Change search
Refine search result
1234567 51 - 100 of 1658
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ahmad, Iftikhar
    University of Engineering and Technology, PAK.
    Rana, Nripendra P.
    Qatar University, QAT.
    Khan, Iqra Sadaf
    University of Oulu, FIN.
    An Empirical Investigation on Business Analytics in Software and Systems Development Projects2023In: Information Systems Frontiers, ISSN 1387-3326, E-ISSN 1572-9419, Vol. 25, no 2, p. 917-927Article in journal (Refereed)
    Abstract [en]

    To create competitive advantages, companies are leaning towards business analytics (BA) to make data-driven decisions. Nevertheless, users acceptance and effective usage of BA is a key element for its success. Around the globe, organizations are increasingly adopting BA, however, a paucity of research on examining the drivers of BA adoption and its continuance is noticeable in the literature. This is evident in developing countries where a higher number of systems and software development projects are outsourced. This is the first study to examine BA continuance in the context of software and systems development projects from the perspective of Pakistani software professionals. The data was collected from 186 Pakistani software professionals working in software and systems development projects. The data were analyzed using partial least squares - structural equation modelling techniques. Our structural model explains 45% variance on BA continuance intention, 69% variance on technological compatibility, and 59% variance on perceived usefulness. Our results show that confirmation has a direct impact on BA continuance intention in software and systems projects. The study has both theoretical and practical implications for professionals in the field of business analytics.

    Download full text (pdf)
    fulltext
  • 52.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Gustavsson, Tomas
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Nexus Between Psychological Safety and Non-Technical Debt in Large-Scale Agile Enterprise Resource Planning Systems Development2024In: Software, System, and Service Engineering / [ed] Aleksander Jarzębowicz, Ivan Luković, Adam Przybyłek, Mirosław Staroń, Muhammad Ovais Ahmad, Mirosław Ochodek, Springer, 2024, p. 63-81Conference paper (Refereed)
    Abstract [en]

    Psychological safety, a pivotal factor in team dynamics, has been proposed as a crucial determinant of success in agile software development (ASD) teams and learning. However, the extent of its influence within the domain of large-scale agile (LSA) software development teams remains underexplored. This research investigates the multifaceted dimensions of psychological safety within LSA teams, examining both its precursors and outcomes. This study conducted semi-structured interviews with software professionals actively involved in LSA projects within a Swedish software consultancy company. The findings underscore the intricate nature of establishing a psychologically safe environment within LSA teams, revealing it as a multidimensional construct necessitating a proactive leadership approach, fostering open communication, and cultivating an ecosystem of constructive feedback. The study highlights the critical importance of intentionally shaping teams to facilitate continuous learning, ensuring remuneration safety, and implementing a comprehensive onboarding process for incoming team members. By fostering psychologically safe settings, LSA teams enhanced teamwork dynamics, heightened job satisfaction, and facilitation continuous learning and development. Notably, the absence of such an environment exacerbates the phenomenon of brain drain, exposing the tangible consequences of overlooking this fundamental aspect of organizational culture. This study proposes avenues for future research directions, aiming to further unravel the nuances of psychological safety and its cascading effects within the realm of contemporary LSA software development context.

  • 53.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Gustavsson, Tomas
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    The Pandora's box of social, process, and people debts in software engineering2024In: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, Vol. 36, no 2, article id e2516Article in journal (Refereed)
    Abstract [en]

    In software engineering, technical debt (TD) has been widely investigated, but debt regarding social issues, people, and processes has not been explored as much. It should be noted here that we use nontechnical debt (NTD) as an umbrella term to cover social, process, and people debts. Although the number of studies on NTD in software is increasing, the majority of them are descriptive rather than rigorous, and there is no systematic development of cumulative knowledge. As a result, identifying the fundamental causes of NTD and the associated mitigation techniques in software engineering is challenging. Therefore, this study investigates the scientific evidence regarding NTD till date by conducting a systematic mapping review of software engineering research between January 2000 and October 2021. The search strategy resulted in 175 studies, 17 of which were identified as unique and relevant primary papers. The primary studies show that NTD and TD are inextricably linked. In addition, this study also captured a plethora of causes and mitigation strategies for managing NTD and thus makes four important contributions: (i) highlighting state-of-the-art NTD research; (ii) identification of the reported causes and mitigation strategies in the primary papers; and (iii) determination of opportunities for future NTD research.

    Download full text (pdf)
    fulltext
  • 54.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Gustavsson, Tomas
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Saeeda, Hina
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Customised Roles in Scrum Teams for the Development of Secure Solution2023In: 2023 49th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 362-369Conference paper (Refereed)
    Abstract [en]

    This research paper examines the implementation and impact of customised roles in large-scale agile software development teams, specifically within the Scrum framework. This is a single case study based on 15 practitioners’ interviews from a Swedish software company to review the dynamics of role customisation. The two customised roles of Product Guardians and Security Masters are crucial for addressing complex secure software development, maintaining product quality and security, and fostering team self-organisation. The study also uncovers challenges associated with role customisation, such as the potential overburdening of individuals and disruption of self-organisation. The findings contribute to the discourse on agile methods' adaptability and provide practical insights for organisations considering similar role customisations. Furthermore, the research opens the door for future exploration of organization-wide roles that promote self-organisation.

  • 55.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Iftikhar, Ahmad
    University of Engineering and Technology, Pakistan.
    Iqra, Sadaf Khan
    Aalto University, Finland.
    An Empirical Investigation on Electronic Government Services Continuance and Trust2023Conference paper (Refereed)
    Abstract [en]

    Trust is an important factor that contributes to citizens' willingness to continuance use of e-gov services. However, there is a lack of prior investigation about trust and continuance use of e-gov services in Pakistan - a developing country. We propose a model to investigate citizens' trust and e-gov services' continuous use intention to fill this research gap. Our study collected data from an online survey of 558 Pakistani citizens. Using partial least squares analysis, we found that disposition to trust positively correlates with both internet and government trust. Moreover, citizen satisfaction, trust, perceived usefulness, confirmation, and perceived risk all have significant impacts on the continuous use intention of e-gov services. This research extends and validates the Expectation-Confirmation Model by exploring key factors that influence e-gov continuance use intention. As such, our study offers valuable insights for policymakers and practitioners involved in e-gov service delivery in developing countries like Pakistan. The paper also discusses our findings' implications and identifies future research directions.

  • 56.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Liukkunen, K
    M3S Research Unit, University of Oulu, FIN.
    Enhancement of Experiential Learning in Software Factory Project-Based Course2021In: Balancing the Tension between Digital Technologies and Learning Sciences, Germany: Springer Berlin/Heidelberg, 2021, p. 217-233Chapter in book (Refereed)
  • 57.
    Ahmad, Muhammad Ovais
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Gdańsk, Poland.
    Raulamo-Jurvanen, P
    M3S Research Unit, University of Oulu, Oulu, Finland.
    Scientific Collaboration, Citation and Topic Analysis of International Conference on Agile Software Development Papers2019In: Advances in Agile and User-Centred Software Engineering, Springer, 2019, p. 108-132Chapter in book (Refereed)
    Abstract [en]

    The International Conference on Agile Software Development (XP) was established almost sixteen years ago. Based on data from Scopus database, a total of 789 papers have been published in between years of 2002 and 2018. We employed bibliometrics analysis and topic modeling with R/RStudio to analyze these published papers from various dimensions, including the most active authors, collaboration of authorship, most cited papers, used keywords and trends of probable topics from the titles and abstracts of those papers. The results show that the first five years of XP conference cover nearly 40% of the papers published until now and almost 62% of the XP papers have been cited at least once. Mining of XP conference paper titles and abstracts result in these hot research topics: “Coordination”, “Technical Debt”, “Teamwork”, “Startups” and “Agile Practices”, thus strongly focusing on practical issues and problems faced by the practitioners in the industry. The results highlight the most influential researchers and institutions, and the collaboration between the authors in the conference papers. The approach applied in this study can be extended to other software engineering venues and can be applied to large-scale studies.

  • 58.
    Ahmadi, Bahar
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Nyanlända elevers möte med textbaserade matematikuppgifter: En studie om hur lärare och studiehandledare för åk 1-3 undervisar nyanlända elever i textbaserade matematikuppgifter, samt deras syn på elevernas utmaningar.2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Abstract

    The purpose of this study is to investigate how teachers and study supervisors for year 1-3 teach newly arrived students’ in mathematical word problems and

    their views on the students’ challenges. The method used for this study is

    qualitative semi-structures interviews aimed at teachers and study supervisors. The study is based upon ten interviews, six teachers and four study supervisors. The sociocultural perspective on learning is used, as this perspective is implemented in Swedish school system.

    The result of the study show the importance of the Swedish language for newly arrived students to be able to take on mathematical word problems. Furthermore, the result shows that the difficulties for newly arrived students lie mainly in their language skills rather than their mathematical skills. Previous research and the result of the interviews also confirm this and emphasize the importance of study guidance in the students’ native language.

    Keywords

    Word problems, socio-cultural perspective, newly arrived students, bilingual teaching

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arikivfil
  • 59.
    Ahmed, Bestoun S.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing2020In: IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), IEEE Computer Society, 2020, p. 442-447Conference paper (Refereed)
    Abstract [en]

    A natural method to evaluate the effectiveness of a testing technique is to measure the defect detection rate when applying the created test cases. Here, real or artificial software defects can be injected into the source code of software. For a more extensive evaluation, injection of artificial defects is usually needed and can be performed via mutation testing using code mutation operators. However, to simulate complex defects arising from a misunderstanding of design specifications, mutation testing might reach its limit in some cases. In this paper, we present an open-source benchmark testbed application that employs a complement method of artificial defect injection. The application is compiled after artificial defects are injected into its source code from predefined building blocks. The majority of the functions and user interface elements are covered by creating front-end-based automated test cases that can be used in experiments.

    Download full text (pdf)
    fulltext
  • 60.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Bures, Miroslav
    Czech Technical University, Czech Republic.
    EvoCreeper: Automated Black-Box Model Generation for Smart TV Applications2019In: IEEE transactions on consumer electronics, ISSN 0098-3063, E-ISSN 1558-4127, Vol. 65, no 2, p. 160-169Article in journal (Refereed)
    Abstract [en]

    Abstract—Smart TVs are coming to dominate the televisionmarket. This accompanied by an increase in the use of the smartTV applications (apps). Due to the increasing demand, developersneed modeling techniques to analyze these apps and assess theircomprehensiveness, completeness, and quality. In this paper, wepresent an automated strategy for generating models of smartTV apps based on a black-box reverse engineering. The strategycan be used to cumulatively construct a model for a given app byexploring the user interface in a manner consistent with the use ofa remote control device and extracting the runtime information.The strategy is based on capturing the states of the user interfaceto create a model during runtime without any knowledge ofthe internal structure of the app. We have implemented ourstrategy in a tool called EvoCreeper. The evaluation results showthat our strategy can automatically generate unique states anda comprehensive model that represents the real user interactionswith an app using a remote control device. The models thusgenerated can be used to assess the quality and completeness ofsmart TV apps in various contexts, such as the control of otherconsumer electronics in smart houses.

    Download full text (pdf)
    fulltext
  • 61.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Bures, Miroslav
    Czech Technical University in Prague, Prague.
    Frajtak, Karel
    Czech Technical University in Prague, Prague.
    Cerny, Tomas
    Baylor University, Waco.
    Aspects of Quality in Internet of Things (IoT) Solutions: A Systematic Mapping Study2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 13758-13780Article in journal (Refereed)
    Abstract [en]

    Internet of Things (IoT) is an emerging technology that has the promising power to change our future. Due to the market pressure, IoT systems may be released without sufficient testing. However, it is no longer acceptable to release IoT systems to the market without assuring the quality. As in the case of new technologies, the quality assurance process is a challenging task. This paper shows the results of the first comprehensive and systematic mapping study to structure and categories the research evidence in the literature starting in 2009 when the early publication of IoT papers for IoT quality assurance appeared. The conducted research is based on the most recent guidelines on how to perform systematic mapping studies. A set of research questions is defined carefully regarding the quality aspects of the IoT. Based on these questions, a large number of evidence and research papers is considered in the study (478 papers). We have extracted and analyzed different levels of information from those considered papers. Also, we have classified the topics addressed in those papers into categories based on the quality aspects. The study results carry out different areas that require more work and investigation in the context of IoT quality assurance. The results of the study can help in a further understanding of the research gaps. Moreover, the results show a roadmap for future research directions.

  • 62.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eduard, Enoiu
    Mälardalen University, Västerås, SWE.
    Wasif, Afzal
    Mälardalen University, Västerås, SWE.
    Kamal Z, Zamli
    University Malaysia Pahang, Pekan, MYS.
    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications2020In: Soft Computing - A Fusion of Foundations, Methodologies and Applications, ISSN 1432-7643, E-ISSN 1433-7479, Vol. 24, no 18, p. 13929-13954Article in journal (Refereed)
    Abstract [en]

    Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. This work focuses on the selection type of hyper-heuristic, called the exponential Monte Carlo with counter (EMCQ). Current implementations rely on the memory-less selection that can be counterproductive as the selected search operator may not (historically) be the best performing operator for the current search instance. Addressing this issue, we propose to integrate the memory into EMCQ for combinatorial t-wise test suite generation using reinforcement learning based on the Q-learning mechanism, called Q-EMCQ. The limited application of combinatorial test generation on industrial programs can impact the use of such techniques as Q-EMCQ. Thus, there is a need to evaluate this kind of approach against relevant industrial software, with a purpose to show the degree of interaction required to cover the code as well as finding faults. We applied Q-EMCQ on 37 real-world industrial programs written in Function Block Diagram (FBD) language, which is used for developing a train control management system at Bombardier Transportation Sweden AB. The results show that Q-EMCQ is an efficient technique for test case generation. Addition- ally, unlike the t-wise test suite generation, which deals with the minimization problem, we have also subjected Q-EMCQ to a maximization problem involving the general module clustering to demonstrate the effectiveness of our approach. The results show the Q-EMCQ is also capable of outperforming the original EMCQ as well as several recent meta/hyper-heuristic including modified choice function, Tabu high-level hyper-heuristic, teaching learning-based optimization, sine cosine algorithm, and symbiotic optimization search in clustering quality within comparable execution time.

    Download full text (pdf)
    fulltext
  • 63.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Gargantin, Angelo
    University of Bergamo, ITA.
    Bures, Miroslav
    Czech Technical University, CZE.
    An Automated Testing Framework For Smart TVapps Based on Model Separation2020In: IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), IEEE Computer Society, 2020, p. 62-73Conference paper (Refereed)
    Abstract [en]

    Smart TV application (app) is a new technological software app that can deal with smart TV devices to add more functionality and features. Despite its importance nowadays, far too little attention has been paid to present a systematic approach to test this kind of app so far. In this paper, we present a systematic model-based testing approach for smart TV app. We used our new notion of model separation to use sub-models based on the user preference instead of the exhaustive testing to generate the test cases. Based on the constructed model, we generated a set of test cases to assess the selected paths to the chosen destination in the app. We also defined new mutation operators for smart TV app to assess our testing approach. The evaluation results showed that our approach can generate more comprehensive models of smart TV apps with less time as compared to manual exploratory testing. The results also showed that our approach can generate effective test cases in term of fault detection.

    Download full text (pdf)
    fulltext
  • 64.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Czech Technical University, Prague, Czech Republic.
    Gargantini, Angelo
    University of Bergamo, Italy.
    Zamli, Kamal Z.
    University Malaysia Pahang, Pahang, Malaysia.
    Yilmaz, Cemal
    Sabanci University, Istanbul, Turkey.
    Bures, Miroslav
    Czech Technical University, Prague, Czech Republic.
    Szeles, Marek
    Czech Technical University, Prague, Czech Republic.
    Code-Aware Combinatorial Interaction Testing2019In: IET Software, ISSN 1751-8806, E-ISSN 1751-8814, Vol. 13, no 6, p. 600-609Article in journal (Refereed)
    Abstract [en]

    Combinatorial interaction testing (CIT) is a useful testing technique to address the interaction of input parameters in software systems. In many applications, the technique has been used as a systematic sampling technique to sample the enormous possibilities of test cases. In the last decade, most of the research activities focused on the generation of CIT test suites as it is a computationally complex problem. Although promising, less effort has been paid for the application of CIT. In general, to apply the CIT, practitioners must identify the input parameters for the Software-under-test (SUT), feed these parameters to the CIT tool to generate the test suite, and then run those tests on the application with some pass and fail criteria for verification. Using this approach, CIT is used as a black-box testing technique without knowing the effect of the internal code. Although useful, practically, not all the parameters having the same impact on the SUT. This paper introduces a different approach to use the CIT as a gray-box testing technique by considering the internal code structure of the SUT to know the impact of each input parameter and thus use this impact in the test generation stage. We applied our approach to five reliable case studies. The results showed that this approach would help to detect new faults as compared to the equal impact parameter approach.

    Download full text (pdf)
    fulltext
  • 65.
    Ahmed, Bestoun S.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pahim, Amador
    Red Hat Czech s.r.o., Brno, Czech Republic .
    Rosa Junior, Cleber R
    Red Hat, Inc., Westford, USA .
    Kuhn, D. Richard
    Natl Inst of Standards and Technology, Gaithersburg, MD, USA .
    Bures, Miroslav
    Dept of Computer Science, Czech Technical Univ, Prague, Czech Republic .
    Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing2019In: EASE '19 Proceedings of the Evaluation and Assessment on Software Engineering, NY, USA: Association for Computing Machinery (ACM), 2019, p. 252-258Conference paper (Refereed)
    Abstract [en]

    Combinatorial interaction testing (CIT) is a well-known technique,but the industrial experience is needed to determine its effectivenessin different application domains. We present a case study introducinga unified framework for generating, executing and verifyingCIT test suites, based on the open-source Avocado test framework.In addition, we present a new industrial case study to demonstratethe effectiveness of the framework. This evaluation showed thatthe new framework can generate, execute, and verify effective combinatorialinteraction test suites for detecting configuration failures(invalid configurations) in a virtualization system.

  • 66.
    Ahrens, Ken
    et al.
    Kiel University of Applied Sciences, DEU.
    Palm, Jonas
    Kiel University of Applied Sciences, DEU.
    Jensen, Meiko
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments2022In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE, 2022, p. 194-202Conference paper (Refereed)
    Abstract [en]

    Contact tracing has become a major weapon against fighting the spread of diseases like SARS-CoV-2. Unfortunately, the ability to inform potentially infected people always comes with a downside to privacy, as contacts traced could also be misused in other contexts. In this paper, we present CampusTracer, a novel contact tracing system specialized for university campus environments. Based on an in-depth analysis of existing contact tracing approaches and university-specific requirements, we elaborate a Privacy-by-Design solution to contact tracing that caters for most real-world requirements while preserving the privacy of its users in a best-possible way. 

  • 67. Aiki, T.
    et al.
    Muntean, Adrian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Existence and uniqueness of solutions to a mathematical model predicting service life of concrete structures2009In: Advances in Mathematical Sciences and Applications, E-ISSN 1343-4373, Vol. 19, p. 119-129Article in journal (Refereed)
  • 68.
    Aiki, Toyohiko
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Japan Women's University, JPN.
    Kosugi, Chiharu
    Japan Women's University, JPN.
    Numerical schemes for ordinary differential equations describing shrinking and stretching motion of elastic materials2020In: Advances in Mathematical Sciences and Applications, E-ISSN 1343-4373, Vol. 29, p. 459-494Article in journal (Refereed)
  • 69.
    Aiki, Toyohiko
    et al.
    Japan Women’s University, JPN.
    Kröger, Nils Hendrik
    Deutsches Institut für Kautschuktechnologie e. V, DEU.
    Muntean, Adrian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A macro-micro elasticity-diffusion system modeling absorption-induced swelling in rubber foams: Proof of the strong solvability2021In: Quarterly of Applied Mathematics, ISSN 0033-569X, E-ISSN 1552-4485, Vol. 79, no 3, p. 545-579Article in journal (Refereed)
    Abstract [en]

    In this article, we propose a macro-micro (two-scale) mathematical model for describing the macroscopic swelling of a rubber foam caused by the microscopic absorption of some liquid. In our modeling approach, we suppose that the material occupies a one-dimensional domain which swells as described by the standard beam equation including an additional term determined by the liquid pressure. As special feature of our model, the absorption takes place inside the rubber foam via a lower length scale, which is assumed to be inherently present in such a structured material. The liquid's absorption and transport inside the material is modeled by means of a nonlinear parabolic equation derived from Darcy's law posed in a non-cylindrical domain defined by the macroscopic deformation (which is a solution of the beam equation). Under suitable assumptions, we establish the existence and uniqueness of a suitable class of solutions to our evolution system coupling the nonlinear parabolic equation posed on the microscopic non-cylindrical domain with the beam equation posed on the macroscopic cylindrical domain. In order to guarantee the regularity of the non-cylindrical domain, we impose a singularity to the elastic response function appearing in the beam equation. 

  • 70.
    Aiki, Toyohiko
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Japan Women's University, JPN.
    Kumazaki, Kota
    Tomakomai National College of Technology, JPN.
    Differentiability of a solution of a free boundary problem describing water adsorption2020In: Advances in Mathematical Sciences and Applications, E-ISSN 1343-4373, Vol. 29, p. 247-282Article in journal (Refereed)
    Abstract [en]

    Sato-Aiki-Murase-Shirakawa [7, 16] proposed a free boundary problem in order to describe water adsorption appearing in moisture transport of concrete carbonation process. The problem is to find a pair of a curve and a function for given boundary and initial functions. In this paper we consider that the boundary and initial functions depend on some parameter. Kumazaki [9, 10] already proved the continuous and measurable properties of solutions with respect to the parameter. The aim of this paper is to establish differentiability of solutions with respect to the parameter as a new property. This result will be applied to research of the multi-scale model to water adsorption in concrete carbonation.

  • 71.
    Aiki, Toyohiko
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Japan Women's University, JPN.
    Kumazaki, Kota
    Tomakomai National College of Technology, JPN.
    Remark on differentiability of solutions of free boundary problems describing water adsorption2020In: Advances in Mathematical Sciences and Applications, E-ISSN 1343-4373, Vol. 29, p. 283-293Article in journal (Refereed)
  • 72.
    Aiki, Toyohiko
    et al.
    Japan Womens Univ, JPN.
    Kumazaki, Kota
    Nagasaki Univ, JPN.
    Muntean, Adrian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A free boundary problem describing migration into rubbers: Quest of the large time behavior2022In: Zeitschrift für angewandte Mathematik und Mechanik, ISSN 0044-2267, E-ISSN 1521-4001, Vol. 102, no 7, article id e202100134Article in journal (Refereed)
    Abstract [en]

    In many industrial applications, rubber-based materials are routinely used in conjunction with various penetrants or diluents in gaseous or liquid form. It is of interest to estimate theoretically the penetration depth as well as the amount of diffusants stored inside the material. In this framework, we prove the global solvability and explore the large time-behavior of solutions to a one-phase free boundary problem with nonlinear kinetic condition that is able to describe the migration of diffusants into rubber. The key idea in the proof of the large time behavior is to benefit from a contradiction argument, since it is difficult to obtain uniform estimates for the growth rate of the free boundary due to the use of a Robin boundary condition posed at the fixed boundary.

    Download full text (pdf)
    fulltext
  • 73.
    Aiki, Toyohiko
    et al.
    Japan.
    Muntean, Adrian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Large-time behavior of solutions to a thermo-diffusion system with Smoluchowski interactions2017In: Journal of Differential Equations, ISSN 0022-0396, E-ISSN 1090-2732, Vol. 5, no 5, p. 3009-3026Article in journal (Refereed)
    Abstract [en]

    We prove the large time behavior of solutions to a coupled thermo-diffusion arising in the modeling of the motion of hot colloidal particles in porous media. Additionally, we also ensure the uniqueness of solutions of the target problem. The main mathematical difficulty is due to the presence in the right-hand side of the equations of products between temperature and concentration gradients. Such terms mimic the so-called thermodynamic Soret and Dufour effects. These are cross-coupling terms emphasizing in this context a strong interplay between heat conduction and molecular diffusion.

    Download full text (pdf)
    fulltext
  • 74.
    Airola, Rasmus
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hager, Kristoffer
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Image Classification, Deep Learning and Convolutional Neural Networks: A Comparative Study of Machine Learning Frameworks2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The use of machine learning and specifically neural networks is a growing trend in software development, and has grown immensely in the last couple of years in the light of an increasing need to handle big data and large information flows. Machine learning has a broad area of application, such as human-computer interaction, predicting stock prices, real-time translation, and self driving vehicles. Large companies such as Microsoft and Google have already implemented machine learning in some of their commercial products such as their search engines, and their intelligent personal assistants Cortana and Google Assistant.

    The main goal of this project was to evaluate the two deep learning frameworks Google TensorFlow and Microsoft CNTK, primarily based on their performance in the training time of neural networks. We chose to use the third-party API Keras instead of TensorFlow's own API when working with TensorFlow. CNTK was found to perform better in regards of training time compared to TensorFlow with Keras as frontend. Even though CNTK performed better on the benchmarking tests, we found Keras with TensorFlow as backend to be much easier and more intuitive to work with. In addition, CNTKs underlying implementation of the machine learning algorithms and functions differ from that of the literature and of other frameworks. Therefore, if we had to choose a framework to continue working in, we would choose Keras with TensorFlow as backend, even though the performance is less compared to CNTK.

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 75.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Islami, Lejla
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Zuccato, Albin
    ICA Gruppen AB.
    Privacy-Preserving Identifiers for IoT: A Systematic Literature Review2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 168470-168485Article, review/survey (Refereed)
    Abstract [en]

    The Internet of Things (IoT) paves the way for smart applications such as in E-health, E-homes, transportation, or energy production. However, IoT technologies also pose privacy challenges for their users, as they allow the tracking and monitoring of the users' behavior and context. The EU General Data Protection Regulation (GDPR) mandates data controller to follow a data protection by design and default approach by implementing for instance pseudonymity for achieving data minimisation. This paper provides a systematic literature review for answering the question of what types of privacy-preserving identifiers are proposed by the literature in IoT environments for implementing pseudonymity. It contributes with classifications and analyses of IoT environments for which privacy-preserving identifiers have been proposed and of the pseudonym types and underlying identity management architectures used. Moreover, it discusses trends and gaps in regard to addressing privacy trade-offs.

    Download full text (pdf)
    fulltext
  • 76.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Mancini, L. V.
    Universita di Roma Sapienza, Rome, Italy.
    Venturi, D.
    Universita di Roma Sapienza, Rome, Italy.
    Multi-covert channel attack in the cloud2019In: 2019 6th International Conference on Software Defined Systems, SDS 2019, IEEE, 2019, p. 160-165Conference paper (Refereed)
    Abstract [en]

    Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the message. However, encryption only restricts unapproved individuals from decoding the message. Whereas in many circumstances, the mere presence of communication or variations in communication patterns, such as an increase in message rate, is sufficient to raise doubt and initiate alerts. One of the best ways to bypass that is by using covert channels. In this paper, we create innovative protocols that use multiple covert channels working in parallel to exfiltrate data from a remote-controlled machine to our server. The provided protocols guarantee the completeness and unforgeability of the exfiltrated data. We analyze the difference in performance between the created protocols and provide mathematical equations to evaluate them.

  • 77.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hoepman, Jaap-Henk
    Radboud University, The Netherlands.
    Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs2023In: Network and Distributed System Security (NDSS) Symposium: Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023), Internet Society , 2023Conference paper (Refereed)
    Abstract [en]

    In vehicular ad hoc networks (VANETs), vehicles exchange messages to improve traffic and passengers’ safety. In VANETs, (passive) adversaries can track vehicles (and their drivers) by analyzing the data exchanged in the network. The use of privacy-enhancing technologies can prevent vehicle tracking but solutions so far proposed either require an intermittent connection to a fixed infrastructure or allow vehicles to generate concurrent pseudonyms which could lead to identity-based (Sybil) attacks. In this paper, we propose an anonymous authentication scheme that does not require a connection to a fixed infrastructure during operation and is not vulnerable to Sybil attacks. Our scheme is built on attribute-based credentials and short lived pseudonyms. In it, vehicles interact with a central authority only once, for registering themselves, and then generate their own pseudonyms without interacting with other devices, or relying on a central authority or a trusted third party. The pseudonyms are periodically refreshed, following system wide epochs.

    Download full text (pdf)
    vehiclesec2023-23007-paper.pdf
  • 78.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Naskar, Sujash
    Mid Sweden University, Sweden.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hoepman, Jaap-Henk
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Radboud University, The Netherlands; University of Groningen, The Netherlands.
    A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs2023Conference paper (Refereed)
    Abstract [en]

    Vehicular Ad Hoc Networks (VANETs) play a crucial rolein the evolution of Intelligent Transportation Systems. The problems ofrenting and drivers’ accountability still need to be answered in VANETs.Existing proposals do not consider renting vehicles, and there is nodistinction between renters and owners. This paper proposes privacy-preserving rental and accountability protocols to address these problems.The proposed rental protocol outputs an agreement between an ownerand a renter, which allows the renter to unlock and drive the vehicle.The privacy-preserving accountability protocol offers a robust solutionfor detecting and mitigating malicious behavior in VANETs. It provides aplatform for holding entities accountable for their actions without violating their privacy. The paper demonstrates that our solution successfullymeets the pre-set security and privacy requirements in VANETs. Thesefindings suggest promising potential for improving future vehicular networks’ safety, efficiency, and performance.

  • 79.
    Akinwande, Ridwan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Mathematical Modeling of Covid-19 With Intervention: A Case Study of Nigeria2023Independent thesis Advanced level (degree of Master (Two Years)), 40 credits / 60 HE creditsStudent thesis
    Abstract [en]

    The outbreak of COVID-19 disease caused by the SARS-CoV-2 in 2019 has claimed over 6.3 million lives. The pandemic prompted many countries to set up some preventive measures as means to control the spread of the disease. In this thesis, a deterministic system of coupled differential equations is proposed to study the transmission of COVID-19 among a well-mixed population with intervention strategies. The existence and uniqueness of the classical solution of the COVID-19 model are proved. The equilibrium points of the model are analyzed and, the basic reproduction number is obtained. The local asymptotic stability and the global asymptotic stability of the model are carried out. An adaptive Dormand\textendash Prince numerical method is used to obtain approximate solution of the model. The results shows that combined control parameters may reduce the burden of COVID-19 faster in the population. In addition, the outcomes of this study show that in order to mitigate the spread of COVID-19 in the overall population, non-pharmaceutical intervention strategies such as social distancing, self-isolation, and hand washing should be practiced at the maximum and people should be vaccinated.

    Download full text (pdf)
    fulltext
  • 80.
    Akishev, G.
    et al.
    L.N. Gumilyov Eurasian National University, Republic of Kazakhstan; Ural Federal University, Russia.
    Lukkassen, D.
    UiT The Arctic University of Norway.
    Persson, Lars-Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). UiT The Arctic University of Norway.
    Some new Fourier inequalities for unbounded orthogonal systems in Lorentz–Zygmund spaces2020In: Journal of inequalities and applications, ISSN 1025-5834, E-ISSN 1029-242X, p. 1-12, article id 77Article in journal (Refereed)
    Abstract [en]

    In this paper we prove some essential complements of the paper (J. Inequal. Appl.2019:171, 2019) on the same theme. We prove some new Fourier inequalities in thecase of the Lorentz–Zygmund function spaces Lq,r(log L)α involved and in the casewith an unbounded orthonormal system. More exactly, in this paper we prove anddiscuss some new Fourier inequalities of this type for the limit case L2,r(log L)α, whichcould not be proved with the techniques used in the paper (J. Inequal. Appl.2019:171, 2019).

    Download full text (pdf)
    fulltext
  • 81.
    Akishev, Gabdolla
    et al.
    L.N.Gumilyov Eurasian National University, KAZ.
    Persson, Lars-Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). UIT The Arctic University of Norway, NOR .
    Singh, Harpal
    UIT The Arctic University of Norway, NOR .
    Inequalities for the Fourier coefficients in unbounded orthogonal systems in generalized Lorentz spaces2020In: Nonlinear Studies, ISSN 1359-8678, Vol. 27, no 4, p. 1137-1155Article in journal (Refereed)
    Abstract [en]

    This paper is an essential complement of the research recently presented in [1], [2]. A number of classical Fourier inequalities related to Fourier coefficients with respect to unbounded orthogonal systems are generalized and complemented. All results are given in the case of generalized Lorentz spaces.

  • 82.
    Akishev, Gabdolla
    et al.
    Moscow State University, RUS.
    Persson, Lars-Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Singh, Harpal
    UiT The Arctic University, NOR.
    Some New Fourier and Jackson-Nikol'skii Type Inequalities In Unbounded Orthonormal Systems2021In: Constructive Mathematical Analysis, ISSN 2651-2939, no 3, p. 291-304Article in journal (Refereed)
    Abstract [en]

    We consider the generalized Lorentz space L ;q dened via a continuous and concave function and the Fourier series of a function with respect to an unbounded orthonormal system. Some new Fourier and Jackson-Nikol'skii type inequalities in this frame are stated, proved and discussed. In particular, the derived results generalize and unify several well-known results but also some new applications are pointed out.

  • 83.
    Akrin, Christoffer
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Using Imitation Learning for Human Motion Control in a Virtual Simulation2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Test Automation is becoming a more vital part of the software development cycle, as it aims to lower the cost of testing and allow for higher test frequency. However, automating manual tests can be difficult as they tend to require complex human interaction. In this thesis, we aim to solve this by using Imitation Learning as a tool for automating manual software tests. The software under test consists of a virtual simulation, connected to a physical input device in the form of a sight. The sight can rotate on two axes, yaw and pitch, which require human motion control. Based on this, we use a Behavioral Cloning approach with a k-NN regressor trained on human demonstrations. Evaluation of model resemblance to the human is done by comparing the state path taken by the model and human. The model task performance is measured with a score based on the time taken to stabilize the sight pointing at a given object in the virtual world. The results show that a simple k-NN regression model using high-level states and actions, and with limited data, can imitate the human motion well. The model tends to be slightly faster than the human on the task while keeping realistic motion. It also shows signs of human errors, such as overshooting the object at higher angular velocities. Based on the results, we conclude that using Imitation Learning for Test Automation can be practical for specific tasks, where capturing human factors are of importance. However, further exploration is needed to identify the full potential of Imitation Learning in Test Automation.

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 84.
    Akrin, Christoffer
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Tham, Simon
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A Natural Language Interface for Querying Linked Data2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The thesis introduces a proof of concept idea that could spark great interest from many industries. The idea consists of a remote Natural Language Interface (NLI), for querying Knowledge Bases (KBs). The system applies natural language technology tools provided by the Stanford CoreNLP, and queries KBs with the use of the query language SPARQL. Natural Language Processing (NLP) is used to analyze the semantics of a question written in natural language, and generates relational information about the question. With correctly defined relations, the question can be queried on KBs containing relevant Linked Data. The Linked Data follows the Resource Description Framework (RDF) model by expressing relations in the form of semantic triples: subject-predicate-object.

    With our NLI, any KB can be understood semantically. By providing correct training data, the AI can learn to understand the semantics of the RDF data stored in the KB. The ability to understand the RDF data allows for the process of extracting relational information from questions about the KB. With the relational information, questions can be translated to SPARQL and be queried on the KB.

    Download full text (pdf)
    fulltext
  • 85.
    Al Sabbagh, Madian
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Al Sabbagh, Luay
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Utveckling av en webbapplikation för bokning av testresurser: Applikationsutveckling i React och Node.js2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The web application Testpersonbokaren is used by Nordic Medtest to book fake test persons for various actors in healthcare so that they can test and validate their environments without being dependent on real personal data. The purpose of this project is to develop a new version of Testpersonbokaren with new technologies and frameworks as the existing version has several problems and limitations. This was achieved by creating a Node.js server and developing two new web interfaces for Testpersonbokaren, where one is only used by Nordic Medtest and the other is used by Sweden's regions, municipalities and private actors. Both web interfaces are developed with the React framework. The new Testpersonbokaren has a more modern look and more functionality than the old one. Unlike the old version, the new one has good documentation, which makes the further development of the web application easier. The new Testpersonbokaren is ready to be put into operation at Nordic Medtest.

    Download full text (pdf)
    fulltext
  • 86.
    Alaqra, Ala
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013).
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario2016In: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance / [ed] Nathan Clarke & Steven Furnell, 2016, p. 220-230Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

    Download full text (pdf)
    fulltext
  • 87.
    Alaqra, Ala Sarah
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions2018Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is a continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem. Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions.  In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. Most of our work has focused on redactable signatures in the cloud context within the eHealth use-case. Redactable signatures are  a privacy enhancing scheme allowing to remove parts of a signed document by a specified party for achieving data minimization without invalidating the respective signature.

    We mainly used semi-structures interviews and focus groups in our investigations. Our results yielded key HCI considerations as well as guidelines of different means for supporting the design of future solutions.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
    Download (mp3)
    Forskningspodden with Ala Sarah Alaqra
  • 88.
    Alaqra, Ala Sarah
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

    Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Mainly, there were three PETs in the cloud context included in our studies: malleable signatures, secret sharing, and homomorphic encryption. Based on the three PETs, services were developed within European research projects that were the scope of our user studies. We followed a user-centered design approach by using empirical qualitative and quantitative means for collecting study data. Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

    Download full text (pdf)
    2020:5
    Download (jpg)
    preview image
  • 89.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ciceri, Eleneora
    MediaClinics, ITA.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). MediaClinics, ITA.
    Mosconi, Marco
    MediaClinics, ITA.
    Vicini, Sauro
    MediaClinics, ITA.
    Using PAPAYA for eHealth – Use Case Analysis and Requirements2020In: 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), IEEE, 2020, p. 437-442Conference paper (Refereed)
    Abstract [en]

    This paper presents an eHealth use case basedon a privacy-preserving machine learning platform to detectarrhythmia developed by the PAPAYA project that can run inan untrusted domain. It discusses legal privacy and user requirementsthat we elicited for this use case from the GDPR andvia stakeholder interviews. These include requirements for securepseudonymisation schemes, for allowing also pseudonymous usersto exercise their data subjects rights, for not making diagnosticdecisions fully automatically and for assurance guarantees, conformancewith specified standards and informing clinicians andpatients about the privacy protection. The requirements are notonly relevant for our use case but also for other use cases utilisingprivacy-preserving data analytics to classify medical data.

    Download full text (pdf)
    fulltext
  • 90.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Framner, Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients2018In: Journal of Medical Internet Research, E-ISSN 1438-8871, Vol. 20, no 12, article id e10954Article in journal (Refereed)
    Abstract [en]

    Background: Patients' privacy is regarded as essential for the patient-doctor relationship. One example of a privacy-enhancing technology for user-controlled data minimization on content level is a redactable signature. It enables users to redact personal information from signed documents while preserving the validity of the signature, and thus the authenticity of the document. In this study, we present end users' evaluations of a Cloud-based selective authentic electronic health record (EHR) exchange service (SAE-service) in an electronic health use case. In the use case scenario, patients were given control to redact specified information fields in their EHR, which were signed by their doctors with a redactable signature and transferred to them into a Cloud platform. They can then selectively disclose the remaining information in the EHR, which still bears the valid digital signature, to third parties of their choice. Objective: This study aimed to explore the perceptions, attitudes, and mental models concerning the SAE-service of 2 user roles: signers (medical professionals) and redactors (patients with different technical knowledge) in Germany and Sweden. Another objective was to elicit usability requirements for this service based on the analysis of our investigation. Methods: We chose empirical qualitative methods to address our research objective. Designs of mock-ups for the service were used as part of our user-centered design approach in our studies with test participants from Germany and Sweden. A total of 13 individual walk-throughs or interviews were conducted with medical staff to investigate the EHR signers' perspectives. Moreover, 5 group walk-throughs in focus groups sessions with (N=32) prospective patients with different technical knowledge to investigate redactor's perspective of EHR data redaction control were used. Results: We found that our study participants had correct mental models with regard to the redaction process. Users with some technical models lacked trust in the validity of the doctor's signature on the redacted documents. Main results to be considered are the requirements concerning the accountability of the patients' redactions and the design of redaction templates for guidance and control. Conclusions: For the SAE-service to be means for enhancing patient control and privacy, the diverse usability and trust factors of different user groups should be considered.

    Download full text (pdf)
    Fulltext
  • 91.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Chalmers University of Technology, Sweden.
    Karegar, Farzaneh
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Transparency of Privacy Risks Using PIA Visualizations2023In: HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings / [ed] Moallem Abbas, Cham: Springer, 2023, p. 3-17Conference paper (Refereed)
    Abstract [en]

    Privacy enhancing technologies allow the minimization of risks to online data. However, the transparency of the minimization process is not so clear to all types of end users. Privacy Impact Assessments (PIAs) is a standardized tool that identifies and assesses privacy risks associated with the use of a system. In this work, we used the results of the PIA conducted in our use case to visualize privacy risks to end users in the form of User Interface (UI) mock ups. We tested and evaluated the UI mock-ups via walkthroughs to investigate users' interests by observing their clicking behavior, followed by four focus group workshops. There were 13 participants (two expert groups and two lay user groups) in total. Results reveal general interests in the transparency provided by showing the risks reductions. Generally, although participants appreciate the concept of having detailed information provided about risk reductions and the type of risks, the visualization and usability of the PIA UIs require future development. Specifically, it should be tailored to the target group's mental models and background knowledge.

    The full text will be freely available from 2024-07-10 14:55
  • 92.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Wearable devices and measurement data: An empirical study on ehealth and data sharing2020In: Proceedings - IEEE Symposium on Computer-Based Medical Systems, Institute of Electrical and Electronics Engineers (IEEE), 2020, p. 443-448Conference paper (Refereed)
    Abstract [en]

    The development of medical applications and services is growing but is hampered by security and privacy concerns and a lack of trust by users. This interview study with 29 users of wearable devices reports perspectives on privacy concerns towards sharing of measured data in general, and measured stress data in the workplace. Participants consider stress data to be sensitive (73%), and report that privacy protection is a requirement for both the technology and the workplace. Sharing behavior is shown to be strongly coupled with clear purposes and incentives. Sharing measured fitness data is accepted (72%), and sharing stress measured data for the common good (48%), despite privacy concerns. Over half mistrust the technology not to leak data. Technology solutions should provide clear and sound purposes for storing, sharing, and processing measured data, as well as provide assurances from workplace and cloud.

    Download full text (pdf)
    fulltext
  • 93.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives2021In: JMIR Human Factors, E-ISSN 2292-9495, Vol. 8, no 3, p. 1-15, article id e21810Article in journal (Refereed)
    Abstract [en]

    Background:Third-party cloud-based data analysis applications are proliferating in electronic health (eHealth) because of the expertise offered and their monetary advantage. However, privacy and security are critical concerns when handling sensitive medical data in the cloud. Technical advances based on “crypto magic” in privacy-preserving machine learning (ML) enable data analysis in encrypted form for maintaining confidentiality. Such privacy-enhancing technologies (PETs) could be counterintuitive to relevant stakeholders in eHealth, which could in turn hinder adoption; thus, more attention is needed on human factors for establishing trust and transparency.

    Objective:The aim of this study was to analyze eHealth expert stakeholders’ perspectives and the perceived tradeoffs in regard to data analysis on encrypted medical data in the cloud, and to derive user requirements for development of a privacy-preserving data analysis tool.

    Methods:We used semistructured interviews and report on 14 interviews with individuals having medical, technical, or research expertise in eHealth. We used thematic analysis for analyzing interview data. In addition, we conducted a workshop for eliciting requirements.

    Results:Our results show differences in the understanding of and in trusting the technology; caution is advised by technical experts, whereas patient safety assurances are required by medical experts. Themes were identified with general perspectives on data privacy and practices (eg, acceptance of using external services), as well as themes highlighting specific perspectives (eg, data protection drawbacks and concerns of the data analysis on encrypted data). The latter themes result in requiring assurances and conformance testing for trusting tools such as the proposed ML-based tool. Communicating privacy, and utility benefits and tradeoffs with stakeholders is essential for trust. Furthermore, stakeholders and their organizations share accountability of patient data. Finally, stakeholders stressed the importance of informing patients about the privacy of their data.

    Conclusions:Understanding the benefits and risks of using eHealth PETs is crucial, and collaboration among diverse stakeholders is essential. Assurances of the tool’s privacy, accuracy, and patient safety should be in place for establishing trust of ML-based PETs, especially if used in the cloud.

    Download full text (pdf)
    fulltext
  • 94.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Karegar, Farzaneh
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Chalmers University of Technology, Sweden.
    Structural and functional explanations for informing lay and expert users: the case of functional encryption2023In: Proceedings on Privacy Enhancing Technologies, E-ISSN 2299-0984, Vol. 2023, no 4, p. 359-380Article in journal (Refereed)
    Abstract [en]

    Usable explanations of privacy-enhancing technologies (PETs) help users make more informed privacy decisions, but the explanations of PETs are generally geared toward individuals with more technical knowledge. To explain functional encryption (FE) to experts and laypersons, we investigate structural and functional explanations and explore users' interests and preferences, as well as how they affect users' comprehension and decisions about sharing data. To this end (with an EU-based population), we conducted four focus groups, in combination with walk-throughs, with 13 participants in the first study, followed by an online survey with 347 experts and 370 laypersons. Both explanations were considered useful in fulfilling the different needs of participants interested in the privacy policy information. Participants, regardless of their expertise, trusted and were more satisfied with the structural explanation. However, functional explanations had a higher contribution to all participants' comprehension. We, therefore, recommend combining both types of explanations for a usable privacy policy.

    Download full text (pdf)
    fulltext
  • 95.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Khumalo, Akhona
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Swedish Recreational Businesses Coping with COVID-19 Using Technologies2022In: HCI International 2022 Posters: 24th International Conference on Human-Computer Interaction, HCII 2022 Virtual Event, June 26 – July 1, 2022 Proceedings, Part III / [ed] Constantine Stephanidis; Margherita Antona; Stavroula Ntoa, Springer, 2022, p. 349-357Conference paper (Refereed)
    Abstract [en]

    Restrictions imposed on societies across the world due to the COVID-19 pandemic have had direct and indirect consequences to the public’s health and well-being. Unlike many countries, Sweden’s restrictions were significantly milder. Businesses offering recreational services provide activities that are important to the well-being of the public. This study explores the status and perspectives of 34 Swedish businesses that provide recreational activities during COVID-19 and the role of technology on recreational services. Results show that businesses comply with guidelines and recommendations, have trust in the government despite lack of sufficient support, and have special considerations for youth. Technology was significant in aiding businesses to cope with COVID-19. Trends reported are: adoption of new remote technologies, increase of digital tools use, offerings of online services, and openness to new solutions.

    Download full text (pdf)
    fulltext
  • 96.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Kitkowska, Agnieszka
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Impact of Intrinsic Factors and COVID-19 Pandemic on the Use of Technology2021Conference paper (Refereed)
    Abstract [en]

    The unprecedented pandemic of the infectious coronavirus disease (COVID-19) is still ongoing. Considering the limitations and restrictions imposed by COVID-19, we explored the role of technology and the extent of usage by end-users. In our online survey, we investigated users’ perspectives on their use of technologies in different contexts (e.g., work, entertainment), taking into consideration intrinsic factors such as health consciousness, perceived social isolation, and pandemic-related concerns. Results from 218 respondents show a significant increase in technology use in all investigated contexts after the pandemic occurred. Moreover, the results suggest that different factors may contribute to such increases, depending on the context. It appears that perceived social isolation, concerns about the pandemic, and tracking have the most prominent influence on different use of technology. Furthermore, open-ended responses include beneficial opportunities, concerns & consequences, and behavioral transformations & adaptations due to COVID-19. Our findings provide insights for designing and developing new technologies, especially for communication and entertainment, to support users’ needs during a pandemic.

    Download full text (pdf)
    fulltext
  • 97.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Social and Psychological Studies (from 2013).
    Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors2019In: HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / [ed] Abbas Moallem, Cham, Switzerland: Springer, 2019, p. 355-370Conference paper (Refereed)
    Abstract [en]

    The importance and perception of privacy varies from one context to the other. However, everyone values his or her privacy to a certain extent. The subjectivity of that value, attitudes, and behaviors would depend on different entangling factors. It is important to understand the motivation that influences human behavior, whether to protect or share their information. In this paper, we aim at understanding the boundaries of privacy, factors influencing information sharing behavior including experiences (reciprocities of privacy), and efforts taken to protect one’s data. We collected data using quantitative (survey/quiz) and qualitative means (focus groups). In the survey/quiz, our results showed that intrusion experience and awareness have a significant correlation between sharing of data. Furthermore, our focus groups results yielded details on influencing factors for privacy reciprocities and tradeoffs. We discuss our results in terms of privacy incentives and factors influencing the sharing behavior of their information. Finally, we highlight the complexity of behavior where intrinsic and extrinsic motivations could clash and result in a dilemma such as the privacy paradox phenomenon. © 2019, Springer Nature Switzerland AG.

    Download full text (pdf)
    fulltext
  • 98.
    Alaqra, Ala(a)
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Groß, Thomas
    Newcastle University, UK.
    Lorünser, Thomas
    Austrian Institute of Technology, Austria.
    Slamanig, Daniel
    Graz University of Technology, Austria.
    Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements2015In: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / [ed] David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab, Springer Publishing Company, 2015, Vol. 476, p. 79-96Conference paper (Refereed)
    Abstract [en]

    This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project PRISMACLOUD, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the PRISMACLOUD cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a ``Deep Dive on Crypto'' session that offered technical information on the new tools. Overall, the workshop aimed at outlining application scenarios and eliciting end-user requirements for PRISMACLOUD.

    Download full text (pdf)
    IFIP2015
  • 99.
    Alay, Özgü
    et al.
    SIMULA METROPOLITAN CENTER FOR DIGITAL ENGINEERING (SRL).
    Caso, Giuseppe
    IMULA METROPOLITAN CENTER FOR DIGITAL ENGINEERING (SRL).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rabitsch, Alexander
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Anagnostopolous, Themistoklis
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Xylouris, Georgios
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Koumaras, Harilaos
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Aumayr, Erik
    L.M. ERICSSON LIMITED.
    Bosneag, Anne-Marie
    L.M. ERICSSON LIMITED.
    McNamara, Joseph
    L.M. ERICSSON LIMITED.
    Pretel, Ivan
    FON TECHNOLOGY SL.
    Etxebarria, Iñaki
    FON TECHNOLOGY SL.
    Jimeno, Elisa
    ATOS SPAIN SA.
    Diaz-Zayas, Almudena
    UNIVERSIDAD DE MALAGA, SPAIN.
    Garcia, Belen
    UNIVERSIDAD DE MALAGA, SPAIN.
    Reichert, Leonie
    HUMBOLDT UNIVERSITY, GERMANY.
    Sakkas, Christos
    INFOLYSIS P.C..
    Papaioannou, Angeliki
    INFOLYSIS P.C..
    Koumaras, Vaios
    INFOLYSIS P.C..
    Rajaguru, Santosh Kumar
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Prakash, Arun
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Eichhorn, Fabian
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Emmelmann, Marc
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Keil, O.
    CHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Lioprasitis, Dimitrios
    SPACE HELLAS (CYPRUS) LTD.
    Gardikis, Georgios
    SPACE HELLAS (CYPRUS) LTD.
    Frascolla, Valerio
    INTEL.
    Monitoring and Analytics (Release B)2021Report (Refereed)
    Abstract [sv]

    This document describes the design and implementation of the 5GENESIS Monitoring & Analytics (M&A) framework in its Release B, developed within Task T3.3 of the project work plan. M&A Release B leverages and extends M&A Release A, which has been documented in the previous Deliverable D3.5 [1]. In particular, we present new features and enhancements introduced in this new Release compared to the Release A. We also report some examples of usage of the M&A framework, in order to showcase its integrated in the 5GENESIS Reference Architecture. 

    Download full text (pdf)
    fulltext
  • 100.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    García, Rafael
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway AS, Norway.
    Dely, Tobias
    Celerway AS, Norway.
    Werme, Jonas
    Celerway AS, Norway.
    Evensen, Kristian
    Celerway AS, Norway.
    Hansen, Audun
    Celerway AS, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino.
    Mellia, Marco
    Politecnico di Torino.
    Ajmone Marsan, Marco
    Politecnico di Torino.
    Monno, Roberto
    Nextworks, Italy.
    Lønsethagen, Håkon
    Telenor R&D, Norway.
    MONROE, a distributed platform to measure and assess mobile broadband networks: demo2016In: Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, New York, NY, USA: Association for Computing Machinery (ACM), 2016, p. 85-86Conference paper (Refereed)
    Abstract [en]

    This demo presents the MONROE distributed platform and how it can be used to implement measurement and assessment experiments with operational mobile broadband networks (MBBs). MONROE provides registered experimenters with open access to hundreds of nodes, distributed over several European countries and equipped with multiple MBB connections, and a backend system that collects the measurement results. Experiments are scheduled through a user-friendly web client, with no need to directly access the nodes. The platform further embeds tools for real-time traffic flow analysis and a powerful visualization tool.

1234567 51 - 100 of 1658
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf