Change search
Refine search result
1234 1 - 50 of 186
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ciceri, Eleneora
    MediaClinics, ITA.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). MediaClinics, ITA.
    Mosconi, Marco
    MediaClinics, ITA.
    Vicini, Sauro
    MediaClinics, ITA.
    Using PAPAYA for eHealth – Use Case Analysis and Requirements2020In: 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), IEEE, 2020, p. 437-442Conference paper (Refereed)
    Abstract [en]

    This paper presents an eHealth use case basedon a privacy-preserving machine learning platform to detectarrhythmia developed by the PAPAYA project that can run inan untrusted domain. It discusses legal privacy and user requirementsthat we elicited for this use case from the GDPR andvia stakeholder interviews. These include requirements for securepseudonymisation schemes, for allowing also pseudonymous usersto exercise their data subjects rights, for not making diagnosticdecisions fully automatically and for assurance guarantees, conformancewith specified standards and informing clinicians andpatients about the privacy protection. The requirements are notonly relevant for our use case but also for other use cases utilisingprivacy-preserving data analytics to classify medical data.

    Download full text (pdf)
    fulltext
  • 2.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    Peón-Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway Communications, Norway.
    Evensen, Kristian
    Celerway Communications, Norway.
    Hansen, Audun
    Celerway Communications, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino, Italy.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Ajmone Marsan, Marco
    IMDEA Networks Institute, Spain and Politecnico di Torino, Italy.
    Experience: An open platform for experimentation with commercial mobile broadband networks2017In: MobiCom '17 Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, New York: Association for Computing Machinery (ACM), 2017, p. 70-78Conference paper (Refereed)
    Abstract [en]

    Open experimentation with operational Mobile Broadband (MBB) networks in the wild is currently a fundamental requirement of the research community in its endeavor to address the need of innovative solutions for mobile communications. Even more, there is a strong need for objective data about stability and performance of MBB (e.g., 3G/4G) networks, and for tools that rigorously and scientifically assess their status. In this paper, we introduce the MONROE measurement platform: an open access and flexible hardware-based platform for measurements and custom experimentation on operational MBB networks. The MONROE platform enables accurate, realistic and meaningful assessment of the performance and reliability of 11 MBB networks in Europe. We report on our experience designing, implementing and testing the solution we propose for the platform. We detail the challenges we overcame while building and testing the MONROE testbed and argue our design and implementation choices accordingly. We describe and exemplify the capabilities of the platform and the wide variety of experiments that external users already perform using the system

  • 3.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    A Case Study of Recent Mifare Classic Field Deployments From an (In-)Security Perspective2013In: Proceedings of the 21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2013), Split, Croatia: FESB, University of Split , 2013Conference paper (Refereed)
    Abstract [en]

    Mifare Classic is a very popular near-field communication technology that provides a shared-key, access-controlled, storage. Although the authentication protocol of Mifare Classic is compromised since half a decade, systems are still being deployed based on this technology, e.g. for access control systems and for public transport ticketing. By using commodity hardware, such as NFC enabled smartphones, by passing the security measures in some cases only require the installation and operation of a smartphone app. To this end, we present case studies of a number of recent Mifare Classic systems deployed during the last year, to serve as an illustration of practical security problems and to raise awareness thereof among NFC technology buyers and system implementors.

  • 4.
    Alfredsson, Stefan
    Karlstad University, Division for Information Technology.
    TCP in Wireless Networks: Challenges, Optimizations and Evaluations2005Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis presents research on transport layer behavior in wireless networks. As the Internet is expanding its reach to include mobile devices, it has become apparent that some of the original design assumptions for the dominant transport protocol, TCP, are approaching their limits. A key feature of TCP is the congestion control algorithm, constructed with the assumption that packet loss is normally very low, and that packet loss therefore is a sign of network congestion. This holds true for wired networks, but for mobile wireless networks non-congestion related packet loss may appear. The varying signal power inherent with mobility and handover between base-stations are two example causes of such packet loss. This thesis provides an overview of the challenges for TCP in wireless networks together with a compilation of a number of suggested TCP optimizations for these environments. A TCP modification called TCP-L is proposed. It allows an application to increase its performance, in environments where residual bit errors normally give a degraded throughput, by making a reliability tradeoff. The performance of TCP-L is experimentally evaluated with an implementation in the Linux kernel. The transport layer performance in a 4G scenario is also experimentally investigated, focusing on the impact of the link layer design and its parameterization. Further, for emulation-based protocol evaluations, controlled packet loss and bit error generation is shown to be an important aspect.

    Download full text (pdf)
    FULLTEXT02
  • 5.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    Bit Error Tolerant Multimedia Transport2004In: Perspectives on Multimedia: Communication, Media and Information Technology, Chichester: John Wiley & Sons, 2004, p. 175-191Chapter in book (Other academic)
  • 6.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    TCP-L: Allowing Bit Errors in Wireless TCP2003In: Proceedings of the 12th IST Summit on Mobile and Wireless Communications: Enabling a Pervasive Wireless World / [ed] Atílio Gameiro, Institute for Operations Research and the Management Sciences (INFORMS), 2003, p. 149-154Conference paper (Refereed)
    Abstract [en]

    This paper presents a technique to improve the performance of TCP and the utilization of wireless networks.Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannotseparate packet losses due to bit errors versus congestion,all losses are treated as signs of congestion and congestionavoidance is initiated. This paper explores the possibility of accepting TCP packets with an erroneous checksum, toimprove network performance for those applications that can tolerate bit errors. Since errors may be in the TCP header aswell as the payload, the possibility of recovering the headeris discussed. An algorithm for this recovery is also presented.Experiments with an implementation have been performed,which show that large improvements in throughput can beachieved, depending on link and error characteristics.

  • 7.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    A 4G Link Level Emulator for Transport Protocol Evaluation2004In: Proceedings of The Second Swedish National Computer Networking Workshop (SNCNW), 2004, p. 19-23Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and networkemulator, based upon the "Wireless IP" 4G system proposalfrom Uppsala University and partners. In wireless fading down-links (base to terminals) link-level frames are scheduled andthe transmission is adapted on a fast time scale. With fastlink adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteractedat the physical and link layers. A purpose of the emulatoris to investigate the resulting interaction with transport layer protocols. The emulator is built on Internet technologies, andis installed as a gateway between communicating hosts. The paper gives an overview of the emulator design, and presentspreliminary experiments with three different TCP variants. The results illustrate the functionality of the emulator by showing theeffect of changing link layer parameters on the different TCP variants.

  • 8.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Cross-layer analysis of TCP performance in a 4G system2007In: Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks, IEEE Computer Society, 2007Conference paper (Refereed)
    Abstract [en]

    This paper presents results from an experimental study of TCP in a wireless 4G evaluation system. Test-bed results on transport layer performance are presented and analyzed in relation to several link layer aspects. The aspects investigated are the impact of channel prediction errors, channel scheduling, delay, and adaptive modulation switch level, on TCP performance. The paper contributes a cross-layer analysis of the interaction between symbol modulation levels, different scheduling strategies, channel prediction errors and the resulting frame retransmissions effect on TCP. The paper also shows that highly persistent ARQ with fast link retransmissions do not interact negatively with the TCP retransmission timer even for short round trip delays.

  • 9.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Emulation and Validation of a 4G System Proposal2005In: Proceedings of RadioVetenskap och Kommunikation 2005: Volume II, 2005, p. 357-362Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and network emulator,along with experiments and validation against the "Wireless IP" 4G system proposal from Uppsala University and partners. In wireless fading downlinks (base to terminals) link-level frames are scheduled and the transmission is adapted on a fast time scale. With fast link adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteracted at thephysical and link layers. The emulator has been used to experimentally investigate the resulting interaction between the transport layer and the link layer. The paper gives an overview of the emulator design, and presents experimental results with three different TCP variants in combination with various link layer characteristics.

  • 10.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Impact of 4G Wireless Link Configurations on VoIP Network Performance2008In: Proceedings of the 2008 IEEE International Symposium on Wireless Communication Systems, IEEE Communications Society, 2008, p. 708-712Conference paper (Refereed)
    Abstract [en]

    The performance of applications in wireless networks is partly dependent upon the link configuration. Link characteristics varies with frame retransmission persistency, link frame retransmission delay, adaptive modulation strategies, coding, and more. The link configuration and channel conditions can lead to packet loss, delay and delay variations, which impact different applications in different ways. A bulk transfer application may tolerate delays to a large extent, while packet loss is undesirable. On the other hand, real-time interactive applications are sensitive to delay and delay variations, but may tolerate packet loss to a certain extent. This paper contributes a study of the effect of link frame retransmission persistency and delay on packet loss and latency for real-time interactive applications. The results indicate that a reliable retransmission mechanism with fast link retransmissions in the range of 2-8 ms is sufficient to provide an upper delay bound of 50 ms over the wireless link, which is well within the delay budget of voice over IP applications.

  • 11.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Transport Protocol Performance over 4G Links: Emulation Methodology and Results2006In: Proceedings of the International Symposium on Wireless Communication Systems (ISWCS), IEEE Computer Society, 2006, p. 327-332Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and network emulator for the "Wireless IP" 4G system proposal from Uppsala University and partners. In wireless fading downlinks (base to terminals) link-level frames are scheduled and the transmission is adapted on a fast time scale. With fast link adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteracted at the physical and link layers. The emulator has been used to experimentally investigate the resulting interaction between the transport layer and the physical/link layer in such a downlink. The paper introduces the Wireless IP system, describes the emulator design and implementation, and presents experimental results with TCP in combination with various physical/link layer parameters. The impact of link layer ARQ persistency, adaptive modulation, prediction errors and simple scheduling are all considered.

  • 12.
    Ali, Nour
    et al.
    Brunel University, London, UK.
    Baker, Sean
    University of Limerick, Ireland.
    O'Crowley, Ross
    Red Orkid Limited, Dublin, Ireland.
    Herold, Sebastian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Buckley, Jim
    University of Limerick, Ireland.
    Architecture consistency: State of the practice, challenges and requirements (vol 23, pg 224, 2018)2018In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 23, no 3, p. 1868-1869Article in journal (Refereed)
    Download full text (pdf)
    fulltext
  • 13.
    Anderson, Collin
    et al.
    University of Pennsylvania, USA.
    Winter, Philipp
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    -, Roya
    Global Network Interference Detection over the RIPE Atlas Network2014Conference paper (Refereed)
    Abstract [en]

    Existing censorship measurement platforms frequentlysuffer from poor adoption, insufficient geographic coverage, and scalability problems. In order to outline ananalytical framework and data collection needs for futureubiquitous measurements initiatives, we build on top ofthe existent and widely-deployed RIPE Atlas platform.In particular, we propose methods for monitoring thereachability of vital services through an algorithm thatbalances timeliness, diversity, and cost. We then use Atlas to investigate blocking events in Turkey and Russia.Our measurements identify under-examined forms of interference and provide evidence of cooperation betweena well-known blogging platform and government authorities for purposes of blocking hosted content.

    Download full text (pdf)
    foci2014
  • 14.
    Andersson, Gustaf
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    En Kvalitativ studie om förändringsarbete vid ett IT-projekt: En fallstudie på en segelflygklubb2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Organisationer och ledare saknar ofta en förståelse om kärnan i ett förändringsarbete, förståelsen om hur människor fungerar. Förändring leder ofta till starka känslor och vissa drabbas hårdare än andra, medarbetare kan lätt omvandlas till motståndare om ledningen inte möter personalen rätt.

     

    Syftet med denna uppsats är att ge en kunskapsbas i hur en projektgrupp ska arbeta mot användare för att motivera dem till en positiv inställning inför förändringen. Den ger en förståelse för människors behov, drivkrafter och olika orsaker till varför motstånd till förändring kan uppstå hos de berörda.

    Datainsamlingen har skett genom en litteraturstudie inom området för att sedan samla in empiri genom halvstrukturerade intervjuer. Samtliga respondenter kommer från en segelflygsförening och syftet med det var att ta reda på hur föreningen hanterat olika förändringsarbeten. Dels ett redan avslutat förändringsarbete då de övergick till ett system för internetbokning av flygplan och även ett förändringsarbete som inte realiserats än, en digital lösning till deras tidsrapportering.

     

    Det finns flera olika alternativ som en ledare kan applicera för att motivera sina anställda vid ett förändringsarbete. Dessa tillvägagångssätt kan vara effektiva på sina egna vis, mycket beroende på sammanhanget och det specifika fallet. För att effektivisera momentet motivation gäller det att välja rätt tillvägagångssätt vid rätt tillfälle. Något som förutsätter att ledare har en förståelse för individen och de reaktioner denne har gentemot förändringen.

    Download full text (pdf)
    fulltext
  • 15.
    Andersson, Jan-Olof
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Larsson, Samuel
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Tobias, Sjöholm
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Implementation of the NEAT Policy Manager2019Report (Refereed)
    Abstract [en]

    The NEAT system was developed in 2017 to increase flexibility in the choice of network transport protocol being used. One of the most important components of the NEAT system is the Policy Manager (PM), which determines what protocol is to be utilized by the application. The PM is written in Python while the rest of the NEAT system is C-based, so a natural evolution of the PM is to perform a functional translation of it to C. While the main goal was solely to develop a fully functional C-based PM, the difference in programming languages in the end also brought a performance increase of 28 times compared with the Python-based PM. There are still a few improvements left to do in the PM, but it is already a notable improvement for the NEAT system as a whole.

    Download full text (pdf)
    fulltext
  • 16.
    Andersson Nyrén, Martina
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Pilotstudier avanvändargränssnitt till app för smärtpatienter2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Experio Lab i Landstinget i Värmland, Karolinska Institutet och Kungliga TekniskaHögskolan håller i dag på med att utveckla en digital tjänst i form av en app försmärtpatienter. Målet är att genom en digital tjänst kunna lära sig mer om hur patienter kankartlägga sina besvär inför ett möte med sjukvården.

    Uppsatsen syftar till att inför kommande användbarhetstester på riktiga patienterundersöka hur väl prototypen fungerar när det kommer till gränssnittet och ge förslag somskulle kunna förbättra appen inför de kommande användbarhetstesterna.

    Undersökningen genomfördes i två steg: Först testades appen som en pappersprototyp.Därefter genomfördes användbarhetstester med hjälp av studenter och experter inomtjänstedesign på en ipad-platta, där både intervjuer och observationer gjordes. Resultatetvisade att flera av testpersonerna hade samma sorts svårigheter när det kom till att interageramed appen. Svårast var att rita sina besvär på besvärsteckningen samt att veta var i processenman befann sig. Efter genomförande av studien uppgav de flesta testpersonerna att de skullerekommendera appen till någon de kände. Majoriteten såg även behov av att appensanvändargränssnitt blir tydligare för användaren.

    Download full text (pdf)
    fulltext
  • 17.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Designing for Usable Privacy and Transparency in Digital Transactions2015Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. With every transaction, people take decisions and make disclosures of personal data. Despite the possible benefits of collecting data about a person or a group of people, massive collection and aggregation of personal data carries a series of privacy and security implications which can ultimately result in a threat to people's dignity, their finances, and many other aspects of their lives. For this reason, privacy and transparency enhancing technologies are being developed to help people protect their privacy and personal data online. However, some of these technologies are usually hard to understand, difficult to use, and get in the way of people's momentary goals.

    The objective of this thesis is to explore, and iteratively improve, the usability and user experience provided by novel privacy and transparency technologies. To this end, it compiles a series of case studies that address identified issues of usable privacy and transparency at four stages of a digital transaction, namely the information, agreement, fulfilment and after-sales stages. These studies contribute with a better understanding of the human-factors and design requirements that are necessary for creating user-friendly tools that can help people to protect their privacy and to control their personal information on the Internet.

    Download full text (pdf)
    Avhandling_Angulo
    Download (jpg)
    presentationsbild
  • 18.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable Transparency through network representations and analyses2015In: The Future of Networked Privacy: Challenges and opportunities, 2015Conference paper (Refereed)
    Abstract [en]

    We explore how concepts from the field of network science can be employed to inform Internet users about the way their personal identifiable information (PII) is being used and shared by online services. We argue that presenting users with graphical interfaces that display information about the network structures that are formed by PII exchanges can have an impact on the decisions users take online, such as the services they choose to interact with and the information they decide release.

  • 19.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ulrich, König
    HCI for Policy Display and Administration2011In: Privacy and Identity Management for Life / [ed] Jan Camenish, Simone Fischer-Hübner and Kai Rannenberg, Berlin: Springer Berlin/Heidelberg, 2011, 1, p. 261-277Chapter in book (Refereed)
    Abstract [en]

    The PrimeLife Policy Language (PPL) has the objective of helping end users make the data handling practices of data controllers more transparent, allowing them to make well-informed decisions about the release of personal data in exchange for services. In this chapter, we present our work on user interfaces for the PPL policy engine, which aims at displaying the core elements of a data controller's privacy policy in an easily understandable way as well as displaying how far it corresponds with the user's privacy preferences. We also show how privacy preference management can be simplified for end users.

  • 20.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Towards Usable Privacy Policy Display & Management: The PrimeLife Approach2011In: Proceedings of 5th International Symposium on Human Aspects of Information Security & Assurance / [ed] Steven Furnell, Plymouth: University of Plymouth , 2011, p. 108-118Conference paper (Refereed)
  • 21.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Social and Psychological Studies.
    Identity Management through “Profiles”: Prototyping an Online Information Segregation Service2013In: Human-Computer Interaction. Users and Contexts of Use: 15th International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings, Part III / [ed] Masaaki Kurosu, Springer Berlin/Heidelberg, 2013, Vol. 8006, p. 10-19Conference paper (Refereed)
    Abstract [en]

    Whereas in real everyday life individuals have an intuitive approach at deciding which information to disseminate to others, in the digital world it becomes difficult to keep control over the information that is distributed to different online services. In this paper we present the design of a user interface for a system that can help users decide which pieces of information to distribute to which type of service providers by allowing them to segregate their information attributes into various personalized profiles. Iterative usability evaluations showed that users understand and appreciate the possibility to segregate information, and revealed possible improvements, implications and limitations of such an interface.

  • 22.
    Asplund, Katarina
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    Partially Reliable Multimedia Transport2004Report (Other academic)
  • 23.
    Asplund, Katarina
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    The trade-off Between Latency and Image Quality: A User PerspectiveManuscript (preprint) (Other (popular science, discussion, etc.))
  • 24.
    Asplund, Katarina
    et al.
    Karlstad University, Division for Information Technology.
    Garcia, Johan
    Brunstrom, Anna
    Schneyer, Sean
    Decreasing Transfer Delay Through Partial ReliabilityManuscript (preprint) (Other (popular science, discussion, etc.))
  • 25.
    Aupke, Phil
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Nakao, Akihiro
    The University of Tokyo, Japan.
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Deggendorf Institute of Technology, Germany.
    Uncertainty-Aware Forecasting of Computational Load in MECs Using Distributed Machine Learning: A Tokyo Case Study2024In: Proceedings - International Conference on Computer Communications and Networks, ICCCN, Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper (Refereed)
    Abstract [en]

    Mobile Edge Clouds (MECs) address the critical needs of bandwidth-intensive, latency-sensitive mobile applications by positioning computing and storage resources at the network’s edge in Edge Data Centers (EDCs). However, the diverse, dynamic nature of EDCs’ resource capacities and user mobility poses significant challenges for resource allocation and management. Efficient EDC operation requires accurate forecasting of computational load to ensure optimal scaling, service placement, and migration within the MEC infrastructure. This task is complicated by the temporal and spatial fluctuations of computational load.We develop a novel MEC computational demand forecasting method using Federated Learning (FL). Our approach leverages FL’s distributed processing to enhance data security and prediction accuracy within MEC infrastructure. By incorporating uncertainty bounds, we improve load scheduling robustness. Evaluations on a Tokyo dataset show significant improvements in forecast accuracy compared to traditional methods, with a 42.04% reduction in Mean Absolute Error (MAE) using LightGBM and a 34.93% improvement with CatBoost, while maintaining minimal networking overhead for model transmission. 

  • 26.
    Baucke, Stephan
    et al.
    Ericsson Research, Germany.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ludwig, Reiner
    Ericsson Research, Germany.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Wolisz, Adam
    Department of Electrical Engineering, Technical University Berlin, Germany.
    Using Relaxed Timer Backoff to Reduce SCTP Failover TimesManuscript (Other academic)
  • 27.
    Bayram, Firas
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ahmed, Bestoun S.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hallin, Erik
    Uddeholms AB, Sweden.
    Engman, Anton
    Uddeholms AB, Sweden.
    DQSOps: Data Quality Scoring Operations Framework for Data-Driven Applications2023In: EASE '23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Association for Computing Machinery (ACM), 2023, p. 32-41Conference paper (Refereed)
    Abstract [en]

    Data quality assessment has become a prominent component in the successful execution of complex data-driven artificial intelligence (AI) software systems. In practice, real-world applications generate huge volumes of data at speeds. These data streams require analysis and preprocessing before being permanently stored or used in a learning task. Therefore, significant attention has been paid to the systematic management and construction of high-quality datasets. Nevertheless, managing voluminous and high-velocity data streams is usually performed manually (i.e. offline), making it an impractical strategy in production environments. To address this challenge, DataOps has emerged to achieve life-cycle automation of data processes using DevOps principles. However, determining the data quality based on a fitness scale constitutes a complex task within the framework of DataOps. This paper presents a novel Data Quality Scoring Operations (DQSOps) framework that yields a quality score for production data in DataOps workflows. The framework incorporates two scoring approaches, an ML prediction-based approach that predicts the data quality score and a standard-based approach that periodically produces the ground-truth scores based on assessing several data quality dimensions. We deploy the DQSOps framework in a real-world industrial use case. The results show that DQSOps achieves significant computational speedup rates compared to the conventional approach of data quality scoring while maintaining high prediction performance.

    Download full text (pdf)
    fulltext
  • 28.
    Bernhard, David
    et al.
    University of Bristol, UK.
    Oksana, Kulyk
    Technische Universität Darmstadt, Germany.
    Volkamer, Melanie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Technische Universität Darmstadt, Germany.
    Security proofs for Participation privacy, receipt-freeness and ballot privacy for the helios voting scheme2017In: ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security, New York: Association for Computing Machinery (ACM), 2017, article id UNSP 1Conference paper (Refereed)
    Abstract [en]

    The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy. However, depending on its version, the scheme provides either participation privacy (hiding who participated in the election) or verifiability against malicious bulletin board (preventing election manipulation by ballot stuffing), but not both at the same time. It also does not provide receipt-freeness, thus enabling vote buying by letting the voters construct receipts proving how they voted. Recently, an extension to Helios, further referred to as KTV-Helios, has been proposed that claims to provide these additional security properties. However, the authors of KTV-Helios did not prove their claims. Our contribution is to provide formal definitions for participation privacy and receipt-freeness that we applied to KTV-Helios. In order to evaluate the fulfillment of participation privacy and receipt-freeness, we furthermore applied the existing definition of ballot privacy, which was also used for evaluating the security of Helios, in order to show that ballot privacy also holds for KTV-Helios

    Download full text (pdf)
    fulltext
  • 29.
    Berthold, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Inter-temporal Privacy Metrics2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied, distributed, and long-term stored at negligible costs. This has dramatic consequences for individuals that leave traces in the form of personal data whenever they interact with information technology, for instance, computers and phones; or even when information technology is recording the personal data of aware or unaware individuals. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology.

    The objective of this thesis is to study the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party which uses this data for re-identifying the individual within a set of other individuals. We contribute with privacy metrics for several instances of this scenario in the publications included in this thesis, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. The result is a new framework for inter-temporal privacy metrics.

    Download full text (pdf)
    fulltext
    Download (jpg)
    preview image
  • 30.
    Berthold, Stefan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lundin, Reine
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Re-identification revisitedManuscript (preprint) (Other academic)
  • 31.
    Blom, Martin
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eldh, Sigrid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Is Common Test Data the Solution to Poor Quality?: Solving the Right Problem – An Analysis of a Public Health Information System2013In: Procedia Technology: HCIST 2013 - International Conference on Health and Social Care Information Systems and Technologies / [ed] Maria Manuela Cruz-Cunha, João Varajão, Helmut Krcmar and Ricardo Martinho, Elsevier, 2013, Vol. 9, p. 1227-1236Conference paper (Refereed)
    Abstract [en]

    This paper reports our initial findings regarding the state of testing of software in the Swedish public health information system. At present, the system is only available through a black-box interface, i.e. through the GUI. This and other issues related to politics, management and organization indicate that much work is needed in order for the software to have the quality level expected by a safety-critical system. The proposed solution by the public health organization for raising the quality is to use an independent test database. Based on our initial understanding of the problem, we argue that there might be other solutions that would perhaps be more cost-effective and have a stronger impact on the quality of the system. Our main contribution lies in the data analysis, where we have collected the problems and suggested alternative cost-saving solutions.

    Download full text (pdf)
    fulltext
  • 32.
    Blom, Martin
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hassan, Mohammad Mahdi
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Applying clustering to analyze opinion diversity2015In: Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering / [ed] He (Jason) Zhang, New York: Association for Computing Machinery (ACM), 2015Conference paper (Refereed)
    Abstract [en]

    In empirical software engineering research there is an increased use of questionnaires and surveys to collect information from practitioners. Typically, such data is then analyzed based on overall, descriptive statistics. Even though this can capture the general trends there is a risk that the opinions of different (minority) sub-groups are lost. Here we propose the use of clustering to segment the respondents so that a more detailed analysis can be achieved. Our findings suggest that it can give a better insight about the survey population and the participants' opinions. This partitioning approach can show more precisely the extent of opinion differences between different groups. This approach also gives an opportunity for the minorities to be heard. Through the process significant new findings may also be obtained. In our example study regarding the state of testing and requirement activities in industry, we found several significant groups that showed significant opinion differences from the overall conclusion.

  • 33. Borges, Fabio
    et al.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    iKUP keeps users' privacy in the Smart Grid2014In: Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE, 2014, p. 310-318Conference paper (Refereed)
    Abstract [en]

    Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancingprotocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users’ privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregationand decryption, which are operations that happen only once per round of measurements and, thus, have a low impactin the total protocol performance. iKUP heavily outperformsother protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters.

  • 34. Borges, Fábio
    et al.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Beato, Filipe
    Mühlhäuser, Max
    Secure and Privacy-Friendly Public Key Generation and Certification2014In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, New York: IEEE, 2014, p. 114-121Conference paper (Refereed)
    Abstract [en]

    Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys as input, for establishing secure communication channels. Whenever the keys are generated by clients, the bootstrap process requires either (a) an out-of-band verification for certification of keys when those are generated by the clients themselves, or (b) a trusted server to generate both the public and secret parameters. This paper presents a novel constrained key agreement protocol, built upon a constrained Diffie-Hellman, which is used to generate a secure public-private key pair, and to set up a certification environment without disclosing the private keys. In this way, the servers can guarantee that the generated key parameters are safe, and the clients do not disclose any secret information to the servers.

  • 35.
    Budzisz, Łukasz
    et al.
    Technische Universität Berlin, Berlin, Germany.
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ferrús, Ramon
    Universitat Politècnica de Catalunya, Barcelona, Spain.
    A taxonomy and survey of SCTP research2012In: ACM Computing Surveys, ISSN 0360-0300, E-ISSN 1557-7341, Vol. 44, no 4, p. -36, article id 18Article in journal (Refereed)
    Abstract [en]

    The Stream Control Transmission Protocol (SCTP) is a relatively recent general-purpose transport layer protocol for IP networks that has been introduced as a complement to the well-established TCP and UDP transport protocols. Although initially conceived for the transport of PSTN signaling messages over IP networks, the introduction of key features in SCTP, such as multihoming and multistreaming, has spurred considerable research interest surrounding SCTP and its applicability to different networking scenarios. This article aims to provide a detailed survey of one of these new features—multihoming—which, as it is shown, is the subject of evaluation in more than half of all published SCTP-related articles. To this end, the article first summarizes and organizes SCTP-related research conducted so far by developing a four-dimensional taxonomy reflecting the (1) protocol feature examined, (2) application area, (3) network environment, and (4) study approach. Over 430 SCTP-related publications have been analyzed and classified according to the proposed taxonomy. As a result, a clear perspective on this research area in the decade since the first protocol standardization in 2000 is given, covering both current and future research trends. On continuation, a detailed survey of the SCTP multihoming feature is provided, examining possible applications of multihoming, such as robustness, handover support, and loadsharing.

  • 36. Camenisch, Jan
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Murayama, Yuko
    Future Challenges in Security and Privacy for Academia and  Industry2013In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 33, p. 1-170Article in journal (Refereed)
  • 37. Camenisch, Jan
    et al.
    Fischer-Hübner, SimoneKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.Murayama, YukoPortmann, ArmandRieder, Carlos
    Future Challenges in Security and Privacy for Academia and Industry: Proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne/Switzerland, June 20112011Conference proceedings (editor) (Refereed)
  • 38. Camenisch, Jan
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Rannenberg, Kai
    Privacy and Identity Management for Life2011Book (Refereed)
  • 39.
    Casap, Lucia
    et al.
    Academy of Economic Studies, Moldova.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    The E-governance Development in Educational Sector of Republic of Moldova2017In: Electronic Government: 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings / [ed] Marijn Janssen, Karin Axelsson, Olivier Glassey, Bram Klievink, Robert Krimmer, Ida Lindgren, Peter Parycek, Hans J. Scholl, Dmitrii Trutnev, Cham: Springer, 2017, p. 177-186Conference paper (Refereed)
    Abstract [en]

    During the last years e-governance is being implemented in many countries. Within the same country, the level of achieved results can vary significantly between sectors. The implementation of e-governance in the Republic of Moldova has had a good start but some stagnation in the implementation of the e-governance agenda is registered. In the educational sector, the implementation is still at a low level. This practical paper surveys the e-tools in the educationa lsector of the Republic of Moldova, thus revealing the e-governance level of the sector. By comparing with the usage of IT tools in the Swedish educational system, and identifying the benefits and issues met during their development, it proposes a way for future implementation of the e-governance agenda in the educational sector in Moldova. While Moldova as a country has extensive Internet coverage, Sweden was choose for the comparison because of its Internet coverage plus its focus on furthering the skills of its workforce and also the considerable efforts of e-governance agenda implementation.

  • 40.
    Cho, Daewoong
    et al.
    Univ. of Sydney, Sydney, NSW, Australia.
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Zomaya, Albert Y
    School of Information Technologies, University of Sydney.
    Wang, Lizhe
    China Univ. of Geosci., China.
    Virtual Network Function Placement: Towards Minimizing Network Latency and Lead Time2017In: 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Piscataway: IEEE, 2017, p. 90-97Conference paper (Refereed)
    Abstract [en]

    Network Function Virtualization (NFV) is an emerging network architecture to increase flexibility and agility within operator's networks by placing virtualized services on demand in Cloud data centers (CDCs). One of the main challenges for the NFV environment is how to minimize network latency in the rapidly changing network environments. Although many researchers have already studied in the field of Virtual Machine (VM) migration and Virtual Network Function (VNF) placement for efficient resource management in CDCs, VNF migration problem for low network latency among VNFs has not been studied yet to the best of our knowledge. To address this issue in this article, we i) formulate the VNF migration problem and ii) develop a novel VNF migration algorithm called VNF Real-time Migration (VNF-RM) for lower network latency in dynamically changing resource availability. As a result of experiments, the effectiveness of our algorithm is demonstrated by reducing network latency by up to 70.90% after latency-aware VNF migrations.

  • 41.
    Curado, Marilia
    et al.
    Univ Coimbra, Dept Informat Engn, P-3000 Coimbra, Portugal.;Univ Coimbra, Ctr Informat & Syst, Lab Commun & Telemat, P-3000 Coimbra, Portugal..
    Ganchev, Ivan
    TRC, Limerick, Ireland.;Plovdiv Univ Paisii Hilendarski, Plovdiv, Bulgaria..
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Koucheryavy, Yevgeni
    TUT, Dept Elect & Commun Engn, Pretoria, South Africa..
    Guest editorial: Special issue on mobile wireless networks2016In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 107, p. 145-147Article in journal (Refereed)
  • 42.
    Dahlin, Linda
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Riskreducering vid införande av affärssystem: Fallstudie av ett systemimplementatörsföretag2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Affärssystemprojekt är komplexa och anses vara ett av de mest kritiska IT-projekten. När ett affärssystemprojekt lyckas kan det resultera i minskade kostnader, snabbare produktionsprocess och ökad kundservicegrad. Ett affärssystem kan därför vara ett bra verktyg för att öka ett företags chanser gentemot dess konkurrenter. Införande av affärssystem är en process som är förenat med stora risker, särskilt ifall kundföretaget inte har planerat införandet rätt. Det är viktigt att förstå riskerna med införandeprojekt och även förstå hur dessa risker kan undvikas och hanteras. Redan vid planeringsfasen i införandeprojekt är det viktigt att ta hänsyn till risker.

    Syftet med denna kandidatuppsats i informatik är att identifiera och beskriva hur riskhantering reducerar riskerna i införandeprojekt av affärssystem, ur en systemimplementatörs perspektiv. Metoden som valts är fallstudiemetoden, ett anonymiserat fallföretags införandeprojekt har studerats genom semistrukturerade intervjuer med fyra respondenter, som har olika roller i införandeprojektet. Inför de semistrukturerade intervjuerna har en intervjuguide tagits fram utifrån en analysmodell. Den fakta analysmodellen bygger på kommer från litteraturstudier gjorda på forskningsartiklar inom ämnet.

    De viktigaste slutsatserna är att implementatörsföretaget håller i utbildningen för slutanvändarna, att personer från ledningen sitter med i styrgruppen och supportpersonal tas med i projektet innan driftstart. Genom att utbildningen hålls av implementatörsföretaget minskar stressen på kundföretagets anställda samt att alla slutanvändare blir upplärda av experter inom affärssystemet. Att personer från ledningen är med i styrgruppen visar att de ger stöd och engagemang, samtidigt som lednings personer är med vid beslutfattande ifall risker dyker upp under projektets gång. Genom att supportpersonal är med i projektet redan innan driftstart ger det supportpersonalen chans att lära sig kundens system samt att kunden får lära känna supportpersonalen innan förvaltning. Det skapar en naturlig kommunikationsväg för kunden, att ringa till support med sina ärenden.

  • 43.
    David, Östling
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    IBMs stordators framtid i en molnbaserad IT värld: Kommer IBMs stordator att överleva ytterligare ettparadigmskifte eller har den spelat ut sin roll?2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    IT analytiker har många gånger gett IBMs stordator en dödsdom. Redan 1991 skrev denerkände kritikern Stewart Alsop, dåvarande chefredaktör på InfoWorld att den sista stordatornskulle tas ur bruk den 15 mars 1996. Det visade sig att detta uttalande var felaktigt, vilketStewart Alsop även erkände i InfoWorld bara dagar innan hans förutsägelse skulle ha infallit.När vi nu går in i ytterligare ett paradigmskifte i och med att många tjänster går över tillmolnet, ställer jag i denna uppsats frågan om IBMs stordator har en framtid i en molnbaseradIT värld, och hur den i så fall ser ut.

    Syftet är att genom litteraturstudier och intervjuer undersöka om IBMs stordator kan överlevaytterligare en genomomgripande teknikrevolution eller om den har spelat ut sin roll.Undersökningen mynnar ut i slutsatserna att IBMs stordator har en stark position i dagsläget,framförallt inom bank och finanssektorn d.v.s. inom branscher med speciellt höga kravbeträffande tillgänglighet, skalbarhet, och säkerhet. Sannolikt har stordatorn en viktig roll attspela även för framtidens satsningar i molnet. IBM erbjuder redan idag molnlösningar sominkluderar mainframes, och det framgick även i de intervjuer som gjordes på IBM, att de seren ljus framtid för IBMs stordatorer. De menar att IBM inte bara följer med, utan även är medoch leder utvecklingen inom molntjänster, och att det är främst för de öppna standarderna somLinux och Unix som IBM kommer att ha den ljusaste framtiden. Det faktum att IBM varje årinvesterar miljardbelopp i utvecklingen av sina stordatorer talar också sitt tydliga språk, d.v.s.att IBM fullt ut verkar tro på att stordatorn har en viktig roll att spela i den molnbaserade ITvärldsom just nu växer fram

    Download full text (pdf)
    fulltext
  • 44.
    Deng, Shuiguang
    et al.
    Zhejiang University, Hangzhou, China.
    Huang, Longtao
    Chinese Academy of Sciences, Beijing, China.
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Yin, Jianwei
    Zhejiang University, Hangzhou, China.
    Zhou, MengChu
    Macau University of Science and Technology, Macau, China.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Mobility-Aware Service Composition in Mobile Communities2016In: IEEE Transactions on Systems, Man & Cybernetics. Systems, ISSN 2168-2216, E-ISSN 2168-2232, Vol. 47, no 3, p. 555-568Article in journal (Refereed)
    Abstract [en]

    he advances in mobile technologies enable mobile devices to perform tasks that are traditionally run by personal computers as well as provide services to the others. Mobile users can form a service sharing community within an area by using their mobile devices. This paper highlights several challenges involved in building such service compositions in mobile communities when both service requesters and providers are mobile. To deal with them, we first propose a mobile service provisioning architecture named a mobile service sharing community and then propose a service composition approach by utilizing the Krill-Herd algorithm. To evaluate the effectiveness and efficiency of our approach, we build a simulation tool. The experimental results demonstrate that our approach can obtain superior solutions as compared with current standard composition methods in mobile environments. It can yield near-optimal solutions and has a nearly linear complexity with respect to a problem size.

  • 45.
    Deng, Shuiguang
    et al.
    Zhejiang University, Hangzhou, China.
    Wu, Hongyue
    Zhejiang University, Hangzhou, China.
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Wu, Zhaohui
    Zhejiang University, Hangzhou, China.
    Cost Performance Driven Service Mashup: A Developer Perspective2016In: IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, E-ISSN 1558-2183, Vol. 27, no 8, p. 2234-2247Article in journal (Refereed)
    Abstract [en]

    Service mashups are applications created by combining single-functional services (or APIs) dispersed over the web. With the development of cloud computing and web technologies, service mashups are becoming more and more widely used and a large number of mashup platforms have been produced. However, due to the proliferation of services on the web, how to select component services to create mashups has become a challenging issue. Most developers pay more attention to the QoS (quality of service) and cost of services. Beside service selection, mashup deployment is another pivotal process, as the platform can significantly affect the quality of mashups. In this paper, we focus on creating service mashups from the perspective of developers. A genetic algorithm-based method, GA4MC (genetic algorithm for mashup creation), is proposed to select component services and deployment platforms in order to create service mashups with optimal cost performance. A series of experiments are conducted to evaluate the performance of GA4MC. The results show that the GA4MC method can achieve mashups whose cost performance is extremely close to the optimal . Moreover, the execution time of GA4MC is in a low order of magnitude and the algorithm performs good scalability as the experimental scale increases.

  • 46.
    Drašar, Martin
    et al.
    Institute of Computer Science, Masaryk University, Czech Republic.
    Vykopal, Jan
    Institute of Computer Science, Masaryk University, Czech Republic.
    Winter, Philipp
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Flow-based Brute-force Attack Detection2013In: Advances in IT Early Warning / [ed] Peter Schoo, Markus Zeilinger & Eckehard Hermann, Fraunhofer Verlag , 2013, 1Chapter in book (Other academic)
    Abstract [en]

    Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing volume and en-cryption of network traffic and growing ubiquity of high-speed networks.Although the research in this field advanced considerably, there still remainclasses of attacks that are undetectable. In this chapter, we present sev-eral methods for the detection of brute-force attacks based on the analysisof network flows. We discuss their strengths and shortcomings as well asshortcomings of flow-based methods in general. We also demonstrate thefragility of some methods by introducing detection evasion techniques.

    Download full text (pdf)
    fulltext
  • 47. Díaz Baños, Carlos José
    et al.
    Andreasson, Erik
    Information Visualization2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Reasoning graphs are one of many ways to visualize information. It is very hard to understand certain type of information when it is presented in text or in tables with a huge amount of numbers. It is easier to present it graphically. People can have a general idea of the information and if it is necessary to see the details, it is possible to have a way to add more information to the graphical display. A graphical visualization is able to compress the information, which represented in text can be thousand of lines, to be shown in only one image or in a set of them. Therefore it is a very powerful to transmit information in a blink of an eye, and people will not waste time reading many lines, values or numbers in text or tables.

    The developed application has a graphical user interface in 3D which shows the information in a reasoning graph. The user can navigate through the graph in a 3D way, expand the nodes to see more information and change the position of them to restructure the graph.

    Download full text (pdf)
    fulltext
  • 48.
    Ekener, Mikael
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Utvärdering av dokumentbiblioteket Arkiva genom användbarhetstestning2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den här studien ämnar undersöka användbarheten hos två olika versioner avdokumentbiblioteket Arkiva som ägs av Projektengagemang. Arkiva finns i två versioner, ensom har ansetts vara föråldrad och en nyutvecklad som ännu är otestad. I den här studienkommer de att ställas mot varandra för att undersöka om den nya versionen är en förbättringsamt hur användarna uppfattar designen och dess funktionalitet.Metoden som används i undersökningen är användbarhetstester där version 1 jämförs medversion 2 genom att åtta testpersoner utför grundläggande uppgifter som motsvarar de

    arbetsuppgifter som är tänka att utföras i systemet. Under testerna tillämpades think aloud-metoden. För att utvärdera användarnas uppfattning ytterligare följdes testerna upp med en

    intervju efteråt där de fick svara på frågor gällande de båda dokumentbibliotekens design ochfunktionalitet.Resultaten från undersökningen visar att deltagarna föredrog att interagera med system somkänns mer moderna och intuitiva. Undersökningen visar att användbarhetsattribut är någotväldigt viktigt att ta hänsyn till under utvecklingen av nya system för att öka graden avkundnöjdhet.

    Download full text (pdf)
    fulltext
  • 49.
    Eklund, Johan
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    Performance of Network Redundancy Mechanisms in SCTP2005Report (Other academic)
    Abstract [en]

    One of the ambitions when designing the Stream Control Transmission Protocol was to offer a robust transfer of traffic between hosts. For this reason SCTP was designed to support multihoming, which presumes the possibility to set up several paths between the same hosts in the same session. If the primary path between a source machine and a destination machine breaks down, the traffic may still be sent to the destination, by utilizing one of the alternate paths. The failover that occurs when changing path is to be transparent to the application.

    This paper describes the results from experiments concerning SCTP failover performance, which means the time between occurrence of a break on the primary path until the traffic is run smoothly on the alternate path. The experiments are performed mainly to verify the Linux Kernel implementation of SCTP (LK-SCTP) and is run on the Emulab platform. The results will serve as a basis for further experiments.

    The experiments are performed in a network without concurrent traffic and in conclusion the results from the experiments correspond well to the values found in other studies and they are close to the theoretical best values. As expected the parameter Path.Max.Retrans has a great impact on the failover time. One observation is that the failover time and the max transfer time for a message are dependent upon the status in the network when the break of the primary path occurs.

    Download full text (pdf)
    FULLTEXT01
  • 50.
    Eklund, Johan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Grinnemo, Karl-Johan
    School of Information and Communication Technology, KTH Royal Institute of Technology.
    Baucke, Stephan
    Ericsson Research, Germany.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Tuning SCTP Failover for Carrier Grade Telephony Signaling2010In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 54, no 1, p. 133-149Article in journal (Refereed)
    Abstract [en]

    The Stream Control Transmission Protocol (SCTP) has not only been selected as the signaling transport protocol of choice in IETF SIGTRAN, the architecture that bridges circuit-switched and IP-based mobile core networks, but also plays a pivotal role in SAE/LTE, the next-generation UMTS/HSPA networks. To meet the redundancy requirements of telecom signaling traffic, SCTP includes a failover mechanism that enables rerouting of traffic from an unreachable network path to a backup path. However, the recommendations provided by IETF on how to configure the SCTP failover mechanism to meet telecom signaling requirements are kept quite general and leave much of the tuning to the telecom equipment vendor and/or operator. Several works by us and others have been carried out to study the effect of different SCTP parameters on the failover performance. The main contribution of this paper is that it gives a coherent treatment of how to configure the SCTP failover mechanism for carrier-grade telephony signaling, and provides practically usable configuration recommendations. The paper also discusses an alternate or complementary way of optimizing the SCTP failover mechanism by relaxing the exponential backoff that foregoes a retransmission timeout in SCTP. Some results showing significantly reduced failover times by use of this mechanism, with only marginal deteriorating effects on a signaling network, are discussed and analyzed in the paper.

1234 1 - 50 of 186
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf