Change search
Refine search result
12 51 - 59 of 59
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Syrén, Jens
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    En studie av datadioder för säkerställning av enkelriktad datatrafik2015Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
  • 52.
    Trischler, Jakob
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Lohmann, Gui
    Griffith University, Brisbane, Australia.
    Monitoring quality of service at Australian airports: A critical analysis2018In: Journal of Air Transport Management, ISSN 0969-6997, E-ISSN 1873-2089, Vol. 67, p. 63-71Article in journal (Refereed)
    Abstract [en]

    The quality of service monitoring forms a key element of the current light-handed regulation at Australian airports. The ACCC (Australian Competition and Consumer Commission) evaluates and publicly reports the quality of service levels of the four largest airports on a yearly basis to pressure airports to maintain an acceptable service performance. This article aims to provide an in-depth analysis of the methodology used by the ACCC. This analysis includes a critical review of the methodology based on secondary information in combination with primary research (i.e., data from 21 semi-structured interviews) that considers the current perception of the methodology among key stakeholder groups. The research finds that the methodology used by the ACCC is underpinned by some limitations, putting in question its effectiveness, reliability and validity. Particularly, its weak design does not allow for a comprehensive interpretation of the reported results or a reliable comparison across monitored airports, thus reduces transparency. Stakeholders pointed out that it is not possible to evaluate whether an airport undertakes infrastructure investments that ensure both the efficiency of ongoing airport operations and appropriate levels of service quality. These limitations add to the perception that the ACCC in its current function is not a ‘credible threat’ to airports with market power. Recommendations and future research directions are provided to address the identified limitations.

  • 53.
    Vestin, Alexander
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Jämförelse mellan utveckling i WordPress och intern utveckling: En fallstudie med jämförelse av fem kriterier: dokumentation, säkerhet, kodkvalitet, utvecklingstid och skillnad i kodstorlek2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Valet mellan att utveckla ett system eller att köpa ett komplett är inte det lättaste för många organisationer. CriseIT har efterfrågat nya funktioner till sin övningsplattform som är byggd i WordPress. Ett problem inom systemutveckling är att utvecklarna väljer en utvecklingsmetod där alla av kundens krav inte kan realiseras. Kan man realisera alla CriseITs krav med WordPress eller är det bättre att utveckla ett eget system för att möta dessa?

    Syftet med uppsatsen är att informera CriseIT-projektet om ”kostnaden” i olika bemärkelser av att anpassa ett CMS respektive ett egenutvecklat webbsystem. Uppsatsen jämför dessa utvecklingsmetoder med fem olika kriterier: dokumentation, säkerhet, kodkvalitet, utvecklingstid och skillnad i kodstorlek. För att jämföra systemets utvecklingsprocess används dokumentanalys för att få data om kriterierna inom andra projekt om systemutveckling. Uppsatsen använder också koden av komponenterna för att jämföra kodkvalitet, utvecklingstiden och skillnaden i kodstorlek.

    Resultatet av undersökningen visar data om varje kriterium från WordPress och den egenutvecklade komponenten. Slutsatsen av uppsatsen är att organisationer kan köpa färdiga system och utveckla mindre samt lättare krav. Men om systemet inte stödjer den funktionalitet de behöver är det bra om organisationen bygger ett system internt för att realisera alla kraven. För CriseIT borde de ompröva utvecklingsmetoden för sitt informationssystem om fler krav behöver blir utvecklade än de som nu finns implementerade.

  • 54.
    Winter, Philipp
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    How China Is Blocking Tor2012Report (Other academic)
    Abstract [en]

    Not only the free web is victim to China’s excessive censorship, but also the Tor anonymity network: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose countermeasures. Our work bolsters the understanding of China’s censorship capabilities and thus paves the way towards more effective evasion techniques.

  • 55.
    Winter, Philipp
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    How the Great Firewall of China is Blocking Tor2012Conference paper (Refereed)
    Abstract [en]

    Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China's Tor blocking infrastructure is designed and we propose circumvention techniques. Our work bolsters the understanding of China's censorship capabilities and thus paves the way towards more effective circumvention techniques.

  • 56.
    Yedugundla, Kiran
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Multipath TCP: Can it Reduce Transport Latency for Web Traffic?2015Conference paper (Refereed)
  • 57.
    Yedugundla, Kiran
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Probe or Wait: Handling tail losses using Multipath TCP2017In: 2017 IFIP Networking Conference (IFIP Networking) and Workshops, IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    Packet losses are known to affect the performance of latency sensitive Internet applications such as media streaming and gaming. Transport protocols recover from packet loss in order to provide reliable end-to-end communication and improve user experience. The efficiency of loss recovery mechanisms influences the completion time of flows, and thus also the application performance as perceived by the end user. In this paper we focus on state-of-the-art loss recovery mechanisms for TCP and Multipath TCP. We use controlled tail loss scenarios to evaluate the performance of loss recovery mechanisms and, based on the observations, we propose an enhanced tail loss recovery mechanism for Multipath TCP, to improve the loss recovery time. Our experiment results, using the Linux Multipath TCP implementation, show consistent end-to-end latency performance improvement in considered scenarios.

  • 58.
    Zhang, Ge
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks2010In: Communications and Multimedia Security: Proceedings of the 11th IFIP TC 6/TC 11, CMS2010, international conference on Communications and Multimedia Security / [ed] De Decker, Bart; Schaumüller-Bichl, Ingrid, Berlin: Springer , 2010, p. 130-141Conference paper (Refereed)
    Abstract [en]

    Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonymity, particularly to withhold who called whom, is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based solution to prevent surveillance from external attackers, who are able to wiretap the communication channels as well as to manipulate voice packets in the channels. However, it has been demonstrated that the VoIP combined with traditional AONs are vulnerable to two attacks, namely watermark attack and complementary matching attack. Taking these two attacks into account, we investigate the defensive dropping method in VoIP: A VoIP user-agent sends packets to an AON in a constant rate, but packets during periods of silence are marked. Then, the AON drops some silence packets and forwards the remaining ones to their destinations. The result of our experiments shows that the dropping rate must be carefully selected to counteract both of the two attacks. Finally, we discuss further threats in terms of this solution

  • 59. Zola, Enrica
    et al.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kim, Wooseong
    Joint User Association and Energy Aware Routing for Green Small Cell mmWave Backhaul Networks2017In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    A dense deployment of small cells is one of the key characteristics envisioned for future 5G mobile networks in order to provide the required capacity increase. To cut cabling costs, small cells are foreseen to form multihop topologies using high capacity backhaul wireless links in the mmWave bands. Such small cells are deployed within the coverage area of a macro cell (eNB) to provide localized capacity where needed according to the well known Heterogeneous Network concept (HetNet). However, green networking will be very important because powering on unnecessarily a massive amount of small cells may lead to increased OPEX and CO2 emission. In this paper, we propose an optimization model that minimizes the total power consumption of 5G HetNets deployments while providing the required capacity and coverage. Our model jointly optimizes the user association, routing in the multihop backhaul and decides to power on or off the small cells to serve the user demands. Our numerical evaluation show significant power savings over a large range of traffic demand distributions while keeping the blocking probability low.

12 51 - 59 of 59
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf