe there is a real threat. One of these is that TEMPEST industry is over a billion dollars a year business. Reports like the ”Redefining Security” by Joint Security Commission stated that electronic equipment such as computers, printers, and electronic typewriters give off electromagnetic emanations and that this has long been a concern for various industries. An attacker using the latest and most efficient equipment can monitor and retrieve classified or sensitive information as it is being processed without the user being aware that a loss is occurring. But new information states that the attacker doesn’t need to have access to the latest equipment. This master thesis is based on the three statements below:  It exists a cheap and simple TEMPEST technique that is a security risk.  A downloadable TEMPEST virus is a powerful tool when conducting TEMPEST attacks.  It does not exist a cheap and simple solution that protects common users from TEMPEST attacks. In the experiment I use a program called Tempest_for_eliza and a simple Philips radio receiver. In this thesis I prove that it exist a TEMPEST technique, that is cheap and relatively simple and still is a security risk. I prove this with facts from literature studies and an experiment. Today there is only one way to protect yourself against TEMPEST attacks and that is by metal shielding. This is expensive and home users have the option but not often the resources to finance this type of protection.

  • 272.
    Karlsson, Jonas
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Ingemannsen, Richard
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Säkerhet i trådlösa nätverk2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Användandet av trådlösa nätverk ökar med rask takt och blir allt vanligare. Enligt en artikel i Computer Sweden kommer de trådlösa näten att ha 20 miljoner användare om 4 år. Analysföretaget Gartner Group har nyligen gjort en undersökning bland företag, vars syfte var att ta reda på hur stort intresset var för WLAN. Resultatet visade att 50% av företagen funderar på att köpa och installera WLAN-lösningar (Planet Wireless september 2001). Syftet med detta arbete var att beskriva hur den inbyggda krypteringsfunktionen WEP som för Wired Equivalent Privacy fungerar och hur säker den är, dvs hur lätt man kan knäcka krypteringen. Följande frågeställningar har besvarats genom litteraturstudier och ett praktiskt försök: Hur är trådlösa nät uppbyggda? Hur fungerar den inbyggda krypteringen WEP och hur säker är den? Vad kan man göra förutom att använda sig av WEP för att skydda sig mot avlyssning/intrång? Det praktiska försöket bestod av att knäcka WEP-krypterade filer med hjälp av programmet WEPCrack. Resultatet från detta försök visade att det var praktiskt möjligt att få fram den hemliga nyckeln. Vi har fått bekräftat att vårt antagande, ?Baserat på de artiklar och tidningar vi har läst, antar vi att säkerheten i WLAN inte är tillfredsställande och nu vill vi på djupare plan ta reda på hur det ligger till med detta?, stämmer överens med den slutsats vi har kommit fram till. Slutsatsen är att WLAN är osäkra och att WEP går att knäcka.

  • 273. Karlsson, Lena
    et al.
    Berander, Patrik
    Regnell, Björn
    Wohlin, Claes
    Simple Is Better?: An Experiment on Requirements Prioritisation2003Conference paper (Refereed)
    Abstract [en]

    The process of selecting the right set of requirements for a product release is highly dependent on how well we succeed in prioritising the requirements candidates. There are different techniques available for requirements prioritisation, some more elaborate than others. In order to compare different techniques, a controlled experiment was conducted with the objective of understanding differences regarding time consumption, ease of use, and accuracy. The requirements prioritisation techniques compared in the experiment are the Analytical Hierarchy Process (AHP) and a variation of the Planning Game (PG), isolated from Extreme Programming. The subjects were 15 Ph.D. students and one professor, who prioritised mobile phone features using both methods. It was found that the straightforward and intuitive PG was less time consuming, and considered by the subjects as easier to use, and more accurate than AHP.

  • 274.
    Karlsson, Therese Westerlund
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Applying Interaction Design in a Software Development Project: Working out the general user for Messaging Systems2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    It is a challenge to work in a software development project. People with different backgrounds are together working towards the goal of delivering a run able piece of software. The influences to the design are many and all of them will affect how the program will be designed. During this spring we have been involved in a large software engineering project. Our part of the project has been focusing on interface design and using the design method persona. In this bachelor thesis we describe our experiences of participating in a software development project. We will explain how our design work was affected by the organisation of the project and how we have worked with adjusting the method of persona to the conditions given in the project. We will also describe the importance of communicating the design within the project. The main purpose of the report is to show how we during the project have become aware of the importance of tracing design decisions back to its origin. Many attributes has come to inform our design and this has made us aware of the importance of having a traceability of our work.

  • 275.
    Karlsson, Ulrika
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Olofsson, Sara
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Sandberg, Anneli
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Vad väljer din projektgrupp?2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Area of problems: Version control systems are developed for identification, to control changes, to guarantee that changes are implemented correctly and to report changes. Version control systems are used to save all history of different types of files that are used in the project group. For example, it can be used to check which dates the changes were made, by whom the files are modified and which comments are written about the changes. We have chosen two version control systems: Windchill ProjectLink and CVS, Concurrent Versions System, to examine whether both size and benefit of the project control the choice of version control system. Hypothesis and questions: The thesis is based upon the hypothesis:” If the projects size and benefit of version control system are depending on each other then they are controlled by the choice of version control system.” And our questions: • Which size are the project, number of hours and persons? • How many elements are used for each inner function? • Which internal and external functions affect the choice of version control system? Realization: Contact where made with eight project groups that are using Windchill ProjectLink or CVS and conducted interviews with them. An investigation where made where we measured the elements on every version control system. Through the interviews and our own investigation we found the information so we could answer the hypothesis by the questions. Conclusion: The size and the benefit are not depending on each other so they are not controlled by the choice of version control system. Therefore we reject our hypothesis.

  • 276. Karlström, Daniel
    et al.
    Runeson, Per
    Wohlin, Claes
    Aggregating Viewpoints for Strategic Software Process Improvement: A Method and a Case Study.2002In: IEE Proceedings - Software, ISSN 1462-5970, E-ISSN 1463-9831, Vol. 149, no 5, p. 143-152Article in journal (Refereed)
    Abstract [en]

    Decisions regarding strategic software process improvement (SPI) are generally based on the management's viewpoint of the situation, and in some cases also the viewpoints of some kind of an SPI group. This may result in strategies which are not accepted throughout the organisation, as the views of how the process is functioning are different throughout the company. A method for identifying the major factors affecting a process-improvement goal and how the perception of the importance of the factors varies throughout the organisation are described The method lets individuals from the whole development organisation rate the expected effect of these factors from their own viewpoint. In this way the strategic SPI decision can be taken using input from the entire organisation, and any discrepancies in the ratings can also give important SPI-decision information. The method is applied to a case study performed at Fuji Xerox, Tokyo. In the case study, significantly different profiles of the factor ratings came from management compared with those from the engineering staff. This result can be used to support the strategy decision as such, but also to anchor the decision in the organisation.

  • 277. Karlström, Daniel
    et al.
    Runeson, Per
    Wohlin, Claes
    Aggregating Viewpoints for Strategic Software Process Improvement: A Method and a Case Study.2002Conference paper (Refereed)
  • 278.
    Kihlström, Charlotte
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Kihlström, Mattias
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Öppen källkod och offentlig sektor2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Användandet, eller frånvaron, av öppen källkodsprogramvaror inom offentlig sektor är något som på senare tid har diskuterats flitigt både i artiklar och i internetanslutna diskussionsforum. Den offentliga sektorns behov av investeringar i nya IT-system kommer dessutom att öka i och med realiseringen av Statskontorets vision om 24-timmarsmyndigheten. Detta examensarbete undersöker hur välbekant begreppet öppen källkod är, vilka attityder som finns mot begreppet och hur stor utbredningen av öppen källkodsprogramvaror är hos Sveriges kommuner. Av resultatet framkommer att 60 % av alla IT-chefer och motsvarande i kommunerna känner till begreppet väl, att 80 % av alla tillfrågade upplever öppen källkod som något positivt och att drygt 30 % av alla kommuner redan använder någon form av programvara baserad på öppen källkod. De viktigaste fördelarna med öppen källkodsprogramvaror är den låga kostnaden, tillgången till all källkod och att man snabbt kan få del av andras förbättringar. I flera länder i både Europa och Asien, såväl som Sydamerika förekommer rekommendationer, eller åtminstone diskussioner, om hur öppen källkod bäst kan användas för att stödja den offentliga sektorn i respektive länder. För att användningen av öppen källkodsprogramvaror skall ta fart även bland Sveriges kommuner krävs fler leverantörer av support och andra kringtjänster, ytterligare förbättring av säkerheten hos programvarorna, samt mer information om vad begreppet faktiskt innebär.

  • 279.
    Kling, Martin
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Unsecured sessions with ICQ: applying forensic computing2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Digital evidence is becoming more and more frequent and important in investigations carried out by the police. To make the correct judgements, the police force needs to know what one can do with ICQ and in what ways it can be exploited. This thesis aims to point out weaknesses in ICQ that can aid the police in their work. But these weaknesses can not only be used by the police, also crackers can perform malicious acts with them. Therefore, I investigated if the use of ICQ resulted in non-secure sessions. To investigate ICQ’s security, I divided a session into an authentication phase, sending of messages, and the protection of stored messages in a history file. While investigating ICQ, I sniffed its Internet traffic and monitored files on the computer’s hard drive with MD5 checksums. I have investigated the following three ICQ applications: ICQ Pro 2003a, ICQ2Go and the Linux clone Licq. The result of the entire investigation showed that ICQ had a non-secured authentication phase, non-secured messages and no protection for stored messages. From these results the main conclusion was derived: The use of ICQ resulted in non-secure instant messaging sessions. Your ICQ account can be hijacked and another person can impersonate you and send messages that you dislike. Also, your messages can be intercepted on the Internet and their content can be read. If your computer is compromised, all your previous messages on ICQ Pro 2003a and Licq can be read.

  • 280. Klonowska, Kamilla
    et al.
    Lundberg, Lars
    Lennerstad, Håkan
    Using Modulo Golomb Rulers for Optimal Recovery Schemes in Distributed Computing2003Conference paper (Refereed)
  • 281.
    Knutsson, Karl
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Security Without Cost: A Cryptographic Log-structured File System2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Historically, cryptographic file systems have been several times slower than non-cryptographic file systems. This paper describes the design and implementation of a fast Cryptographic Log-structured File System on OpenBSD. We experimentally demonstrate that our pro-totype file system performs close to the Fast File System (FFS) and the Log-structured File System (LFS). To increase performance, our file system performs most encryption and decryption work during disk read and write operations. This is possible thanks to the SEAL encryption algorithm, a software optimized stream cipher that allows the en-cryption work to be performed prior to the actual data is available. We believe that our cryptographic file system design is ideal for optimal read and write performance on locally stored confidential data.

  • 282.
    Kristell, Martin
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Managing network loads with agent technology2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The objective for this thesis is to implement and compare four multi-agent architectures proposed to manage utilisation levels in distributed computing. The main part of this is to find and analyse the attributes that describe how the architectures differ from each other and make them excel in different contexts. The intelligent network concept from the telecommunication industry is used as sample application for the empirical examinations.

  • 283.
    Kronquist, Jan
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Extending the electric field approach2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Potential fields is popular technique in autonomous robotics. The Electric Field Approach is such a technique used for high level robot control. The approach was developed by Team Sweden for use in RoboCup 2000, a soccer competition for mobile robots. This thesis describes several improvements that has been made while preparing for RoboCup 2001. The improvements are used to create simple behaviors which achieve a form of implicit cooperation and also more active defence. This thesis also describes improvement ideas that failed to show the de-sired improvement and the reason for this is discussed, thereby deepening the understanding of the Electric Field Approach.

  • 284. Kuzniarz, Ludwik
    et al.
    Huzar, Zbigniew
    Reggio, Gianna
    Sourrouille, Jean Louis
    Staron, Miroslaw
    Workshop on Consistency Problems in UML-based Software Development II2003Report (Other academic)
    Abstract [en]

    Workshop materials of the Second Workshop on Consistency Problems in UML-based Software Development. The workshop is part of the Sixth International Conference on The Unified Modeling Language <<UML>> 2003

  • 285. Kuzniarz, Ludwik
    et al.
    Ratajski, J
    Code generation from UML based on specialized stereotype.2002Conference paper (Refereed)
  • 286. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    Generating Domain Models from Ontologies.2002Conference paper (Refereed)
    Abstract [en]

    The paper presents and elaborates on the idea of automatic acquisition of knowledge about domain structure from ontologies into an object-oriented software development process. The information required to be included in the domain model produced during the development process is identified. The existence of the knowledge in ontologies is investigated. Requirements for ontology description languages are formulated followed by brief evaluation of existing languages against these requirements. A schema for domain knowledge acquisition is outlined. A realization of the schema is sketched in the paper while the implementation details can be found in the technical report.

  • 287. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    Improving UML-based software development by using stereotypes for modeling persistency2003Conference paper (Refereed)
    Abstract [en]

    Persistency constitutes an important issue in software development and is of particular importance within object oriented design. However it seems that identification of persistent objects and their later design have not been given enough attention. The paper investigates one of UML-based software development process from the perspective of modeling persistency. Drawbacks of currently used typical approaches to modeling persistent data are identified and compared with mature techniques for database modeling. An improvement of the development process by providing means for modeling of persistency at early stages and introduction of data modeling technique into UML-based development process is proposed. The proposal is supported by a definition of UML persistent data modeling profile based on the usage of database technology for implementation persistency. Integration of the improvement with existing solutions for realization of persistency is also discussed.

  • 288. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    On model transformations in UML-Based Software Development Process2003Conference paper (Refereed)
    Abstract [en]

    Unified Modeling Language (UML) is becoming widely accepted standard notation for expressing artifacts within software development process. One of basic activities performed within such development process is producing new or modifying existing artefacts. This activity can be viewed as performing transformations. This work presents problem area of UML model transformations. It starts with clarification of the notion of a transformation and classification of transformations. Further it includes an attempt to introduce a systematic way of defining and implementing UML transformations. Focus is on practical aspects of the definition and the implementation process. An example of the usage of the approach is presented. Advantages of the approach are highlighted and research problems are listed.

  • 289. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    On Practical Usage of Stereotypes in UML-Based Software Development2002Conference paper (Refereed)
  • 290. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    Hellman, Erik
    Extracting information about domain structure from DAML+OIL encoded ontologies into UML2002Report (Other academic)
    Abstract [en]

    The report presents and elaborates on the details of knowledge acquisiton process from ontologies into domain models. It identifies the knowledge about the domain structure which already exist in form of ontologies, and it also gives the justification why is this knowledge important from domain models perspective. The general idea along with the detailed description and implementation of the process is presented. As the process is based on various XML based technologies, these are shown and described. A small example is introduced for depiction of the practical usage of the method.

  • 291. Kuzniarz, Ludwik
    et al.
    Staron, Miroslaw
    Wohlin, Claes
    Students as Study Subjects in Software Engineering experimentation2003Conference paper (Refereed)
  • 292.
    Kvarnström, Karin
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Isaksson, Ulrika
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Content Management Systems: effektiviserar informationshanteringen?2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    För ett par år sedan tog utvecklingen och fokuseringen kring Internet fart på allvar ute bland företag. Alla skulle ha en webbsida och anledningen till detta var ofta att konkurrenten hade en eller att man bara ville synas. Idag finns det ett antal så kallade Content Management System utvecklade för att hantera information på Internet, intranet och extranet. Det gemensamma för dessa system är att användarna skall kunna uppdatera, vidareutveckla och administrera lösningen utan någon teknisk kompetens. Syftet med den här uppsatsen var att undersöka om ett Content Management System effektiviserar uppdateringen av information, med hjälp av kategorier inom användbarhet. Användbarhet består av flera olika kategorier, dock har vi valt att begränsa oss till tre av dessa; effektivitet, syfte och tillfredsställelse. För att få djupare kunskaper inom ämnet användbarhet har vi läst böcker och artiklar, vi har även sökt information via Internet. Vi hittade information om användbarhetstest där vi fann en metod som hette utredning. I utredning kan man mäta användbarheten på system som är i bruk. För att kunna dra slutsatsen om ett Content Management System effektiviserar uppdateringen av data/information bestämde vi oss för att ta reda på hur informationsuppdateringen var före och under användningen av verktyget. Utredningen bestod av att vi gjorde en enkät som vi skickade ut till fem företag som använde verktyget. De företag som svarade på enkäten besökte vi och intervjuer gjordes. Det resultat vi kom fram till var att det är svårt att undersöka om ett verktyg effektiviserar uppdateringen av information eller inte. Svaret man får beror på hur företagen tidigare skött informationsuppdateringen. Ett företag som vi undersökte hade en fungerande lösning innan, den största anledningen att de skaffade verktyget var av ekonomiska skäl och detta generade till att informationsuppdateringen inte effektiviserades. De andra företagen som vi undersökte hade ingen bra lösning tidigare, de var beroende av andra personer exempelvis konsulter för sin upp-datering av information. Den generella slutsatsen vi kan dra av de företag som vi undersökt och av vår analys är att de flesta företag skulle få en effektivare uppdatering genom att använda ett Content Management System.

  • 293. Kyhlbäck, Hans
    Utilizing a Peer-to-Peer methodology in a municipal health care work: a design challenge.2002Conference paper (Refereed)
  • 294. Kyhlbäck, Hans
    et al.
    Bai, Guohua
    Sutter, Berthel
    A DWR approach to HCI design2003Conference paper (Refereed)
  • 295. Kyhlbäck, Hans
    et al.
    Persson, Hannes
    Wound Care Documentation at Municipal Elder Care2003In: Application of Software Agent Technology in the Health Care Domain / [ed] Nealon, A and; , Birkhauser Verlag , 2003Chapter in book (Other academic)
  • 296.
    Larsen, Åse
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mantzakanis, Tove
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    System Usability: a case study at the County Council of Blekinge2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The human factor constitutes a major element in the interaction with computers and computer systems. Responding to cognitive, social and organisational issues, the user of a system becomes an important part in system design, which earlier was paid very little attention to. These are the basics in the field of Human Computer Interaction (HCI) developed in order to enhance computer system usability. The theoretical framework applied our thesis is thus based on the principles of Human Computer Interaction. This thesis includes a case study at the e-commerce project at the County Council of Blekinge. We have chosen to focus on system development, technical and organisational approach within the e-commerce project. Our research is based on project documentation, literature and interviews with users of the system. The conclusion of our thesis shows that system usability is achieved within the system development and organisational approach. Within the technical approach verification of system usability cannot be made.

  • 297.
    Larsson, Thomas
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Svensson, Ola
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    INTRANÄT: Ett medium för kommunikationsverktyg2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Denna rapport tar upp hur olika kommunikationsverktyg kan utnyttjas i ett företags intranät. Det ges en kort beskrivning av ett intranäts olika delar och dess användningsområde samt vad kommunikation innebär. Det är endast de kommunikationsverktyg som företaget använder sig av som belyses i rapporten. Rapportens undersökning är gjord som en fallstudie på ett företag i Lund, där ett antal noggrant utvalda personer har fått svara på intervjufrågor. Svaren på intervjufrågorna har jämförts med insamlad teori inom området kommunikation i intranät. Viktigaste resultaten som framkommer av rapportens slutsatser är att företaget på det stora hela använder kommunikationsverktygen i intranät på så sätt som de beskrivs i teorin Dock finns det funktioner i vissa kommunikationsverktyg som företaget inte använder sig av.

  • 298. Larsson-Mauleon, Annika
    Newly graduated nurse anesthetists' experiences and views on anesthesia nursing -- a phenomenographic study2002In: AANA Journal , ISSN 0094-6354, Vol. 70, no 4, p. 281-287Article in journal (Refereed)
    Abstract [en]

    This qualitative study identifies and describes different ways in which newly graduated nurse anesthetist (NAs) experience and perceive nurse anesthesia. It explains different approaches to nurse anesthesia care and, thus, to clinical nursing care ( in an anesthesia and surgical context), provided by new NAs. One month after graduation, all NAs who had completed an anesthesia program responded to 4 open-ended questions. A phenomnographic method was used to analyze their responses. The results were divided into 3 categories, which describe nurse anesthesia from the perspectives of (1) maintaining physical well-being; (2) being protectors and advocates; and (3) ability to perform good nurse anesthesia given all the demands placed on the NAs. The results indicate that, for new NAs, the nurse anesthesia care situation was largely influenced by context and generated feelings of inadequacy because the NAs could not provide the emotional support that they believed their patients required.

  • 299. Lassing, Nico
    et al.
    Bengtsson, PerOlof
    Vliet, Hans van
    Bosch, Jan
    Experiences with ALMA: Architecture-level modifiability analysis2002In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 61, no 1, p. 47-57Article in journal (Refereed)
    Abstract [en]

    Modifiability is an important quality for software systems, because a large part of the costs associated with these systems is spent on modifications. The effort, and therefore cost, that is required for these modifications is largely determined by a system's software architecture. Analysis of software architectures is therefore an important technique to achieve modifiability and reduce maintenance costs. However, few techniques for software architecture analysis currently exist. Based on our experiences with software architecture analysis of modifiability, we have developed ALMA, an architecture-level modifiability analysis method consisting of five steps. In this paper we report on our experiences with ALMA. We illustrate our experiences with examples from two case studies of software architecture analysis of modifiability. These case studies concern a system for mobile positioning at Ericsson Software Technology AB and a system for freight handling at DFDS Fraktarna. Our experiences are related to each step of the analysis process. In addition, we made some observations on software architecture analysis of modifiability in general. (C) 2002 Elsevier Science Inc. All rights reserved.

  • 300. Lassing, Nico
    et al.
    Bengtsson, PerOlof
    Vliet, Hans van
    Bosch, Jan
    Experiences with SAA of Modifiability2000Report (Other academic)
    Abstract [en]

    Modifiability is an important quality for software systems, because a large part of the costs associated with these systems is spent on modifications. The effort, and therefore cost, that is required for these modifications is largely determined by a system’s software architecture. Analysis of software architectures is therefore an important technique to achieve modifiability and reduce maintenance costs. However, few techniques for software architecture analysis currently exist. Based on our experiences with software architecture analysis of modifiability, we have developed an analysis method consisting of five steps. In this paper we report on our experiences with this method. We illustrate our experiences with examples from two case studies of SAA of modifiability. These case studies concern a system for mobile positioning at Ericsson Software Techology and a system for freight handling at DFDS Fraktarna. Our experiences are related to each step of the analysis process. In addition, we made some observations on SAA of modifiability in general.

3456789 251 - 300 of 454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf