Change search
Refine search result
1234567 151 - 200 of 1108
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Borchert, Thomas
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Code Profiling: Static Code Analysis2008Independent thesis Advanced level (degree of Master), 20 points / 30 hpStudent thesis
    Abstract [en]

    Capturing the quality of software and detecting sections for further scrutiny within are of high interest for industry as well as for education. Project managers request quality reports in order to evaluate the current status and to initiate appropriate improvement actions and teachers feel the need of detecting students which need extra attention and help in certain programming aspects. By means of software measurement software characteristics can be quantified and the produced measures analyzed to gain an understanding about the underlying software quality.

    In this study, the technique of code profiling (being the activity of creating a summary of distinctive characteristics of software code) was inspected, formulized and conducted by means of a sample group of 19 industry and 37 student programs. When software projects are analyzed by means of software measurements, a considerable amount of data is produced. The task is to organize the data and draw meaningful information from the measures produced, quickly and without high expenses.

    The results of this study indicated that code profiling can be a useful technique for quick program comparisons and continuous quality observations with several application scenarios in both industry and education.

  • 152. Borges, Fabio
    et al.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    iKUP keeps users' privacy in the Smart Grid2014In: Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE, 2014, p. 310-318Conference paper (Refereed)
    Abstract [en]

    Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancingprotocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users’ privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregationand decryption, which are operations that happen only once per round of measurements and, thus, have a low impactin the total protocol performance. iKUP heavily outperformsother protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters.

  • 153. Borges, Fábio
    et al.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Beato, Filipe
    Mühlhäuser, Max
    Secure and Privacy-Friendly Public Key Generation and Certification2014In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, New York: IEEE, 2014, p. 114-121Conference paper (Refereed)
    Abstract [en]

    Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys as input, for establishing secure communication channels. Whenever the keys are generated by clients, the bootstrap process requires either (a) an out-of-band verification for certification of keys when those are generated by the clients themselves, or (b) a trusted server to generate both the public and secret parameters. This paper presents a novel constrained key agreement protocol, built upon a constrained Diffie-Hellman, which is used to generate a secure public-private key pair, and to set up a certification environment without disclosing the private keys. In this way, the servers can guarantee that the generated key parameters are safe, and the clients do not disclose any secret information to the servers.

  • 154.
    Borges, Fábio
    et al.
    Technische Universität Darmstad, Germany.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Mühlhäuser, Max
    Technische Universität Darmstadt, Germany.
    Analysis of privacy-enhancing protocols based on anonymity networks2012In: Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on, IEEE, 2012, p. 378-383Conference paper (Refereed)
    Abstract [en]

    In this paper, we analyze privacy-enhancing protocols for Smart Grids that are based on anonymity networks. The underlying idea behind such protocols is attributing two distinct partial identities for each consumer. One is used to send real-time information about the power consumption, and the other for transmitting the billing information. Such protocols provide sender-anonymity for the real-time information, while consolidated data is sent for billing. In this work, the privacy properties of such protocols are analyzed, and their computational efficiencyis evaluated and compared using simulation to other solutionsbased on homomorphic encryption.

  • 155.
    Boström, Rikard
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Moilanen, Lars-Olof
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Capacity profiling modeling for baseband applications2009Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Real-time systems are systems which must produce a result within a given time frame. A result given outside of this time frame is as useless as not delivering any result at all. It is therefore essential to verify that real-time systems fulfill their timing requirements. A model of the system can facilitate the verification process. This thesis investigates two possible methods for modeling a real-time system with respect to CPU-utilization and latency of the different components in the system. The two methods are evaluated and one method is chosen for implementation.The studied system is the decoder of a WCDMA system which utilizes a real-time operating called system OSEck. The methodology of analyzing the system and different ways of obtaining measurements to base the model upon will be described. The model was implemented using the simulation library VirtualTime, which contains a model of the previously mentioned operating system. Much work was spent acquiring input for the model, since the quality of the model depends largely on the quality of the analysis work. The model created contains two of the studied systems main components.This thesis identifies thorough system knowledge and efficient profiling methods as the key success factors when creating models of real-time systems.

  • 156.
    Bozakov, Zdravko
    et al.
    Dell EMC, Ireland.
    Mangiante, Simone
    Dell EMC, Ireland.
    Hernandez Benet, Cristian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Santos, Ricardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Buckley, Donagh
    Dell EMC, Ireland.
    A NEAT framework for enhanced end-host integration in SDN environments2017In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network applications exhibit a wide range of properties, posing diverse, often conflicting, demands towards the network. As these requirements are typically not known, controllers must rely on error-prone heuristics to extract them. In this work, we develop a framework which allows applications deployed in an SDN environment to explicitly express their requirements to the network. Conversely, it allows network controllers to deploy policies on end-hosts and to supply applications with information about network paths, salient servers and other relevant metrics. The proposed approach opens the door for fine grained, application-aware resource optimization strategies in SDNs

  • 157.
    Brajdic, Agata
    et al.
    Fac. of EE & Comput., Univ. of Zagreb, Zagreb, Croatia .
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Matijasevic, Maja
    Quality of Experience based optimization of heterogeneous multimedia sessions in IMS2011In: Proceedings of Baltic Congress on Future Internet Communications, IEEE conference proceedings, 2011, p. 25-32Conference paper (Refereed)
    Abstract [en]

    For delivering multimedia services over (wireless) networks it is important that the mechanisms which negotiate and optimize content delivery under resource constraints take into account user perceived quality in order to improve user satisfaction. Within the scope of the IP Multimedia Subsystem (IMS) architecture a novel application server may be added which handles multi-user multi-flow Quality of Experience (QoE) negotiation and adaptation for heterogeneous user sessions. Based on a mathematical model, which takes into account the characteristics of audio, video and data sessions for QoE optimization, we develop several optimization algorithms to be used by the application server to maximize overall user defined QoE parameters for all ongoing multimedia sessions, subject to network resource constraints. Our results show that a greedy based approach provides a reasonable compromise in terms of run-time and sub-optimality for the overall QoE based resource allocations.

  • 158. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hughes, H.P.
    In situ intercalation of the layered compounds TiS2, ZrSe2, and VSe21995Conference paper (Refereed)
  • 159. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hughes, H.P.
    The electronic structure of ZrSe2 and Csx ZrSe2 studied by angle-resolved photoemission1995In: J. Phys. Condens. Matter 6, 7741 (1995)Article in journal (Refereed)
  • 160. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hughes, H.P.
    Strocov, V.N.
    Modifying the electronic structure of TiS2 by alkali metal interaction1999In: J. Phys. Condens. Matter 11, 8957 (1999)Article in journal (Refereed)
  • 161. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hughes, H.P.
    Strocov, V.N.
    Na and Cs intercalation of 2H-TaSe2 studied by photoemission2001In: J. Phys. Condens. Matter 13, 9879-9895 (2001)Article in journal (Refereed)
  • 162. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Strocov, V.N.
    Hughes, H.P.
    Electronic structure of pure and alkali metal intercalated VSe21998In: Phys. Rev B 58, 10031 (1998)Article in journal (Refereed)
  • 163. Brauer, H.E.
    et al.
    Starnberg, H.I.
    Hughes, H.P.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Band mapping of in situ Cs intercalated transition metal dichalcogenides1996In: Surf. Sci. 357-358, 345 (1996)Article in journal (Refereed)
  • 164. Brolin, Jonas
    et al.
    Dely, Peter
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Hedegren, Mikael
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Implementing Packet Aggregation in the Linux Kernel2008Conference paper (Refereed)
    Abstract [en]

    In multi-hop wireless mesh networks (WMN) Voice over IP (VoIP) suffers from large overhead created by the IP/UDP/RTP/MAC header and time due to collisions. As a result the VoIP capacity of WMNs is small. As shown in [1] a 3 hop WMN at a data rate of 2Mbit/s can only support 3 concurrent VoIP flows. [1], [2] and [3] propose the use of packet aggregation in order to reduce the overhead and thus increase the capacity. The idea behind packet aggregation is to combine multiple small packets into a single larger one, reducing overhead and collision probability in multi-hop environment. This paper presents insights into an implementation of an aggregation scheme in the Linux Kernel and its experimental evaluation

  • 165.
    Brolin, Jonas
    et al.
    Karlstad University, Division for Information Technology.
    Hedegren, Mikael
    Karlstad University, Division for Information Technology.
    Packet Aggregation in Linux2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Voice over IP (VoIP) traffic in a multi-hop wireless mesh network (WMN) suffers from a large overhead due to mac/IP/UDP/RTP headers and time collisions. A consequence of the large overhead is that only a small number of concurrent VoIP calls can be supported in a WMN[17]. Hop-to-hop packet aggregation can reduce network overhead and increase the capacity. Packet aggregation is a concept which combines several small packets, destined to a common next-hop destination, to one large packet. The goal of this thesis was to implement packet aggregation on a Linux distribution and to increase the number of concurrent VoIP calls. We use as testbed a two-hop WMN with a fixed data rate of 2Mbit/s. Traffic was generated between nodes using MGEN[20] to simulate VoIP behavior. The results from the tests show that the number of supported concurrent flows in the testbed is increased by 135% compared to unaggregated traffic.

  • 166.
    Bromander, Anton
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Using Privacy Indicators to Nudge Users into Selecting Privacy Friendly Applications2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the play store today, users are shown download count, app rating, reviews, screenshots etc. when deciding to download an application, and it’s shown very conveniently. If the users however are interested in viewing privacy in- formation about the application, it is multiple clicks away and there is no default in how to display it. This is where privacy indicators come in handy. With privacy indicators, data can be analyzed and displayed to the user in a way they understand, even if they don’t understand what the data itself means and what is dangerous. This however comes with the challenge of deciding what is dangerous and what is not.

    This report creates and implements an app store with added privacy infor- mation displayed to the user in the form of a privacy indicator and some detailed information about each application. To test the effectiveness of the privacy indicator, a small scale study was conducted where it was discovered that users who were not already interested in privacy didn’t pay much at- tention to it, while those who were took it more into account when deciding to download applications.

  • 167.
    Broström, Anders
    et al.
    Karlstad University, Division for Information Technology.
    Kihlstadius, Niclas
    Karlstad University, Division for Information Technology.
    Prototyp av en VoIP/PSTN-gateway2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    During the past few years Internet telephony has advanced rapidly, and as the technology has evolved, more and more have come to consider it an alternative to making phone calls through the telephone network. Besides being cheaper, Internet telephony also provides several revolutionary services. It is likely though that the telephone network will remain in use for several years to come, and it still offers by far the best stability and is accepted by most people. If the two networks are to coexist, with their respective users, it would be useful if they could be made to interact, so that users of one network can call users of the other, and vice versa. This can be done with a VoIP/PSTN gateway, which translates control information and voice traffic between the two networks.

    Our dissertation is about the work we have performed for TietoEnator in Karlstad. The assignment was to develop a prototype of a VoIP/PSTN gateway. Initially the system was meant to support phone calls initiated either from an “ordinary” phone or from an IP telephone. Also the voice traffic was supposed to be translated with the use of appropriate hardware. To manage this we first needed to study all the relevant protocols for communication used in the telephone network and on the Internet, to get an idea of how these could be made to interact. We also had to learn existing systems, libraries and tools in order to see how we could create our own system. Due to a long learning period and technical problems in the beginning, and because the necessary hardware equipment for translation of voice traffic did not arrive in time, the assignment was limited to include only calls initiated from the ordinary phone to the IP telephone, without voice transmission. Never the less, the efforts have produced results, and our work is explained in detail in this dissertation.

  • 168.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Reliable and Secure Communication in SCTP2010Conference paper (Refereed)
  • 169.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Alfredsson, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.2: First report on frameworks/models matching Department 6 needs2005Report (Refereed)
    Abstract [en]

    During the first phase of NEWCOM the focus areas of Department 6 were identified and refined. A number of relevant knowledge gaps were identified for the areas transport protocols, architectures and cross-layer aspects, and modelling. In this deliverable we describe a first set of frameworks/models to support research integration within the Department. The integration approach and the defined models/frameworks are described for each one of the selected knowledge gaps. The deliverable also includes a report on tools, software libraries and traces that can be shared between the partners

  • 170.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Asplund, Katarina
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Enhancing TCP Performance by Allowing Controlled Loss2000Conference paper (Refereed)
  • 171.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cavalcanti de Castro, Marcel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Karlsson, Jonas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Palazzo, S
    DR11.2: Intermediate report on resource management issues and routing/forwarding schemes for opportunistic networks2009Report (Refereed)
  • 172.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cavalcanti de Castro, Marcel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lavén, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Dely, Peter
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Galluccio, L
    NEWCOM++ DR11.3: Final report on the activities and results of WPR112010Report (Other academic)
    Abstract [en]

    This document is the last deliverable of WPR.11 and presents an overview of the final activities carried out within the NEWCOM++ Workpackage WPR.11 during the last 18 months. We provide a description of the most consolidated Joint Research Activities (JRAs) and the main results so far obtained. We also address some considerations on the future activities which are expected to continue at the end of NEWCOM++

  • 173.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Martucci, Leonardo
    NEWCOM DR7.1: Report on the knowledge gaps to be filled and the action plan2004Report (Refereed)
    Abstract [en]

    This deliverable is the starting point of the activities in the NEWCOM Department 7 QoS Provision in Wireless Networks: Mobility, Security and Radio Resource Management. It provides the view of the department in terms of the objectives of the European research on Wireless Network aspects and, after developing the framework for QoS provision in wireless networks, it identifies the knowledge gaps existing in the fields of radio resource allocation, mobility management and security issues. As a result of that, the action plan for the future activities in the department is established

  • 174.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Garcia, Johan
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.1: Report on the knowledge gaps to be filled and the action plan2004Report (Refereed)
    Abstract [en]

    The EU FP6 network of excellence in wireless communication, Newcom, is a large network that covers most areas of wireless communication. The research work within Newcom is organized into a number of departments and projects where Department 6 addresses Protocols and Architectures, and Traffic Modelling for (Reconfigurable/ Adaptive) Wireless Networks. The scope of Department 6 is quite broad making it important to further identify and refine the focus areas of the department. This document summarizes research areas that fall within the competence of and are of interest for the members of Department 6 and also describes the background of the partners within these areas. A set of knowledge gaps that will be addressed within the department are identified. A number of integrating activities that can be used to coordinate the efforts of the partners are described and an action plan for the continued work within the department is provided

  • 175.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.4: Proceedings of the Newcom Department 6 Second Technical Workshop2005Report (Refereed)
    Abstract [en]

    The Second Newcom Department 6 Technical Workshop was organized in Barcelona on September 16-17, 2005. The workshop program contained 6 presentations and provided a good overview of ongoing research integration activities within the department. All of the three areas of the department, transport protocols, architectures and cross-layer aspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:



    - Westwood-SCTP: A Transport Protocol for Traffic Balancing on Multihomed Hosts

    - Transport Layer Handover using SCTP

    - The Optimization of Transport Protocol over Ad-Hoc Networks

    - Wireless Networks Emulation

    - An Analytical Model of Rate-Controlled MPEG Video Sources in a UMTS Network

    - An Analytical Model of a Rate-controlled MPEG-4 Video Source Capturing both Intra-frame and Inter-frame Correlation



    As an option, a supporting paper for the presentation could also be supplied by the authors. The

    deliverable contains supporting articles for two of the presentations

  • 176.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Kearns, P
    Global Predicate Detection Based on Transport Layer Vector Time1997Conference paper (Refereed)
  • 177.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Kearns, Phil
    Transport Layer versus Application Layer Vector Time1997Report (Refereed)
    Abstract [en]

    Vector time has emerged as a useful technique for solving problems in distributed systems. Although vector time is likely to be maintained by supporting code positioned in kernel space or in message-passing middleware, vector time is traditionally viewed as if it were defined at the application layer.

    In this paper we consider vector time as perceived at the transport layer. We establish existing relationships between transport layer and application layer vector time. Transport layer vector time provides a more up-to-date view of the current system state. Furthermore, transport layer vector time preserves any interprocess causal relationships captured by application layer vector time. We illustrate how the more up-to-date view of the transport layer can improve both the accuracy and the efficiency for algorithms on which concurrency has an adverse effect. Some general guidelines for when transport layer vector time may be appropriate are provided. The possibility of updating vector time for acknowledgment messages is also considered. A new

    distributed termination detection algorithm based on this feature is presented

  • 178.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Proceedings of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010)2010Book (Refereed)
    Abstract [en]

    This publication contains the Proceedings of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010) that will be held on May 2628, 2010 in Karlstad, Sweden. IWSCN 2010 brings together researchers, developers, practitioners, and users interested in the area of security and communication networks. The workshop focuses on how to design, build, and evaluate future networks that are secure, reliable, and provide high and predictable performance. The aim of the workshop is to serve as a forum for presenting current and future work, as well as to exchange research ideas in these fields.Papers containing research contributions focusing on aspects of security and communication networks were solicited for submission to IWSCN 2010. A total of 40 papers were received, representing authors from 20 different countries and 5 different continents. Each paper was reviewed by at least three members of the technical program committee. After a thorough review process, 13 papers were selected for presentation at the workshop, giving an acceptance rate of 32.5%. In addition to the technical papers, two keynote presentations on The Changing Performance Goals in Internet Video Streaming and Dependable Protocols for Wireless Sensor Networks will be provided by Carsten Griwodz from the Simula Research Laboratory AS in Norway and Levente Buttyán from Budapest University of Technology and Economics in Hungary, respectively. Furthermore, a tutorial on Penetration Testing from an Attacker Perspective will be given by Vesa Virta from the National Defence Radio Establishment in Sweden.IWSCN 2010 is organized by the Department of Computer Science at Karlstad University and is supported by the Euro-NF and Newcom++ EU Networks of Excellence, and IEEE Sweden Section. The workshop is sponsored by Compare Karlstad Foundation, Coromatic, and TeliaSonera, and we thank them for their support. We also gratefully thank all authors, members of the program committee, and the local organizing committee for contributing to the scientific quality of the workshop

  • 179.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.6: Second report on common frameworks/models matching Department 62006Report (Refereed)
    Abstract [en]

    Work within Department 6 of NEWCOM is organized into the areas transport protocols, architectures and cross-layer aspects, and modelling. In this deliverable we provide a second report on the frameworks/models used to support research integration within the Department. The integration approach and the defined models/frameworks are described for each one of the three areas of the department. The deliverable also includes an updated report on tools, software libraries and traces that can be shared between the partners

  • 180.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.7: Proceedings of the Newcom Department 6 Second Technical Workshop2006Report (Refereed)
    Abstract [en]

    The Third Newcom Department 6 Technical Workshop was organized in Catania, Italy, on February 2, 2006. The workshop program contained 4 presentations and contained reports on ongoing integrated research activities as well as presentation intended to initiate additional joint research within the department. All of the three areas of the department, transport protocols, architectures and cross-layer

    aspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:



    - P2P-based Video transmission in wireless networks

    - Transport Layer Handover using SCTP

    - WIPEMU 4G System Emulation and Sample Results

    - Wireless Networks Emulation



    Where available the presentation notes are also included with the presentations

  • 181.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    NEWCOM DR6.9: Proceedings of the Newcom Department 6 Fourth Technical Workshop2006Report (Refereed)
    Abstract [en]

    The Fourth Newcom Department 6 Technical Workshop was organized in Toulouse, France, on September 13-14, 2006. The workshop program contained 6 presentations and contained reports on ongoing integrated research activities as well as presentation intended to initiate additional joint research activities between the partners. All of the three areas of the department, transport protocols, architectures and cross-layer aspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:



    - P2P Video Transmission over Heterogeneous Wired/Wireless Networks: A Starting Point for Integrated Research

    - DCCP Overview and First Experiments

    - Estimation of the SCTP Failover Time

    - Improving End to End Goodput of Ad Hoc Networks with SCTP Multihoming

    - A Taxonomy and Survey of SCTP Research

    - Integrating KAUnet and SWINE



    Where available the presentation notes are also included with the presentations

  • 182.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Ottosson, T.
    The Introduction of Soft Information in IP-Based Wireless Networks2001Conference paper (Refereed)
    Abstract [en]

    The underlying physical link is transparent in most IP-based networks. Contrary to this commonly accepted

    design rule, we propose that the applications should be made aware of the channel conditions. This is especially

    fruitful for wireless links where the performance is many orders of magnitudes lower than in fixed networks.

    Instead of wasting resources to make the wireless link behave as a fixed link, the application could take care of

    the adaptation to the channel condition. The presented solution assumes that soft information consisting of a

    reliability measure of the received bits is produced in the physical layer. This soft information is then propagated

    to the application. The application may use this information to distinguish between errors caused by fading and network congestion. Another possible use for soft information is to make the applications adapt the source and channel codes to the current channel condition and thus maximize performance.

  • 183.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Simha, R
    Dynamic versus Static Load Balancing in a Pipeline Computation1997In: International Journal of Modeling and Simulation. Vol. 17, No 4, 1997, pp317-327Article in journal (Refereed)
  • 184.
    Brännström, Anders
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Nilsson, Rickard
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Investigating and Implementing a DNS Administration System2007Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    NinetechGruppen AB is an IT service providing company with about 30 employees, primarily based in Karlstad, Sweden. The company began to have problems with their DNS administration because the number of administrated domains had grown too large. A single employee was responsible for all the administration, and text editors were used for modifying the DNS configuration files directly on the name servers. This was an error prone process which also easily led to inconsistencies between the documentation and the real world.

    NinetechGruppen AB decided to solve the administrative problems by incorporating a DNS administration system, either by using an existing product or by developing a new sys-tem internally. This thesis describes the process of simplifying the DNS administration procedures of NinetechGruppen AB.

    Initially, an investigation was conducted where existing DNS administration tools were sought for, and evaluated against the requirements the company had on the new system.

    The system was going to have a web administration interface, which was to be developed in ASP.NET 2.0 with C# as programming language. The administration interface had to run on Windows, use SQL Server 2005 as backend database server, and base access control on Active Directory. Further, the system had to be able of integrating customer handling with the domain administration, and any changes to the system information had to follow the Informa-tion Technology Infrastructure Library change management process.

    The name servers were running the popular name server software BIND and ran on two different Linux distributions – Red Hat Linux 9 and SUSE Linux 10.0.

    The investigation concluded that no existing system satisfied the requirements; hence a new system was to be developed, streamlined for the use at NinetechGruppen AB. A requirement specification and a functional description was created and used as the basis for the development. The finalized system satisfies all necessary requirements to some extent, and most of them are fully satisfied.

  • 185. Bubenko jr, Janis
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Nilsson, Anders G.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Promote IT 2004: Proceedings of the Fourth Conference for the Promotion of research in IT at New Universities and University Colleges in Sweden, 5-7 May, Karlstad University, The Knowledge Foundation, Part 1 and Part 22004Book (Refereed)
    Abstract [sv]

    The Knowledge Foundation of Sweden and Karlstad University are proud to announce the fourth annual conference for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. The conference takes place at Karlstad University in Sweden, May 5-7, 2004.



    The conference is in the Foundation's programme for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. Almost 200 MSEK (about 22 MEUR) has been allocated, for a period of five years, in order to increase the number of IT-teachers with a PhD. degree at Sweden's new universities and university colleges.



    Since the start of the programme in year 2000, almost one hundred persons are actively pursuing their graduate studies and research at these new universities and colleges. These are the persons that now present their progress at this conference

  • 186.
    Buckley, Jim
    et al.
    Univ Limerick, Lero CSIS, Limerick, Ireland.
    Herold, Sebastian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pruijt, Leo
    HU Univ Appl Sci, Dept ICT, NL-3513 EX Utrecht, Netherlands.
    The 4th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon 2017)2017In: PROCEEDINGS 11TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2017) - COMPANION VOLUME / [ed] Book Group Author(s):ACM, Broadway, New York: Association for Computing Machinery (ACM), 2017Conference paper (Other academic)
  • 187. Budurushi, Jurlind
    Volkamer, Melanie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    "E-Mail made in Germany": Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern2016In: Datenschutz und Datensicherheit - DuD, ISSN 1614-0702, E-ISSN 1862-2607, Vol. 40, no 5, p. 300-304Article in journal (Other academic)
  • 188.
    Budurushi, Jurlind
    et al.
    TU Darmstadt/CASED, Germany.
    Jöris, Roman
    TU Darmstadt/CASED, Germany.
    Volkamer, Melanie
    TU Darmstadt/CASED, Germany.
    Implementing and evaluating a software-independent voting system for polling station elections2014In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 19, no 2, p. 1-10Article in journal (Refereed)
    Abstract [en]

    In 2009 the German Federal Constitutional Court introduced the principle of “public nature of elections” (Federal Constitutional Court of Germany, March 2009). This principle requires that when using electronic voting systems it must be possible for the citizen to verify the essential steps in the election process and in the ascertainment of the results reliably and without special expert knowledge. Unfortunately, none of the existing systems complies with this principle. As a result, the use of electronic voting systems in Germany for parliamentary elections has stopped. Nevertheless, electronic voting systems are necessary and would improve the situation, especially for elections with complex ballots and voting rules, for example some local elections in Germany or parliamentary elections in Belgium and Luxembourg. The concept proposed by Volkamer et al. (Volkamer et al., 2011) was analyzed by a legal expert and evaluated to comply with the German legal requirements for local elections in the state of Hesse (Henning et al., 2012). In this paper we specify and concretize processes that were left open in the concept, and implement a prototype. We evaluated this prototype in a user study that was conducted alongside the university elections at the Technische Universtität Darmstadt in June 2013. The results of the study show that most of the participants were satisfied with the prototype and would support its use for the upcoming university elections. We also report some lessons learned.

  • 189.
    Budurushi, Jurlind
    et al.
    Technische Universitat Darmstadt.
    Neumann, Stephan
    Technische Universitat Darmstadt.
    Shala, Genc
    Technische Universitat Darmstadt.
    Volkamer, Melanie
    Technische Universitat Darmstadt.
    Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail2014In: Informatik 2014 - BIG DATA: Komplexität meistern: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik / [ed] Erhard Plödereder, Lars Grunske, Eric Schneider, Dominik Ull, Bonn: Gesellschaft für Informatik , 2014, Vol. 232, p. 1415-1426Conference paper (Refereed)
    Abstract [en]

    Mit dem Urteil vom 3. Marz 2009 hat das Bundesverfassungsgericht die bislang in der Bundesrepublik Deutschland eingesetzten Wahlgeräte für verfassungswidrig erklart. Grund für dieses Urteil war die fehlende Umsetzung des Prinzips der Öffentlichkeit der Wahl. Mit dem Urteil erklarte das Gericht jedoch nicht grundsätzlich den Einsatz elektronischer Wahlgeräte für verfassungswidrig. Im Rahmen des von der DFG geforderten Projekts ’VerKonWa’ wurde das EasyVote System entwickelt, welches den Öffentlichkeitsgrundsatz durch sogenannte Paper Audit Trails umsetzt. Im Rahmen dieser Arbeit berichten wir über die Erfahrung bei der Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trails.

  • 190. Budurushi, Jurlind
    et al.
    Renaud, Karen
    Volkamer, Melanie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Woide, Marcel
    An Investigation into the Usability of Electronic Voting Systems for Complex Elections2016In: Annals ofTelecommunications, ISSN 0003-4347, Vol. 71, no 7, p. 309-322Article in journal (Refereed)
  • 191.
    Budurushi, Jurlind
    et al.
    CASED, TU Darmstadt, Darmstadt, Germany.
    Stockhardt, Simon
    CASED, TU Darmstadt, Darmstadt, Germany.
    Woide, Marcel
    CASED, TU Darmstadt, Darmstadt, Germany.
    Volkamer, Melanie
    CASED, TU Darmstadt, Darmstadt, Germany.
    Paper Audit Trails and Voters’ Privacy Concerns2014In: Human Aspects of Information Security, Privacy and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings / [ed] Theo Tryfonas, Ioannis Askoxylakis, Cham: Springer, 2014, Vol. 8533, p. 400-409Conference paper (Refereed)
    Abstract [en]

    Advances in information technology have simplified many processes in our lives. However, in many cases trust issues arise when new technology is introduced, and voting is one prominent example. To increase voters’ trust, current e-voting systems provide paper audit trails (PATs) which enable automatic tally and/or manual audit of the election result. PATs may contain only the encrypted vote or the plaintext vote in human-readable and/or machine-readable format. Previous studies report voter privacy concerns with PATs containing additional information (e.g. QR-Codes) other than the human-readable plaintext vote. However, omitting such PATs negatively influences security and/or efficiency. Hence, to address these concerns we applied the coping and threat appraisal principles of the protection motivation theory in the communication process. We evaluated them in separate surveys focused on the EasyVote system [15]. Results show that the coping appraisal is more promising than the threat appraisal approach. While our findings provide novel directions on addressing privacy concerns in the e-voting context, corresponding limitations need to be considered for future user studies.

  • 192.
    Budurushi, Jurlind
    et al.
    Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany.
    Volkamer, Melanie
    Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany.
    Renaud, Karen
    Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland.
    Woide, Marcel
    Tech Univ Darmstadt, Dept Psychol, Darmstadt, Germany.
    Implementation and Evaluation of the EasyVote Tallying Component and Ballot2014In: 2014 6TH INTERNATIONAL CONFERENCE ON ELECTRONIC VOTING: VERIFYING THE VOTE (EVOTE) / [ed] Krimmer, R; Volkamer, M, IEEE, 2014Conference paper (Refereed)
    Abstract [en]

    The German federal constitutional court ruled, in 2009, that elections had to have a public nature. EasyVote, a promising hybrid electronic voting system for conducting elections with complex voting rules and huge ballots, meets this requirement. Two assumptions need to hold, however. The first is that voters will verify the human-readable part of the EasyVote ballot and detect discrepancies. Secondly, that electoral officials will act to verify that the human-readable part of the ballot is identical to the machine-readable part, and that they, too, will detect discrepancies. The first assumption was tested in prior work, so in this paper we examine the viability of the second assumption. We developed an EasyVote tallying component and conducted a user study to determine whether electoral officials would detect discrepancies. The results of our user study show that our volunteer electoral officials did not detect all of the differences, which challenges the validity of the second assumption. Based on these findings we proceeded to propose two alternative designs of the EasyVote ballot: (1) In contrast to the original EasyVote ballot, the human-readable part highlights only the voter's direct selections in orange, i.e. votes that are automatically distributed by selecting a party are not highlighted; (2) The second alternative includes only the voter's direct selections and highlights them in orange. Both alternatives reduce the number of required manual comparisons and should consequently increase the number of discrepancies detected by election officials. We evaluated both alternatives in an online survey with respect to ease of verification and understandability of the cast vote, i.e. verifying that the human-readable part contained the voter's selections and understanding the impact (distribution of votes) of the corresponding selections. The results of the online survey show that both alternatives are significantly better than the original EasyVote ballot with respect to ease of verification and understandability. Furthermore, the first alternative is significantly better than the second with respect to understandability of the cast vote, and no significant difference was found between the alternatives with respect to ease of verification of the cast vote.

  • 193.
    Bui, Michael
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Pedersen, Magnus
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Implementation of a Log Agent in Microsoft Azure: and packaging it to Azure Marketplace2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cloud computing is still in an early stage of development and Microsoft is now investing considerable amount of resources in the cloud. Microsoft Azure is a cloud platform developed by Microsoft and it is continuously evolving, new features are constantly being added and old features are being updated. Integration Software, which is a company that focuses on products for system integration strongly believes that cloud­-based solutions will have a significant impact on their future. This is why selling and developing solutions and services for the cloud are strategically important for them.

    The objective of this dissertation is to investigate Microsoft Azure in general and Azure Marketplace in particular. This investigation consisted of an implementation of a Microsoft Azure application and integrating this application with Azure Marketplace and evaluating the expenses for running the application. The purpose for this project is to gain practical experience and to work with new techniques and help Integration Software better understand Azure Marketplace.

    The application is a Log Agent which fetches data from an external source and resends the data to an external party (Integration Manager). Our first intention was to package and deploy the application to a newly updated Azure Marketplace. The new Azure Marketplace was never released during this dissertation so we decided to deploy the application to the existing version of Azure Marketplace. This was however not fully successful. We encountered some problems in successfully deploying the application to Azure Marketplace. The evaluations for the cost of running an Azure application were not carried out due to lack of time.

  • 194. Burnett, Robert
    et al.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Nilsson, Anders G.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Perspectives on Multimedia: Communication, Media and Information Technology2003Book (Refereed)
    Abstract [en]

    The uses of multimedia are rapidly increasing. Its power to present information in ways not previously possible and its integration of resources, allow for the creation of rich learning environments. The book "Perspectives on Multimedia: Communication, Media and Information Technology" provides a critical examination of the latest multimedia developments and approaches, such as Interface Technology and QoS architectures.



    Topics covered include:

    - The key concepts intrinsic to digital forms of multimedia: integration, interactivity, hypermedia, immersion, narrativity, and hybridity.

    - The development of Informatiuon Technology (IT) usage in society and in the business community.

    - How modern IT enables private companies and public organisations to support business operations, create new business opportunities, and to promote more proactive service management.

    - Multimedia from a computer science perspective and how computer science provides the technical foundation for the computer software and hardware that drives the information usage.



    Gives a broad range of perspectives on key issues for interactive multimedia in organsiations and industry today. This book will be of interest to practioners involved in multimedia development in an organisation, management consultants gviving professional advice on digital solutions and inforamtion technology matters to their customer organisations and academics focusing on business and technical aspects of multimedia frameworks

  • 195.
    Bäck, Henrik
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Andersson, Mathias
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    En anpassningsbar applikationstruktur för flerpunktspekskärmar2009Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Classical mouse interaction is limited in that only a single screen point at a time can be activated. Most application interaction is, due to this, performed in a sequential manner. This may be a limiting factor as humans by nature explore problems with both hands simultaneously. Multi-touch screens are a relatively new type of technology that enables new ways of interaction where multiple touch points can exist simultaneously. This thesis focuses on the problem with developing an application with a user interface designed for multi-touch screens. The application that has been developed defines a base structure from which future applications can be developed, unlike implementations examined in the feasibility study which mainly focus on solving specific problems. A multi-touch screen is also built using standard off the shelf components.

  • 196.
    Calvo, J.C.
    et al.
    University of Granada, Spain.
    Ortega, J.
    University of Granada, Spain.
    Anguita, M.
    University of Granada, Spain.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    A Method to Improve the Accuracy of Protein Torsion Angles2011In: International Conference on Bioinformatics Models, Methods and Algorithms (Bioinformatics-2011), Rome, Italy: SciTePress, 2011, p. 297-300Conference paper (Refereed)
  • 197. Camenisch, Jan
    et al.
    Crispo, Bruno
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Leenes, Ronald
    Russello, Giovanni
    Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011. Revised Selected Papers2012Book (Refereed)
  • 198. Camenisch, Jan
    et al.
    Shelat, Abhi
    Sommer, Dieter
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hansen, Marit
    Krasemann, Henry
    Lacoste, Gerard
    Leenes, Ronald
    Tseng, Jimmy
    Privacy and Identity Management for Everyone2005Conference paper (Refereed)
  • 199.
    Canova, Gamze
    et al.
    Technische Universität Darmstadt, Germany.
    Volkamer, Melanie
    Technische Universität Darmstadt, Germany.
    Bergmann, Clemens
    Technische Universität Darmstadt, Germany.
    Borza, Roland
    Technische Universität Darmstadt, Germany.
    NoPhish: An Anti-Phishing Education App2014In: SECURITY AND TRUST MANAGEMENT (STM 2014) / [ed] S. Mauw & C.D. Jensen, Springer, 2014, p. 188-192Conference paper (Refereed)
    Abstract [en]

    Phishing is still a prevalent issue in today's Internet. It can have financial or personal consequences. Attacks continue to become more and more sophisticated and the advanced ones (including spear phishing) can only be detected if people carefully check URLs. We developed a game based smartphone app - NoPhish - to educate people in accessing, parsing and checking URLs; i.e. enabling them to distinguish trustworthy and non-trustworthy websites. Throughout several levels information is provided and phishing detection is exercised.

  • 200. Canova, Gamze
    et al.
    Volkamer, Melanie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Weiler, Simon
    Poster: Password Entering and Transmission Security2014Other (Other academic)
    Abstract [en]

    The most popular form of user authentication on websites is the use of passwords. When entering a password, it is crucial that the website uses HTTPS (for the entire content). However, this is often not the case. We propose PassSec - a Firefox Add-On to support users to detect password fields on which their password might be endangered. In addition, PassSec displays a non-blocking warning next to the password field, once users click into the password field. The user is provided with possible consequences of entering a password, recommendations and further information if wanted. 

1234567 151 - 200 of 1108
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf