Change search
Refine search result
567891011 351 - 400 of 1407
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 351.
    Faisal, Chaudhry Muhammad Nadeem
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Usability Evaluation of Cloud Based Application2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The students mostly use web based services for achieving their goals in education. They need these services for different purposes. The usability aspect is a need to design these services to be more interactive in order to support the students at their work. Google Docs is the link to the concept Software as a service i.e. a type of cloud computing. A web based application that provides online resource to the users for creating, editing and storing their documents online. The author particularly discusses it from the Student’s perspective. Usability evaluation of the Google Docs is to find the students needs and requirements and also to investigate the usability issues in Google Docs. In this thesis the author is trying to uncover the usability and privacy related problems faced by the students. This is helpful in analyzing the Google Docs (Software as a service) and its importance, by considering the students perspective. Different usability methods and techniques are available for usability evaluation. The author adopted Think Aloud (TA), questionnaires and interview to evaluate the usability of Google Docs.

  • 352.
    Farooq, Khan H M
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Engineering of Context Dependent Quality of Service (QoS)2006Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The service oriented computing paradigm is a new model for distributed computing and due to its simplicity and powerful features, it is being popular and has a wide variety of implementation in different scenarios. The already built system is studies in detail, which was totally implemented using the Grid Technology. The idea of the current work is how we can implement the same functionality in the non-real time environment. The basic idea is to merge the web services and grid services to formulate the unique concept of context dependent quality of service (QoS) for both real time and non-real time solutions. When we merge these different types of services, the main focusing point is to define the service level agreement (SLA) when these different qualified services want to interact with each other. This document discusses and formulates the theoretical aspects, which in future work, can be consider for the practical implementation.

  • 353.
    Farooq, Umar
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Azmat, Usman
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Testing Challenges in Web-based Applications with respect to Interoperability and Integration2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Testing is one of the critical processes in software development life cycle. It plays key role in the success of software product by improving its quality. Web-based applications are emerging and evolving rapidly; their importance and complexity is also increasing. Heterogeneous and diverse nature of distributed components, applications; along with their multi-platform support and cooperativeness make these applications more complex and swiftly increasing in their size. Quality assurance of these applications is becoming more crucial and important; testing is one of the key processes to achieve and ensure the quality of these software or Web-based products. There are many testing challenges involved in Web-based applications. But most importantly interoperability and integration are the most critical testing challenges associated with Web-based applications. There are number of challenging factors involved in both integration and interoperability testing efforts. These integration and interoperability factors have almost 70 percent to 80 percent impact on overall quality of Web-based applications. In software industry different kind of testing approaches are used by practitioners to solve the issues associated with integration and interoperability, which are due to ever increasing complexities of Web-based applications. It is fact that both integration and interoperability are inter-related and it is very helpful to cover all the possible issues of interoperability testing that will reduce the integration testing effort. It will be more beneficial if a dedicated testing team is placed to perform the both integration and interoperability testing.

  • 354.
    Fayyaz, Muhammad-Hamid
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Idrees, Usman
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Usability Testing & Evaluation of Chores in GNU/Linux for Novice2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    A challenging issue of GNU/Linux: usability has been studied in this report. Usability is considered as one of the core component in any system software. System software should be efficient, effective and satisfying for users. Different studies on usability issue have been conducted in different distros but there is no specific study on Ubuntu 8.10. Ubuntu 8.10 is considered for usability evaluation of GNU/Linux system software and a multi-phased research approach is adopted. Participants (students) from different disciplines and level are taken to conduct the usability test. The system software is evaluated on the basis of usability test results and user’s opinion. An interview is designed and conducted to validate the tested findings of the system. GNU/Linux is serving the whole community as being used by different distros. The current set of interface guidelines and default softwares used by Ubuntu does not provide efficiency, effectiveness and satisfaction for novice users. It is very important aspect that software should have uniformity and complete control in applications. There is need to improve or redesign the default softwares for better usability in terms of interface, message windows, bugs and help etc for novice users.

  • 355. Feldt, Robert
    et al.
    Torkar, Richard
    Gorschek, Tony
    Afzal, Wasif
    Searching for Cognitively Diverse Tests: Towards Universal Test Diversity Metrics2008Conference paper (Refereed)
    Abstract [en]

    Search-based software testing (SBST) has shown a potential to decrease cost and increase quality of testingrelated software development activities. Research in SBST has so far mainly focused on the search for isolated tests that are optimal according to a fitness function that guides the search. In this paper we make the case for fitness functions that measure test fitness in relation to existing or previously found tests; a test is good if it is diverse from other tests. We present a model for test variability and propose the use of a theoretically optimal diversity metric at variation points in the model. We then describe how to apply a practically useful approximation to the theoretically optimal metric. The metric is simple and powerful and can be adapted to a multitude of different test diversity measurement scenarios. We present initial results from an experiment to compare how similar to human subjects, the metric can cluster a set of test cases. To carry out the experiment we have extended an existing framework for test automation in an object-oriented, dynamic programming language.

  • 356.
    Feroze, Zeeshan
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Ahmed, Bilal
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    3G Cellular Network2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In our thesis we discussed CDMA2000 and UMTS channels, QoS issues and Routing loops in 3G. We also discussed Handover and Mobility effects in 3G.

  • 357. Fiedler, Markus
    Euro-NGI D.JRA.6.1.1: State-of-the-art with regards to user-perceived Quality of Service and quality feedback2004Other (Other academic)
    Abstract [en]

    This deliverable D.JRA.6.1.1 presents a review of the state-of-the-art with regards to Quality of Service from the user's perspective and quality feedback, which is the topic of the corresponding work package WP.JRA.6.1 as part of the Joint Research Activity "Socio-Economic Aspects of Next Generation Internet" of the Network of Excellence "Euro-NGI". The document contains a survey of Quality of Service-related standards and discusses the current status regarding Quality of Servce in the Internet. The central role of the user is highlighted, and methods how to relate user perception to technical parameters on application and network level are discussed. Furthermore, currently existing quality feedback and management facilities in Internet are reviewed. Complementary work of the involved partners within these fields is presented, showing the broad range of compentence of the partners within the scope of JRA.6.1. Finally, relevant research issues are identified, providing a promising basis for future joint research.

  • 358. Fiedler, Markus
    Internet performance issues for safety-critical applications2004Conference paper (Refereed)
    Abstract [en]

    Networked safety-critical applications have to rely upon a certain Quality of Service (QoS). Internet, however, might not be that reliable in that respect. Thus, quality feedback towards the application is a crucial aspect. This contribution reviews typical origins of QoS problems and discusses possibilities how to monitor them. It also presents a lightweight monitoring solution for bandwidth problems which can be used for quality feedback towards the application.

  • 359. Fiedler, Markus
    Traffic Measurement and Characterization2004In: COST 279 - Midterm Report: Analysis and Design of Advanced Multiservice Networks Supporting Mobility, Multimedia, and Internetworking / [ed] Committee, COST 279 Management; Menth, M., Roma: ARACNE editrice S.r.l. , 2004, p. 49-73Chapter in book (Other academic)
    Abstract [en]

    We observe currently a fast evolution of web, multimedia, and especially peer-to-peer applications. This evolution yields a rapidly changing load environment for the transport of data streams subject to severe Quality of Service (QoS) constraints. Considering the needs for traffic planning and QoS assessment in wired and wireless access, as well as backbone networks, issues like load modeling and traffic characterization by thorough statistical techniques have to be addressed as the first basic steps of teletraffic engineering. For this purpose, new and reliable traffic measurement, modeling, and estimation techniques are required to accurately determine the traffic load and the resource usage in wired and wireless networks. The goal of this chapter consists in providing a comprehensive overview on related activities within the COST 279 action. Its structure reflects natural steps of obtaining results: traffic measurement, which concerns rather technical issues related to the collection of traffic and its statistics; traffic characterization, to provide a rather qualitative desciption of traffic behavior; traffic modeling, to provide a rather quantitative description with focus on models and their parameters; and traffic estimation, which is about inference and prediction of traffic volumes based on observations.

  • 360. Fiedler, Markus
    Traffic Measurement, Characterization and Modeling2005In: Analysis and Design of Advanced Multiservice Networks Supporting Mobility, Multimedia, and Internetworking. COST Action 279 Final Report / [ed] Brazio, J.; Tran-Gia, P.; Akar, N.; Beben, A.; Burakowski, W.; Fiedler, Markus; Karasan, E.; Menth, M.; Olivier, P.; Tutschku, K., Springer , 2005, p. 97-125Chapter in book (Refereed)
    Abstract [en]

    N/A

  • 361. Fiedler, Markus
    et al.
    Blouin, Francois
    Arlos, Patrik
    18th ITC Specialist Seminar on Quality of Experience2008Report (Other academic)
    Abstract [en]

    The notion and topic of Quality of Experience (QoE) keeps attracting the attention of manufacturers, operators and researchers. It links user perception and expectations on one side and technical Quality of Service (QoS) parameters, management, pricing schemes etc. on the other side. Such links are needed in order to balance user satisfaction and economic aspects of service provisioning. However, the notion of QoE as such is not without controversy. Technicians, used to a world of objective and clearly definable parameters, tend to fear the subjective, somehow fuzzy parts associated with end user perception. Vice versa, customer relationship and marketing departments might find themselves uncomfortable with technical parameters which might not reflect the user perception in some tense situations. Nevertheless, appearance and utility of a networked service depend on the underlying technical solutions and their performance. Thus, we face the challenge of bringing it all together, which essentially describes the spirit of the 18th ITC Specialists Seminar on Quality of Experience (ITC-SS 18). ITC Specialist Seminars have a very good reputation in gathering experts and their high-quality contributions around a performance-oriented topic of mutual interest. ITC-SS 18 is intended as a meeting place between experts, researchers, practitioners, vendors and customers. It is devoted to presentations and discussions of QoE concepts, analysis, management approaches etc., both from industry and academia. While many conferences are dominated by academia, one third of the submissions to ITC-SS 18 originated from industry. The contributions have been peer-reviewed by at least three independent reviewers and finally, we selected 18 papers to be presented. Additionally, two keynote speeches reflect one industrial and one academic approach to QoE analysis and implementation. For the ITC, the leading conference for performance modeling and analysis of communication networks & systems, ITC-SS 18 opens a window towards the end user. ITC-SS 18 takes place in Karlskrona on May 29—30, 2008. It is organized by the Dept. of Telecommunication Systems (ATS) within the School of Engineering (TEK) at Blekinge Institute of Technology (BTH) in cooperation with the International Advisory Council (IAC) of ITC.

  • 362. Fiedler, Markus
    et al.
    Chevul, Stefan
    Isaksson, Lennart
    Lindberg, Peter
    Karlsson, Johan
    Communication requirements of generic services for Intelligent Transport Systems2004Other (Other academic)
    Abstract [en]

    In order to meet their users’ expectations and to be of efficient help for people using or maintaining Intelligent Transport Systems (ITS), related services need efficient support from the underlying communication systems, which in turn requires profound knowledge of those needs. This paper presents an approach to gather services into generic groups and a framework to classify their needs in terms of availability, performance, security and cost in a generic manner. These needs are consequently seen from the user’s perspective, but formulated in a way such that the matching towards technical parameters as e.g. throughput offered by a communication network can be performed. Upon comparing needs with offers, the feasibility of a certain communication technology for a certain type of service can be determined, which in turn helps to choose the right kind of connectivity in order to yield the desired degree of availability, performance, security and cost. This work is carried out within the VINNOVA-sponsored project PIITSA (Personal Information for Intelligent Transport Systems through Seamless communications and Autonomous decisions) conducted by Aerotech Telub, Blekinge Tekniska Högskola, Statens Provningsanstalt Borås and Vägverket, respectively.

  • 363. Fiedler, Markus
    et al.
    Chevul, Stefan
    Isaksson, Lennart
    Lindberg, Peter
    Karlsson, Johan
    Generic communication requirements of its-related mobile services as basis for seamless communications.2005Conference paper (Refereed)
    Abstract [en]

    In order to meet user expectations and to be of efficient help for people using or implementing Intelligent Transport Systems and Services (ITS), mobile ITS-related services need efficient support from the underlying communication systems, which in turn requires profound knowledge of those needs. As a first step towards an optimal automatic choice of communication technologies in order to provide for seamless communications, this paper groups services into generic groups and presents a framework to classify their needs in terms of availability, performance, security and cost in a generic manner. These needs are consequently seen from the user’s perspective, but formulated in a way such that they can be matched towards known network parameters. Upon comparing needs with offers, the feasibility of a certain communication technology for a certain type of service can be determined both proactively and reactively, which helps to automatically select the right kind of connectivity in order to yield the desired degree of availability, performance, security and cost. We motivate for instance the need for determining and monitoring applicationperceived speeds, a multi-level security models and the one-stop service concept. We also provide an example on how these needs can be matched to offers by different networks.

  • 364. Fiedler, Markus
    et al.
    Chevul, Stefan
    Isaksson, Lennart
    Tutschku, Kurt
    Binzenhöfer, Andreas
    The Throughput Utility Function: Assessing network impact on mobile services2005Conference paper (Refereed)
    Abstract [en]

    Based on the need for distributed end-to-end quality management for next-generation mobile Internet services, this paper presents a ready-to-deploy quality assessment concept for the impact of the network on the performance of mobile services. We consider the throughput utility function (TUF) as a special case of the network utility function (NUF). These functions combine the observed network utility at the inlet and the outlet of a mobile network. NUF and TUF capture the damping effect of the network onto user-perceived quality from an end-to-end perspective. As opposed to sometimes hard-to-evaluate QoS parameters such as delay and loss, the NUF is highly intuitive due to its mapping to a simple value between 0 and 100 %, which reflects user perception. We demonstrate the capabilities of the proposed TUF by measurements of application-perceived throughput conducted in a mobile, i.e. GPRS and UMTS network.

  • 365. Fiedler, Markus
    et al.
    Eliasson, Charlott
    Ciszkowski, Tomasz
    Mazurczyk, Wojciech
    Kotulski, Zbigniew
    Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security2008Conference paper (Other academic)
    Abstract [en]

    In this paper, we propose how to parameterize and maintain a reputation system that, based on the current network conditions, supports the selection of the optimal end-to-end communication path for VoIP communication in a P2P context. Each node’s reputation is formed based on three factors: (1) performance reputation (own experience from passive measures of the network conditions); (2) security reputation; and (3) information reputation consisting of recommendations from other nodes. Reputation data is periodically updated from continuous monitoring of path quality and security and also from information exchange between the nodes. When network conditions deteriorate, the reputation system enables switching, if possible, to another available path for furthercommunication. The proposed reputation system is a component of the SecMon system, which is intended especially for VoIP service over P2P networks. SecMon features lightweight QoS parameter monitoring, authentication and data integrity services. The exchange of monitoring information represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned exchange features are accomplished by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement results. Moreover, in this paper, we present results of the simulations that were performed to investigate how the proposed reputation system is performing for a simple twopath case scenario. Additionally, we show how different network conditions like delays and packet losses affect the proposed reputation system and how they are modeled with utility functions. Results of the simulations also illustrate the approaches to thresholds that trigger path changes.

  • 366. Fiedler, Markus
    et al.
    Isaksson, Lennart
    Chevul, Stefan
    Karlsson, Johan
    Lindberg, Peter
    Measurements and analysis of application-perceived throughput via mobile links2005Conference paper (Refereed)
    Abstract [en]

    Application-perceived throughput plays a major role for the performance of networked applications and thus for user experience. Especially in mobile environments, throughput is limited, which is a challenge for applications and users. On this background, this tutorial paper investigates the process of user-perceived throughput in GPRS and UMTS systems seen over rather small averaging intervals. It discusses the corresponding active measurements mimicking the needs of streaming applications and analyzes results with aid of summary statistics, histograms and autocorrelation coefficients. These results reveal a clear influence of the network, seen from variations and autocorrelation of application-perceived throughput mostly on the one-second time scale. Such an influence has to be considered when choosing the right kind of network for a specific task. To that aim, the investigated metrics will serve as input to a multi-criteria decision process to determine the proper network for a specific service. The results indicate that, applications have to cope with considerably large jitter when trying to use the nominal throughputs. In GPRS, the promised average throughputs are not even reached in downlink direction; instead, a quite large amount of packet loss occurs. With aid of causality arguments for an equivalent bottleneck, bounds for the extra delay of the first packet sent via mobile links can in fact be derived from throughput measurements.

  • 367. Fiedler, Markus
    et al.
    Persson, Mårten
    Bertilsson, Tobias
    Situationsberoende spontan mobil informationstjänst för resenärer2005Other (Other academic)
    Abstract [en]

    Detta bidrag kommer att beskriva en tjänst (applikation) som försörjer resenärer med aktuell och relevant reseinformation under resans gång. Tjänsten är tilltänkt som demonstration för sömlös kommunikation inom det VINNOVA-sponsrade projektet PIITSA = Personal Information for Intelligent Transport Systems through Seamless communications and Autonomous decisions. Tjänsten kommer att kombinera Public Streaming with Personal Interactive Services för att ge resenären spontan information om aktuella trafikstörningar på dennes resa samt alternativa reseförslag. Den är tilltänkt att kunna köras via sömlös kommunikation. Tjänsten designas av magisterstudenter vid BTH inom kursen ETD013 Mobila Tjänster – vilkens verksamket kommer att belyses kort – samt efterföljande magisterarbete. Mobila tjänster, informationstjänst, situationsberoende tjänst, tjänstearkitektur, sömlös kommunikation

  • 368.
    Fiedler, Markus
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Zepernick, Hans-Jürgen
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Lundberg, Lars
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Arlos, Patrik
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Pettersson, Mats
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    QoE-based Cross-Layer Design of Mobile Video Systems: Challenges and Concepts2009Conference paper (Refereed)
    Abstract [en]

    This conceptual paper focuses on revealing challenges and offering concepts associated with the incorporation of the Quality of Experience (QoE) paradigm into the design of mobile video systems. The corresponding design framework combines application, middleware and networking layer in a unique cross-layer approach, in which all layers shall jointly analyse the quality of the video and its delivery in face of volatile conditions. Particular ingredients of the framework are efficient video processing, advanced realtime scheduling, and reduced-reference metrics on application and network layer.

  • 369.
    Fontecha, Gorka Treceño
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Barbero., Beatriz Mora
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Examination of Various Approaches to Possibly Improve the Existing Algorithms Applied in Fingerprint Recognition Systems2007Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    In human fingerprints there are plenty of small details which are the discontinuities in the ridges, denoted minutiae. Minutiae-based matching is a wellknown method applied in fingerprint recognition. Minutiae defines a representative feature vector of a fingerprint. Due to quality variations in fingerprint images a preprocessing in form of binarization and skeltonization is applied, before obtaining the feature vector. Once the features of each fingerprint are obtained, a matching algorithm carries out the comparison task between those features vectors to determine if they match. In the new binarization function, quality at the same time that speed are essential requirements. In order to sort out this subject, areas of an adaptive size are analyzed instead of a pixel by pixel examination. The binarization algorithm is implemented in the frequency domain with the concept of ridges and their orientations. Skeletonization is needed as a preprocessing step with the aim of obtaining the minutiae from the fingerprint. It is a matter of fact that the high quality skeleton is an emphatic factor in the fingerprint recognition. A robust skeletoned image will ensure a reliable extraction of features. Several strategies relating to the application of filters will be discussing in order to speed-up the iteractive thinning algorithms. The proposed minutiae matching algorithms explore though several variations of the geometric hashing method. Based on minutiae features, new approaches are presented to obtain an effectiveness function.

  • 370.
    Forslund, Joakim
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Johansson, Andreas
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Elektronisk signering – Kommer användaracceptansen att påverkas inom 24-timmars myndigheten?2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Utvecklingen av medborgare samt företags användande av Internet har ökat dramatiskt under de senaste fem åren. Det ökande Internetanvändandet ledde till att statskontoret 1999 fick i uppdrag av regeringen att ta fram olika förslag samt underlag som skulle ligga till grund för begreppet 24-timmars myndigheten. Tjänsten är beräknad att tas tillbruk i Sverige år 2005. 24-timmars myndigheten kommer tillämpa ett antal olika säkerhetslösningar, därav elektronisk signering. Denna utredning skall belysa hur stort inflytande säkerhetslösningen elektronisk signering kommer att ha på användaracceptansen av denna tjänst. Dessa frågor skall besvaras genom att intervjua två IT-företag och intervjufrågorna skall beröra om de överhuvudtaget ser säkerhetslösningarna som ett problem. Frågeställningar: Kommer elektronisk signering att påverka användaracceptansen vid införandet av 24-timmars myndigheten? • Vilken påverkan kommer elektronisk signering att ha på användaracceptansen? • Vilka säkerhetsrisker finns det med elektronisk signering? • Hur stor är medvetenheten till riskerna inom elektronisk singering? Metod: Vi använder intervjuer som underlag för resultatet. Denna metod skall ligga till grund för att kartlägga betydelsen av användaracceptansen inom säkerhetslösningen elektronisk signering. Slutsats: Det framkomna resultatet, inom vår utredning, tyder på att elektroniska signaturer endast kommer att utgöra en liten del av den framtida användaracceptansen inom tjänsten 24-timmars myndigheten.

  • 371.
    Fransson, Elisabeth
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Krav på kraven: Varför kravspecifikationer inte uppdateras och vad det kan ge för konsekvenser2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Detta magisterarbete fokuserar på kravhantering i systemutvecklingsprocessen. Mer specifikt handlar det om uppdatering av kravspecifikationen då nya krav tillkommer. Detta är en aktivitet som ofta förbises och jag har velat se varför samt vilka konsekvenser det kan leda till. Det referensföretag där undersökningen utfördes är ITT Flygt i Emmaboda och Solna, som har intern utveckling av system för sin verksamhet. Tillvägagångssättet i undersökningen har främst varit intervjuer, men även studier av de dokument som finns i verksamheten. En slutsats är att en del av de skälen till att uppdatering av kravspecifikationen inte görs är för att kravspecifikationen inte har alla de användningsområden som litteraturen förespråkar. En annan anledning är att det inte är en aktivitet som prioriteras. En korrekt hantering av kravspecifikationen ger fördelar så som kontroll över tid och resurser i projektet så att resurserna kan läggas på de förändringar som är i störst behov av förändring.

  • 372.
    Fransson, Linda
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Jeansson, Therese
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Biometric methods and mobile access control2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began to search for biometric methods that are available today to find them that would be best suited together with a mobile phone. After we had read information about them we did choose three methods for further investigation. These methods were Fingerprint Recognition, Iris Scan and Speaker Verification. Iris Scan is the method that is best suited to solve the authentication problem. The reasons for this are many. One of them is the uniqueness and stability of the iris, not even identical twins or the pair of the same individual has the same iris minutiae. The iris is also very protected behind eyelids, cornea and the aqueous humor and therefore difficult to damage. When it comes to the method itself, is it one of the most secure methods available today. One of the reasons for this is that the equal error rate is better than one in a million. However, this rate can be even better. It all depends on the Hamming Distance, which is a value that show how different the saved and temporarily template are, and what it is set to. To solve our session authentication, which was to make sure that no one else could take over a connected mobile phone, a sensor plate is the answer. This sensor will be able to sense for touch, heat and pulse. These three sensor measurements will together secure a validated session since the mobile phone will disconnect if the sensor looses its sensor data. There are, however, technological and other challenges to be solved before our proposed solutions will become viable. We address some of these issues in our thesis.

  • 373.
    Franzén, Daniel
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Operatörsoberoende SMS-leverans med designmönstret Bridge2007Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    When different type of programs are developed one wants to make these adjustable to future changes and requirements. It must be done a good design of the program from the beginning to make it possible to continue development of it without having to redo big parts of it to high costs. In the area of object orientation there are design pattern, which can be used to design systems that can be adjusted to new changes in an easier way. I have in this thesis chosen to take a closer look at how to design a program that sends SMS to cell phones through a system of an operator. One requirement on the program is that it has to be possible to change what operator to send though in an easy way. I have chosen a design pattern named Bridge and investigate if a use of it makes a program operator independent. This thesis is for system developers who have basic knowledge of object orientation and have programmed in Java. The hypothesis that is tested is: "If the design pattern Bridge is used to construct a program that sends SMS, then it will be a program where an operator's API easily can be replaced by another operator's API. The investigation was done by collecting a number of API's from different companies who offer the possibility to send SMS through themselves. Code was created for the classes that are part of the design pattern Bridge and specific code for every tested API were done and compiled and run. After that the possibility to switch between API's in an easy way was investigated. The result of the investigation was that it is possible to integrate some of the API's with Bridge and that the switching between API's is working. But to find out if Bridge can be used in a real program demands further investigations.

  • 374.
    Franzén, Nicklas
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Network Sockets, Threading or select for multiple concurrent connections2008Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The purpose of the thesis is to present a foundation for selecting an appropriate model while building a concurrent network server, focusing on a comparison between a select() based server and one thread for each connection. The test conducted herein is based two echo servers ( the message sent is echoed back to the sender ) and the time they take to serve a number of clients. The programs written for it are run on both Windows and Linux to show if the choice of platform affects the methods efficiency. Also looking at the return time of select() when we have a number of sockets, as well the time it takes to create a set number of threads. The conclusion drawn in this thesis is that for up to 512 sockets there is really no significant difference in the time it takes for the test program to return, this was true for both the Windows and the Linux test. Note however that the threading implementation requires much more memory than the select based one. So in the end it is basically up to personal preferences.

  • 375. Fredriksson, Martin
    A conceptual framework for scientific visualization and instrumentation of open computational systems2004Conference paper (Refereed)
  • 376. Fredriksson, Martin
    Online engineering: On the nature of open computational systems.2004Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Computing has evolved from isolated machines, providing calculative support of applications, toward communication networks that provide functional support to groups of people and embedded systems. Perhaps, one of the most compelling feature and benefit of computers is their overwhelming computing efficiency. Today, we conceive distributed computational systems of an ever-increasing sophistication, which we then apply in various settings – critical support functions of our society just to name one important application area. The spread and impact of computing, in terms of so-called information society technologies, has obviously gained a very high momentum over the years and today it delivers a technology that our societies have come to depend on. To this end, concerns related to our acceptance of qualities of computing, e.g., dependability, are increasingly emphasized by users as well as vendors. An indication of this increased focus on dependability is found in contemporary efforts of mitigating the effects from systemic failures in critical infrastructures, e.g., energy distribution, resource logistics, and financial transactions. As such, the dependable function of these infrastructures is governed by means of more or less autonomic computing systems that interact with cognitive human agents. However, due to intricate system dependencies as well as being situated in our physical environment, even the slightest – unanticipated – perturbation in one of these embedded systems can result in degradations or catastrophic failures of our society. We argue that this contemporary problem of computing mainly is due to our own difficulties in modeling and engineering the involved system complexities in an understandable manner. Consequently, we have to provide support for dependable computing systems by means of new methodologies of systems engineering. From a historical perspective, computing has evolved, from being supportive of quite well defined and understood tasks of algorithmic computations, into a disruptive technology that enables and forces change upon organizations as well as our society at large. In effect, a major challenge of contemporary computing is to understand, predict, and harness the involved systems’ increasing complexity in terms of constituents, dependencies, and interactions – turning them into dependable systems. In this thesis, we therefore introduce a model of open computational systems, as the means to convey these systems’ factual behavior in realistic situations, but also in order to facilitate our own understanding of how to monitor and control their complex interdependencies. Moreover, since the critical variables that govern these complex systems’ qualitative behavior can be of a very elusive nature, we also introduce a method of online engineering, whereby cognitive agents – human and software – can instrument these open computational systems according to their own subjective and temporal understanding of some complex situation at hand.

  • 377. Fredriksson, Martin
    et al.
    Gustavsson, Rune
    Trustworthy and sustainable operations in marine environments2003Conference paper (Refereed)
    Abstract [en]

    A multi-agent implementation of self-healing systems

  • 378. Fricker, Samuel
    et al.
    Gorschek, Tony
    Glinz, Martin
    Goal-Oriented Requirements Communication in New Product Development2008Conference paper (Refereed)
    Abstract [en]

    Product development organizations often distribute the responsibilities for requirements engineering over several roles. The collaboration of product management, concerned with market needs, and product development, concerned with the technological aspects of a product, is well established. Such shared responsibility provides advantages in the utilization of specific knowledge, skills, and resources. However, the collaboration leads to increased demands on coordination. Novel concepts and models need to be investigated to support such collaborative requirements engineering. In this paper we focus on requirements communication from product management to a development team by proposing and evaluating the model of goaloriented requirements communication. The model explains how efficiency and effectiveness of requirements communication can be increased and allows the utilization of established requirements engineering knowledge in a new way to address the task of requirements communication.

  • 379. Fricker, Samuel
    et al.
    Gorschek, Tony
    Myllyperkiö, Petri
    Handshaking Between Software Projects and Stakeholders Using Implementation Proposals2007In: Requirements Engineering: Foundation for Software Quality, Berlin/Heidelberg: Springer , 2007, p. 144-159Chapter in book (Refereed)
    Abstract [en]

    Handshaking between product management and R&D is key to the success of product development projects. Traditional requirements engineering processes build on good quality requirements specifications, which typically are not achievable in practical circumstances, especially not in distributed development where daily communication cannot easily be achieved to support the understanding of the specification and tacit knowledge cannot easily be spread. Projects thus risk misunderstanding requirements and are likely to deliver inadequate solutions. This paper presents an approach that uses downstream engineering artifacts, design decisions, to improve upstream information, a project’s requirements. During its preliminary validation, the approach yielded promising results. It is well suited for distributed software projects, where the negotiation on requirements and solution design need to be made explicit and potential problems and misunderstandings caught at early stages.

  • 380.
    Gabriel, Karim
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Moudarres, Sani Al
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    The development of a Speech Level Adjustment Technique for late Deaf People2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    People that become deaf later on in life do have the ability to speak with correct pronunciation but since they can not hear their own voice nor the noise in the enviroment, they have difficulties to adjust their voice level to the surrounding environment. In this thesis we propose and algorithm which can be used on a prototype to help the late deafened people to adjust their voice level to the surrounding.

  • 381.
    Gagbla, George Kofi
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Applying Keystroke Dynamics for Personal Authentication2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    With the establishment of the information society, security had become the greatest concern for Institutions transacting business over the Internet. Home banking and on-line brokerage applications currently, use basic software-only security functions for the internet such as server authentications and Secure Sockets layer. Higher levels of protections are being achieved with Smart card based authentication schemes and transaction protocols. Password based security identifies users based on what they know – the password or PIN, which can be guessed, hacked, found or stolen. Smart Cards, tokens and badges identify users based on what they have which can also be lost, loaned or stolen. The objective of the thesis was to design and implement a biometric authentication scheme by means of keystroke dynamics to secure web applications. The scheme illustrates the effect of the template size and the number of biometric features used to improve performance of FAR, FRR and EER. The enrolment process is devoid of spurious outliers that may introduce significant variations to template data. Due to the dependence of the system on the user’s psychological characteristics, the adaptation module introduces dynamism into the template features per changes in the legitimate user’s login template variants. At the quest of attaining a zero bias in statistical variants, an off-line simulator tool was designed to regenerate impostor and genuine data set obtained from live users and set as input to the system. The report includes an architectural description of the system, conceptual models and analysis of field data of over 200 samples.

  • 382.
    Gall, Dariusz
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Molenda, Michał
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    EDOC to EJB transformations within MDA2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The Model Driven Architecture is a proposition of the framework of software development process where main accent is put on system models, i.e. platform independent and platform dependent models, and transformations between them. Applying the MDA is related with preparation of these two types of assets. In the thesis, the EDOC and the EJB platform are considered as an examples of platform-independent and platform dependent models. In order to complete this picture, additionally transformations between these two models are required. The authors focus in the thesis on transformations. In particular, the authors present the transformation specification description, and specify set of transformations between the EDOC and EJB models. The transformations are narrowed to the subset of structural aspects of the EDOC models.

  • 383.
    Ganti, Sudhir
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Multimedia Security in P2P Networks2006Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This Master thesis is a contribution to develope Multimedia security mechanisms for various P2P file sharing environments. Objective of this research thesis is to design a software tool for Multimedia business environments to fight against the copyright infringement in various P2P file sharing networks. In order to fulfil this objective, a combined implementation of two independent mechanisms designed at Fraunhofer IPSI is required. So far, the combined implementation does not yet exist for any P2P network. So, the first objective is to design a most comprehensive architecture for their implementation and the second objective is to validate that implementation built on top of the architecture. To do so, we have chosen BitTorrent network for implementation and validation.

  • 384. Gencel, Cigdem
    et al.
    Buglione, Luigi
    Impact of Base Functional Component Types on Software Functional Size based Effort Estimation2008Conference paper (Refereed)
    Abstract [en]

    Software effort estimation is still a significant challenge for software management. Although Functional Size Measurement (FSM) methods have been standardized and have become widely used by the software organizations, the relationship between functional size and development effort still needs further investigation. Most of the studies focus on the project cost drivers and consider total software functional size as the primary input to estimation models. In this study, we investigate whether using the functional sizes of different functionality types, represented by the Base Functional Component (BFC) types; instead of using the total single size figure have a significant impact on estimation reliability. For the empirical study, we used the projects data in the International Software Benchmarking Standards Group (ISBSG) Release 10 dataset, which were sized by the COSMIC FSM method.

  • 385.
    Gertsovich, Irina
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Bartuněk, Josef Ström
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Håkansson, Lars
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Nilsson, Mikael
    A novel methodology for the interoperability evaluation of an iris segmentation algorithm2013Conference paper (Refereed)
    Abstract [en]

    The performance of an iris recognition system depends greatly on how well the iris segmentation part of the system performs its task. The performance of an iris segmentation algorithm can be evaluated using different criteria and methods. Some of the methods evaluate the performance of the segmentation algorithm based on the performance of the whole iris recognition system. Other methods evaluate the performance of an iris segmentation subsystem independent of the performance of the system's other subsystems. To our knowledge there do not exist a generally accepted method or criteria for the evaluation of the standalone iris segmentation subsystem. This paper proposes a novel methodology to compare the performance of different iris segmentation algorithms, applied to different image datasets in a consistent way. The methodology employs the F1 score and an empirical cumulative distribution function. The implementation of the F1 score estimation, adapted to the iris segmentation task is described. Finally the application of the proposed methodology is demonstrated and discussed.

  • 386.
    Gili, Carla
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Soler, Estefanía
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Comparison and Evaluation of Different Types of Vehicles to Transport Containers within an Intermodal Terminal2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Due to globalisation, transport policies have been changing and adapting to increase the demands and the needs of the market. Sea ports have a major role in the economic system in which they coordinate the transport of large volumes of cargo in long distances with a high level of productivity. The growth of handling cargo has led to increase congestion in roads because roads are the most used method to transport goods between port and its hinterland. This is the reason why many West European ports are working with train terminals as an alternative form of transport. As part of an intermodal case of study, we have focused on train terminal operations at the port of Barcelona, because currently there is not enough capacity, but it is expected to increase within the next ten years. Moreover, because of the limited geographicalarea, it is important to take in consideration the method for managing the logistics within the container terminal in Barcelona. The objective of this study is to develop a model to analyse and evaluate different types of horizontal transport between the yard and the train terminal at the port of Barcelona in order to identify the most suitable transport system. We compare five different transport systems under three scenarios. The results indicate that some horizontal transport systems are more efficient than others.

  • 387.
    Gjertz, Johan
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Säkerställning av Kunddata i ett Distribuerat System2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This work presents a security analysis of a distributed software system. Relevant threats have been identified and a set of possible countermeasures are presented. The different countermeasures have been compared against each other by looking at performance, scalability, flexibility, usability and cost considerations. A prototype system has been implemented as a proof-of-concept with database encryption, logging and access control.

  • 388.
    Gomes, Andrigo
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Pettersson, Andreas
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Market-Driven Requirements Engineering Process Model – MDREPM2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Research findings in requirements engineering (RE) report that software organizations still struggle in establishing processes that lead to proper requirements handling. This leads to the acknowledgement that the adoption of good requirements engineering practices by industry is still not common. Although some initiatives have been made to spread the use of good practices of bespoke RE, the area of market-driven requirements engineering (MDRE) still lacks a contribution in that direction. MDRE is characterized by strong market and strategic orientation, which contrasts with the customer/development organization relationship of bespoke RE. This poses several challenges to software product organizations, such as the need for aligning development activities with organizational and product strategies. In an attempt to help these organizations to realize the benefits of MDRE, this Master Thesis presents the Market-Driven Requirements Engineering Process Model (MDREPM). MDREPM is both a collection of good practices in MDRE, and an assessment tool for organizations to get a snapshot of the current state of their MDRE practices. The assessment intends to reveal problem areas of organization’s requirements process, which can then be worked upon by introducing good practices described in the model. The thesis describes the motivation for creating MDREPM, both from an academia and industry perspectives. In addition, it describes the process of developing the model, from its creation through to its validation within academia and industry. As the series of three case studies conducted indicate, the MDREPM has been shown to be useful for industry practitioners. A unanimous opinion has been found as to the good coverage it provides of issues related to MDRE, and as to its usefulness for driving improvement efforts in requirements engineering.

  • 389.
    Gopidi, Vijay Kumar
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Evaluation of Live Sequence Charts Using Play Engine Tool2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Capturing a requirement is a great challenge in the initial stages of the software development, be it a system requirement or a customer requirement to the software engineers. Understanding the requirement and predicting or differentiating what may happen and what must happen is difficult especially in the complex real time systems. Live sequence charts are extensions of the message sequence charts which can specify the live ness of the requirements. And the play engine tool is used to specify, validate, and analyze the scenarios of the requirements. This thesis is to evaluate live sequence charts using the play engine tool and to see if the built-in model checkers can detect inconsistencies in the LSC’s.

  • 390. Gorschek, Tony
    Requirements Engineering Supporting Technical Product Management2006Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Market-Driven Requirements Engineering (MDRE) handles the continuous flow of requirements in an engineering effort, and is not limited to a development instance but part of technical product management as a whole. The market-driven environment generates large amounts of requirements from multiple sources, internal and external, threatening to overload the technical management of products. MDRE involves requirements analysis, resource estimation, prioritization, and ultimately release planning. These activities allow for effectively deciding which customers get what features and quality at what point in time, making the accuracy and efficiency of MDRE a major determinant of the success of a product. This thesis presents research aimed at supporting technical product management in MDRE, based on needs identified in industry. One contribution of the thesis is the development and validation of a process assessment and improvement planning framework, making the identification of process improvement issues possible. The major characteristics of the framework can be described as resource efficiency and relative accuracy by utilizing multiple perspectives and data point triangulation. As a complement to the assessment, the improvement planning enables industry professionals to focus their efforts on one improvement package at a time, supporting step-by-step evolution with less time to return on investment. Challenges identified during process assessment using the framework resulted in the development of the Requirements Abstraction Model (RAM), which is the central contribution of the thesis. RAM employs multiple levels of abstraction for requirements elicitation, analysis, refinement and management. The model offers the possibility for early requirements triage using product strategies/roadmaps, as well as supporting a structured and repeatable way to perform continuous requirements engineering. This enables product managers to specify requirements that can be traced across abstraction levels, from abstract requirements that can be used by managers, to refined requirements specific enough to be used for estimation and input to development efforts. RAM was engineered based on industry needs, validated and refined through several empirical evaluations, utilizing both academia and industry as laboratory. This involved close collaboration with industrial partners, Danaher Motion Särö AB and ABB Robotics, where the model was introduced. Monitoring the process improvement (introduction of RAM) indicated substantial improvements, both in accuracy of the work performed using RAM, and in the quality of the requirements produced, with only moderate increase in effort. Another contribution in the thesis is a compilation of lessons learned from practical handson experience of technology and knowledge transfer from academia to industry, with focus of producing industry relevant usable and useful results. The main contribution of the thesis is improving the practice of product management by providing and evaluating frameworks for software process improvement and market-driven requirements engineering. The results of the research presented in the thesis are aimed at supporting technical product management taking the unique challenges of market-driven development into account.

  • 391. Gorschek, Tony
    Software Process Assessment & Improvement in Industrial Requirements Engineering2004Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Requirements Engineering (RE) is a crucial part of any product management and product development activity, and as such deficiencies in the RE process may have severe consequences. There are reports from industry that point towards inadequate requirements being one of the leading sources for project failure. Software Process Improvement (SPI) is generally seen as the main tool to address process deficiencies in general and within RE. Assessments lead to establishing plans for improvements that are subsequently implemented and evaluated, and then the SPI cycle starts again, in an optimal case being incremental and continuous. Most well known SPI frameworks, e.g. CMM, CMMI, SPICE and QIP, are based on these general principles. There are however several factors that can have a negative impact on SPI efforts in general, and in the case of SPI targeted at RE in particular. Time and cost are two fundamental factors that can effectively “raise the bar” for SPI efforts being initiated at all. This is the particular case for Small and Medium sized Enterprises (SMEs) with limited resources, and a limited ability to wait for the return on their investment. Other issues include commitment and involvement in the SPI work by the ones affected by the changes, coverage of the RE area in SPI frameworks, and the ability to focus improvements to areas where they are needed the most. The research presented in this thesis is based on actual needs identified in industry, and all of the proposed solutions have also been validated in industry to address issues of applicability and usability. In general, the goal of the research is to “lower the bar”, i.e. enabling SMEs to initiate and perform SPI activities. It is accomplished through the presentation and validation of two assessment methods that targets RE, one aimed at both fast and low-cost benchmarking of current practices, and the other designed to produce tangible improvement proposals that can be used as input to an improvement activity, i.e. producing a relatively accurate assessment but taking limited time and resources into account. Further, to offer a structured way in which SMEs can focus their SPI efforts, a framework is introduced that can be used to package improvement proposals with regards to their relative priority taking dependencies into account. This enables SMEs to choose what to do first based on their needs, as well as a way to control time to return on their investment by controlling the size of the undertaking. As a result of industry validation of the assessment method and packaging framework, several improvement proposals were identified and prioritized/packaged. As a part of a process improvement effort (based on an improvement proposal package) an RE model was developed that was appropriate for SMEs faced with a market-driven product centered development situation. The model, called Requirements Abstraction Model (RAM), addresses the structuring and specification of requirements. The main feature of the model is that it not only offers a structured way in which requirements can be specified, but it also takes a requirement’s abstraction level into account, using abstraction for the work-up instead of putting all requirements in one repository independent of abstraction level. The RAM was developed to support primarily the product management effort, recognizing that RE from this perspective is not project initiated but rather project initiating. The model assists product managers to take requirements on varying abstraction levels and refining them to the point of being good-enough to offer decision support for management, and at the same time being good-enough for project initiation. The main contribution of the thesis is to present SMEs with “tools” that help them commit to and perform SPI activities. Moreover, the thesis introduces the RAM model that was developed based on needs identified in industry, and subsequently piloted in industry to assure usability.

  • 392. Gorschek, Tony
    et al.
    Davis, Alan
    Assessing the Quality of Requirements Process Changes2005Conference paper (Refereed)
  • 393. Gorschek, Tony
    et al.
    Davis, Alan
    Requirements Engineering: In Search of the Dependent Variables2008In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 50, no 1-2, p. 67-75Article in journal (Refereed)
    Abstract [en]

    When software development teams modify their requirements engineering process as an independent variable, they often examine the implications of these process changes by assessing the quality of the products of the requirements engineering process, e.g., a software requirements specification (SRS). Using the quality of the SRS as the dependent variable is flawed. As an alternative, this paper presents a framework of dependent variables that serves as a full range for requirements engineering quality assessment. In this framework, the quality of the SRS itself is just the first level. Other higher, and more significant levels, include whether the project was successful and whether the resulting product was successful. And still higher levels include whether or not the company was successful and whether there was a positive or negative impact on society as a whole. © 2007 Elsevier B.V. All rights reserved.

  • 394. Gorschek, Tony
    et al.
    Dzamashvili-Fogelström, Nina
    Test-Case Driven Inspection of Pre-Project Requirements: Process Proposal and Industry Experience Report2005Conference paper (Refereed)
  • 395. Gorschek, Tony
    et al.
    Fricker, Samuel
    Feldt, Robert
    Wohlin, Claes
    Mattsson, Michael
    1st International Global Requirements Engineering Worskshop: GREW´072008In: Software Engineering Notes, ISSN 0163-5948 , Vol. 33, no 2, p. 29-32Article in journal (Refereed)
    Abstract [en]

    GREW´07 was held in conjunction with the International Conference on Global Software Engineering in Munich Germany. The aim was to bring researchers and industry practitioners together to discuss the area of global product development from a requirements engineering and product management perspective. The workshop aimed to analyze selected challenges put forward by accepted papers from both industry and academia. The session discussions then focused on identifying future needs for research, the relevance of which was assured by good industry presence at the workshop. The workshop resulted in a number of findings that can play an important role to further develop the field of global product management and requirements engineering.

  • 396. Gorschek, Tony
    et al.
    Garre, Per
    Larsson, Stig
    Wohlin, Claes
    A Model for Technology Transfer in Practice2006In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 23, no 6, p. 88-95Article in journal (Refereed)
    Abstract [en]

    Technology transfer, and thus industry-relevant research, involves more than merely producing research results and delivering them in publications and technical reports. It demands close cooperation and collaboration between industry and academia throughout the entire research process. During research conducted in a partnership between Blekinge Institute of Technology and two companies, Danaher Motion Saro AB (DHR) and ABB, we devised a technology transfer model that embodies this philosophy. We initiated this partnership to conduct industry-relevant research in requirements engineering and product management. Technology transfer in this context is a prerequisite: it validates academic research results in a real setting, and it provides a way to improve industry development and business processes

  • 397. Gorschek, Tony
    et al.
    Garre, Per
    Larsson, Stig
    Wohlin, Claes
    Industry Evaluation of the Requirements Abstraction Model2007In: Requirements Engineering, ISSN 0947-3602, E-ISSN 1432-010X, Vol. 12, no 3, p. 163-190Article in journal (Refereed)
    Abstract [en]

    Software requirements are often formulated on different levels and hence they are difficult to compare to each other. To address this issue, a model that allows for placing requirements on different levels has been developed. The model supports both abstraction and refinement of requirements, and hence requirements can both be compared with each other and to product strategies. Comparison between requirements will allow for prioritization of requirements, which in many cases is impossible if the requirements are described on different abstraction levels. Comparison to product strategies will enable early and systematic acceptance or dismissal of requirements, minimizing the risk for overloading. This paper presents an industrial evaluation of the model. It has been evaluated in two different companies, and the experiences and findings are presented. It is concluded that the requirements abstraction model provides helpful improvements to the industrial requirements engineering process.

  • 398. Gorschek, Tony
    et al.
    Svahnberg, Mikael
    Requirements Experience in Practice: Studies of Six Companies2005In: Engineering and Managing Software Requirements / [ed] Aurum, A.; Wohlin, C., Springer Verlag , 2005, p. 405-426Chapter in book (Refereed)
  • 399. Gorschek, Tony
    et al.
    Svahnberg, Mikael
    Borg, Andreas
    Börstler, Jürgen
    Eriksson, Magnus
    Loconsole, AnnaBella
    Sandahl, Kristian
    A Controlled Empirical Evaluation of a Requirements Abstraction Model2007In: Information and Software Technology, ISSN 0950-5849 , Vol. 49, no 7, p. 790-805Article in journal (Refereed)
    Abstract [en]

    Requirement engineers in industry are faced with the complexity of handling large amounts of requirements as development moves from traditional bespoke projects towards market-driven development. There is a need for usable and useful models that recognize this reality and support the engineers in a continuous effort of choosing which requirements to accept and which to dismiss off hand using the goals and product strategies put forward by management. This paper presents an evaluation of such a model that is built based on needs identified in industry. The evaluation's primary goal is to test the model's usability and usefulness in a lab environment prior to large scale industry piloting, and is a part of a large technology transfer effort. The evaluation uses 179 subjects from three different Swedish Universities, which is a large portion of the university students educated in requirements engineering in Sweden during 2004 and 2005. The results provide a strong indication that the model is indeed both useful and usable and ready for industry trials.

  • 400. Gorschek, Tony
    et al.
    Svensson, Richard Berntsson
    Regnell, Björn
    Quality Requirements in Practice: An Interview Study in Requirements Engineering for Embedded Systems2009Conference paper (Refereed)
567891011 351 - 400 of 1407
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf