Endre søk
Begrens søket
1234567 51 - 100 of 1100
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 51.
    Alizadeh Noghani, Kyoomars
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Sankar Gopannan, Prem
    Ericsson, USA.
    EVPN/SDN Assisted Live VM Migration between Geo-Distributed Data Centers2018Inngår i: 4th IEEE Conference on Network Softwarization (NetSoft), IEEE, 2018, s. 105-113Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Live Virtual Machine (VM) migration has significantly improved the flexibility of modern Data Centers (DC). However, seamless live migration of a VM between geo-distributed DCs faces several challenges due to difficulties in preserving the network configuration after the migration paired with a large network convergence time. Although SDN-based approaches can speed up network convergence time, these techniques have two limitations. First, they typically react to the new topology by installing new flow rules once the migration is finished. Second, because the WAN is typically not under SDN control, they result in sub-optimal routing thus severely degrading the network performance once the VM is attached at the new location.

    In this paper, we identify networking challenges for VM migration across geo-distributed DCs. Based on those observations, we design a novel long-haul VM migration scheme that overcomes those limitations. First, instead of reactively restoring connectivity after the migration, our SDN-based approach proactively restores flows across the WAN towards the new location with the help of EVPN and VXLAN overlay technologies. Second, the SDN controller accelerates the network convergence by announcing the migration to other controllers using MP-BGP control plane messages. Finally, the SDN controller resolves the sub-optimal routing problem that arises as a result of migration implementing a distributed anycast gateway. We implement our approach as extensions to the OpenDaylight controller. Our evaluation shows that our approach outperforms existing approaches in reducing the downtime by 400 ms and increasing the application performance up to 12 times.

  • 52.
    Alizadeh Noghani, Kyoomars
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Taheri, Javid
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    On the Cost-Optimality Trade-off for Service Function Chain Reconfiguration2019Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Optimal placement of Virtual Network Functions (VNFs) in virtualized data centers enhances the overall performance of Service Function Chains (SFCs) and decreases the operational costs for mobile network operators. Maintaining an optimal placement of VNFs under changing load requires a dynamic reconfiguration that includes adding or removing VNF instances, changing the resource allocation of VNFs, and re-routing corresponding service flows. However, such reconfiguration may lead to notable service disruptions and impose additional overhead on the VNF infrastructure, especially when reconfiguration entails state or VNF migration. On the other hand, not changing the existing placement may lead to high operational costs. In this paper, we investigate the trade-off between the reconfiguration of SFCs and the optimality of the resulting placement and service flow (re)routing. We model different reconfiguration costs related to the migration of stateful VNFs and solve a joint optimization problem that aims to minimize both the total cost of the VNF placement and the reconfiguration cost necessary for repairing a suboptimal placement. Numerical results show that a small number of reconfiguration operations can significantly reduce the operational cost of the VNF infrastructure; however, too much reconfiguration may not pay off should heavy costs be involved.

  • 53. Allman, Mark
    et al.
    Avrachenkov, Konstatin
    Ayesta, Urtzi
    Blanton, Josh
    Hurtig, Per
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Early Retransmit for TCP and SCTP2008Annet (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    This document proposes a new mechanism for TCP and SCTP that can be used to recover lost segments when a connection's congestion window is small. The "Early Retransmit" mechanism allows the transport to reduce, in certain special circumstances, the number of duplicate acknowledgments required to trigger a fast retransmission. This allows the transport to use fast retransmit to recover packet losses that would otherwise require a lengthy retransmission timeout.

  • 54.
    Alm, Anton
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Internet of Things mesh network: Using the Thread networking protocol2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation.

    Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained.

    The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.

  • 55.
    Almgren, Mats
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Hansen, Erik
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Coridendro: Ett verktyg för att grafiskt åskådliggöra incidensen av malignt melanom inom olika släkter2006Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    The county council of Värmland is taking part in a larger project which in general consists of surveying malign melanoma within different families. Counties in Sweden are following-up on patients suffering from malign melanoma, which is likely to have inheritable causes. When a suspected heritable malign melanoma is found an investigation is started. A pedigree is drawn, describing the propositus’ family.

    Every individual in the pedigree is represented by a symbol. The appearance of this symbol is determined by: unhealthy/healthy, diseased/alive, man/woman. When the individuals have been identified and the according symbols drawn, the symbols are connected by lines representing kinship.

    Today the pedigrees are drawn by hand using pen and paper. This is a time consuming task and the appearance differ depending on who is drawing the pedigree.

    The result of our problem-analysis is a graphical software tool. On a drawing area the user may draw the symbols on predefined locations. The tool also allows for symbols to be connected with lines. Symbols are connected through selecting a start-symbol and an end-symbol.

  • 56.
    Alsharoa, A.
    et al.
    University of Central Florida.
    Ghazzai, Hakim
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Yuksel, M.
    University of Central Florida.
    Kadri, A.
    Qatar Mobility Innovations Center (QMIC), Qatar University.
    Kamal, A. E.
    Iowa State University (ISU), Ames.
    Trajectory optimization for multiple UAVs acting as wireless relays2018Inngår i: 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings, IEEE, 2018, s. 1-6Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper proposes a novel wireless relay selection scheme involving multiple mobile Unmanned Aerial Vehicles (UAVs) to support communicating ground users. The goal is to optimize the transmit power levels and trajectories of the relaying UAVs in order to maximize the data rate transmission of the ground users which are suffering from the absence of direct link. Assuming that each UAV is initially characterized by a predefined trajectory for a primary task, we propose to modify it whenever it is needed and the energy and trajectory boundaries constraints allow. We propose to solve this problem using an iterative two steps solution; first, a Mixed Integer Linear Programming (MILP) problem is formulated to optimally determine the users- UAVs associations and the UAVs' corresponding transmit power levels. In the second step, an efficient algorithm based on a recursive shrink-and-realign process is proposed to optimize the UAV trajectories. The performance of the proposed method shows advantages in terms of average throughput compared to the predefined trajectories solution.

  • 57. Andersson, Carin
    et al.
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Survey and Analysis of Project Management Competence within Research Projects at Karlstad University2007Annet (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    Research at universities is today often conducted as projects. This is especially true in the engineering, natural science, medicine, and social science disciplines. Research projects are typically carried out by different categories of employers, such as professors, associate professors, assistant professors, and PhD students. These projects are typically managed by the person that applied for the project money, or the person that is the most experienced researcher at the department, which is often a professor or associate professor. From such leading persons, miracles are expected. Except acting as project managers, they are also engaged in many other parallel activities, e.g., supervision of PhD students, undergraduate and graduate education, conference organization and administration, project application writing, and representing the department internally as well as externally.



    In this report, a survey of project management competence within research projects at Karlstad University is presented. Empirical data have been gathered through two questionnaires and six complementary interviews. Professors and associate professors as well as PhD students have participated in the study. The survey shows that the active project managers have learned to lead projects based on experience and very few project managers have a formal leadership education. This implies that long established project management methods and tools are seldom used.



    Based on the outcome from the survey and our own observations, four concrete activities to improve project management skills are proposed in the report. The first activity is to provide a suitable and well-balanced course in project management methods that is offered to both active and future project managers. The second activity is to establish experience networks among active project mangers at Karlstad University. The third activity is to create a mentor program for new project managers. The fourth activity is to establish a group of experienced project managers that can assist in and give support to ongoing and planned projects.

  • 58. Andersson, Christer
    Design and Evaluation of anonymity Solutions for Mobile Networks2008Doktoravhandling, monografi (Annet vitenskapelig)
  • 59.
    Andersson, Christer
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Design and Evaluation of Anonymity Solutions for Mobile Networks2007Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

    Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

    Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

  • 60.
    Andersson, Christer
    Karlstads universitet, Institutionen för informationsteknologi.
    Enhancing Privacy for Mobile Networks: Examples of Anonymity Solutions and Their Analysis2005Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.

    One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.

    This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation

    and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc

    networks, a required building block for ambient intelligence.

  • 61. Andersson, Christer
    Enhancing Privacy in Mobile Networks: Anonymity Solutions and Their Analysis2005Licentiatavhandling, monografi (Annet vitenskapelig)
  • 62.
    Andersson, Christer
    et al.
    Karlstads universitet, Institutionen för informationsteknologi.
    Camenisch, Jan
    IBM Zurich Research Laboratory, Switzerland.
    Crane, Stephen
    Hewlett-Packard Laboratories, UK.
    Fischer-Hübner, Simone
    Karlstads universitet, Institutionen för informationsteknologi.
    Leenes, Ronald
    Tilburg University, the Netherlands.
    Pearson, Siani
    Hewlett-Packard Laboratories, UK.
    Pettersson, John Sören
    Karlstads universitet, Institutionen för informationsteknologi.
    Sommer, Dieter
    IBM Zurich Research Laboratory, Switzerland.
    Trust in PRIME2005Inngår i: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, s. 552-559Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

  • 63. Andersson, Christer
    et al.
    Fischer Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Lundin, Reine
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Enabling anonymity for the mobile Internet using the mCrowds system2004Inngår i: Risk and Challenges of the Network Society: Proceedings of the Second IFIP WG 9.2, 9.6/11.6, 11.7 International Summer School / [ed] Penny Duquenoy, Simone Fischer-Hübner, Jan Holvast, and Albin Zuccato, Karlstad University Press, 2004, s. 178-189Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    The mobile Internet is a fast growing technology that introduces new privacy risks. We argue that, since privacy legislation alone is not sufficient to protect the users privacy, technical solutions to enhanceinformational privacy of individuals are also needed. This paper introduces mCrowds, a privacy-enhancing technology that combines the concept of a crowd system in a mobile Internet setting with a filteringfunctionality to enable anonymity towards the content providers

  • 64.
    Andersson, Christer
    et al.
    Karlstads universitet, Institutionen för informationsteknologi.
    Fischer-Huebner, Simone
    Karlstads universitet, Institutionen för informationsteknologi.
    Lundin, Reine
    Karlstads universitet, Institutionen för informationsteknologi.
    Enabling Anonymity for the Mobile Internet Using the mCrowds System2003Inngår i: Risk and Challenges of the Network Society: Proceedings of the IFIP WG 9.2, 9.6/11.7 Summer School 4-8 August 2003. / [ed] Penny Duquennoy, Simone Fischer-Hübner, Jan Holvast & Albin Zuccato, Karlstad: Karlstads universitet , 2003Konferansepaper (Fagfellevurdert)
  • 65.
    Andersson, Christer
    et al.
    Karlstads universitet, Institutionen för informationsteknologi.
    Fischer-Hübner, Simone
    Karlstads universitet, Institutionen för informationsteknologi. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Lundin, Reine
    Karlstads universitet, Institutionen för informationsteknologi. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    mCrowds: Anonymity for the Mobile Internet2003Inngår i: HumanIT 2003, Karlstad: Karlstad University Press, 2003, s. 79-92Kapittel i bok, del av antologi (Fagfellevurdert)
  • 66. Andersson, Christer
    et al.
    Kohlweiss, Markulf
    Martucci, Leonardo
    Panchenko, Andryi
    A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup2008Konferansepaper (Fagfellevurdert)
    Abstract [en]

    An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a Sybil attack. We present a solution to this problem that does

    not require online communication with a trusted third party and that in addition preserves the privacy of honest users. Given an initial so-called Sybil-free identity domain, our proposal can be used for deriving Sybil-free unlinkable pseudonyms associated with other identity domains. The pseudonyms are self-certified and computed by the users themselves from their cryptographic long-term identities

  • 67. Andersson, Christer
    et al.
    Lundin, Reine
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    On the Fundamentals of Anonymity Metrics2007Inngår i: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, 2007Konferansepaper (Fagfellevurdert)
  • 68. Andersson, Christer
    et al.
    Lundin, Reine
    On the Fundamentals of Anonymity Metrics2008Inngår i: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10 2007 / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, Springer-Verlag New York, 2008, s. 325-341Kapittel i bok, del av antologi (Fagfellevurdert)
  • 69.
    Andersson, Christer
    et al.
    Karlstads universitet, Institutionen för informationsteknologi.
    Lundin, Reine
    Karlstads universitet, Institutionen för informationsteknologi.
    Fischer-Hübner, Simone
    Karlstads universitet, Institutionen för informationsteknologi.
    Privacy-Enhanced WAP Browsing with mCrowds: Anonymity Properties and Performance Evaluation of the mCrowds System2004Konferansepaper (Fagfellevurdert)
  • 70.
    Andersson, Christer
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Martucci, Leonardo A.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Fischer-Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Privacy & Anonymity in Mobile Ad Hoc Networks2008Inngår i: Handbook of Research on Wireless Security / [ed] Yan Zhang, Jun Zheng & Miao Ma, IGI Global , 2008Kapittel i bok, del av antologi (Annet vitenskapelig)
  • 71. Andersson, Christer
    et al.
    Martucci, Leonardo A.
    Fischer-Hübner, Simone
    Requirements for Privacy in Mobile Ad Hoc Networks2005Konferansepaper (Fagfellevurdert)
  • 72. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Privacy and Anonymity in Mobile Ad Hoc Networks2008Inngår i: Mobile Computing: Concepts, Methodologies, Tools, and Applications / [ed] David Taniar, Information Science Reference , 2008Kapittel i bok, del av antologi (Fagfellevurdert)
  • 73. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Privacy Requirements for Mobile Ad Hoc Networks2005Konferansepaper (Fagfellevurdert)
  • 74.
    Andersson, David
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.

     

    Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då privatpersoner troligen kommer att vara bland de sista som erbjuds IPv6 direkt från sin Internetleverantör.

  • 75.
    Andersson, Henrik
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Oreland, Peter
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    City Mobility Model with Google Earth Visualization2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Mobile Ad Hoc Networks are flexible, self configuring networks that do not need a fixed infrastructure. When these nets are simulated, mobility models can be used to specify node movements. The work in this thesis focuses on designing an extension of the random trip

    mobility model on a city section from EPFL (Swiss federal institute of technology). Road data is extracted from the census TIGER database, displayed in Google Earth and used as input for the model. This model produces output that can be used in the open source network simulator ns-2.

    We created utilities that take output from a database of US counties, the TIGER database, and convert it to KML. KML is an XML based format used by Google Earth to store geographical data, so that it can be viewed in Google Earth. This data will then be used as input to the modified mobility model and finally run through the ns-2 simulator. We present some NAM traces, a network animator that will show node movements over time.

    We managed to complete most of the goals we set out, apart from being able to modify node positions in Google Earth. This was skipped because the model we modified had an initialization phase that made node positions random regardless of initial position. We were also asked to add the ability to set stationary nodes in Google Earth; this was not added due to time constraints.

  • 76.
    Andersson, Jan-Olof
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Larsson, Samuel
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Tobias, Sjöholm
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Implementation of the NEAT Policy Manager2019Rapport (Fagfellevurdert)
    Abstract [en]

    The NEAT system was developed in 2017 to increase flexibility in the choice of network transport protocol being used. One of the most important components of the NEAT system is the Policy Manager (PM), which determines what protocol is to be utilized by the application. The PM is written in Python while the rest of the NEAT system is C-based, so a natural evolution of the PM is to perform a functional translation of it to C. While the main goal was solely to develop a fully functional C-based PM, the difference in programming languages in the end also brought a performance increase of 28 times compared with the Python-based PM. There are still a few improvements left to do in the PM, but it is already a notable improvement for the NEAT system as a whole.

  • 77.
    Andersson, Kerstin
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    Exact Probability Distribution versus Entropy2014Inngår i: Entropy, ISSN 1099-4300, E-ISSN 1099-4300, Vol. 16, nr 10, s. 5198-5210Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The problem addressed concerns the determination of the average numberof successive attempts of guessing a word of a certain length consisting of letters withgiven probabilities of occurrence. Both first- and second-order approximations to a naturallanguage are considered. The guessing strategy used is guessing words in decreasing orderof probability. When word and alphabet sizes are large, approximations are necessary inorder to estimate the number of guesses. Several kinds of approximations are discusseddemonstrating moderate requirements regarding both memory and central processing unit(CPU) time. When considering realistic sizes of alphabets and words (100), the numberof guesses can be estimated within minutes with reasonable accuracy (a few percent) andmay therefore constitute an alternative to, e.g., various entropy expressions. For manyprobability distributions, the density of the logarithm of probability products is close to anormal distribution. For those cases, it is possible to derive an analytical expression for theaverage number of guesses. The proportion of guesses needed on average compared to thetotal number decreases almost exponentially with the word length. The leading term in anasymptotic expansion can be used to estimate the number of guesses for large word lengths.Comparisons with analytical lower bounds and entropy expressions are also provided.

  • 78.
    Andersson, Mikael
    et al.
    Karlstads universitet, Institutionen för informationsteknologi.
    Nykvist, Conny
    Karlstads universitet, Institutionen för informationsteknologi.
    Utökning av PHP2006Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Detta examensarbete är gjort på uppdrag av ett företag som heter IT Resource AB i Årjäng Värmland.

    Målet med detta examensarbete var att skapa ett API till PHP som skall utöka PHPs funktionalitet. APIet skall förenkla samt effektivisera IT Resource ABs arbete med att utveckla webbapplikationer. Den förenkling samt effektivisering som APIet erbjuder är möjligheten att återanvända funktioner samt att man enkelt kan lägga till nya funktioner i APIet vid behov.

    Den funktionalitet som APIet kommer att tillhandahålla är en förbättrad hantering av variabler och strängar som genereras från en webbsida skriven i PHP. Med en förbättrad hantering menas bland annat att det skall vara möjligt att lagra variabler och strängar från en webbsida skriven i PHP.

    Det skapade APIet består av 2 byggstenar, en klient och en server. Klienten i klient/serversystemet är en extern modul innehållande funktionalitet för kommunikation med både PHP och servern. Detta innebär att klienten i klient/server-systemet kommer att fungera som ett gränssnitt mellan PHP och servern.

    I serverdelen återfinns implementationen av den funktionalitet som APIet erbjuder. Den funktionalitet som implementerats i serverdelen är lagring av variabler och strängar i primärminnet.

    Resultatet av arbetet är ett API som utökar PHPs funktionalitet. Detta API kan utökas ytterligare vid behov och kan med fördel användas av IT Resource AB för utveckling av webbapplikationer i PHP.

  • 79.
    Andersson, Ricky
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013).
    Classification of Video Traffic: An Evaluation of Video Traffic Classification using Random Forests and Gradient Boosted Trees2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Traffic classification is important for Internet providers and other organizations to solve some critical network management problems.The most common methods for traffic classification is Deep Packet Inspection (DPI) and port based classification. These methods are starting to become obsolete as more and more traffic are being encrypted and applications are starting to use dynamic ports and ports of other popular applications. An alternative method for traffic classification uses Machine Learning (ML).This ML method uses statistical features of network traffic flows, which solves the fundamental problems of DPI and port based classification for encrypted flows.The data used in this study is divided into video and non-video traffic flows and the goal of the study is to create a model which can classify video flows accurately in real-time.Previous studies found tree-based algorithms to work well in classifying network traffic. In this study random forest and gradient boosted trees are examined and compared as they are two of the best performing tree-based classification models.Random forest was found to work the best as the classification speed was significantly faster than gradient boosted trees. Over 93% correctly classified flows were achieved while keeping the random forest model small enough to keep fast classification speeds.

  • 80.
    Angulo, Julio
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Usable privacy for digital transactions: Exploring the usability aspects of three privacy enhancing mechanisms2012Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often seen by ordinary users as complicated and disruptive of their primary tasks.

     

    In this licentiate thesis, I investigate the usability aspects of three main privacy and security enhancing mechanisms. These mechanisms have the goal of helping and encouraging users to protect their privacy on the Internet as they engage in some of the steps necessary to complete a digital transaction. The three mechanisms, which have been investigated within the scope of different research projects, comprise of (1) graphical visualizations of service providers’ privacy policies and user-friendly management and matching of users’ privacy preferences “on the fly”, (2) methods for helping users create appropriate mental models of the data minimization property of anonymous credentials, and (3) employing touch-screen biometrics as a method to authenticate users into mobile devices and verify their identities during a digital transaction.

     

    Results from these investigations suggest that these mechanisms can make digital transactions privacy-friendly and secure while at the same time delivering convenience and usability for ordinary users.

  • 81.
    Angulo, Julio
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Fischer-Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Pulls, Tobias
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Wästlund, Erik
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för psykologi.
    Towards Usable Privacy Policy Display & Management2012Inngår i: Information Management & Computer Security, ISSN 0968-5227, Vol. 20, s. 4-17Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper discusses the approach taken within the PrimeLife project for providing user-friendly privacy policy interfaces for the PrimeLife Policy Language (PPL).We present the requirements, design process and usability testing of the “Send Data?” prototype, a browser extension designed and developed to deal with the powerful features provided by PPL. Our interface introduces the novel features of “on the fly” privacy management, predefined levels of privacy settings, and simplified selectionof anonymous credentials. Results from usability tests showed that users understand and appreciate these features and perceive them as being privacy-friendly, and they are therefore suggested as a good approach towards usable privacy policy display and management. Additionally, we present our lessons learnt in the design process of privacy policy interfaces.

  • 82.
    Angulo, Julio
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Wästlund, Erik
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för psykologi.
    Exploring Touch-Screen Biometrics for User Identification on Smart Phones2011Inngår i: Privacy and Identity Managementfor Life: Proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School 2011 / [ed] an Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, and Giovanni Russello, Springer, 2011, s. 130-143Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The use of mobile smart devices for storing sensitive informationand accessing online services is increasing. At the same time, methods for authenticating users into their devices and online services that are not only secure, but also privacy and user-friendly are needed. In this paper, we present our initial explorations of the use of lock pattern dynamics as a secure and user-friendly two-factor authentication method. We developed an application for the Android mobile platform to collect data on the way individuals draw lock patterns on a touchscreen. Using a Random Forest machine learning classier this method achieves an average Equal Error Rate (EER) of approximately 10.39%, meaning that lock patterns biometrics can be used for identifying users towards their device, but could also pose a threat to privacy if the users' biometric information is handled outside their control.

  • 83.
    Angulo, Julio
    et al.
    Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Centrum för HumanIT. Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Handelshögskolan.
    Wästlund, Erik
    Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Institutionen för sociala och psykologiska studier.
    Profiles: prototyping an online information segregation service2013Inngår i: Human-Computer Interaction: Users and Contexts of Use, volume 8006, Proceedings Part III, / [ed] Kurosu, M.,, Springer, 2013Konferansepaper (Fagfellevurdert)
  • 84.
    Angulo, Julio
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Wästlund, Erik
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för psykologi.
    Gullberg, Peter
    Gemalto, Gothenburg.
    Kling, Daniel
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Tavemark, Daniel
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Fischer-Hübner, Simone
    Karlstads universitet, Institutionen för informationsteknologi.
    Understanding the user experience of secure mobile online transactions in realistic contexts of use2012Inngår i: Symposium on Usable Privacy and Security (SOUPS) 2012, Washington D.C.,USA: Association for Computing Machinery (ACM), 2012, s. 8-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Possible attacks on mobile smart devices demand higher security for applications handling payments or sensitive information. The introduction of a tamper-proof area on future generations of mobile devices, called Trusted Execution Environment (TEE), is being implemented. Before devices with embedded TEEs can be deployed to the public, investigations on usability aspects of Trusted User Interfaces (TUI) are needed. This article describes the process we have followed at gathering requirements, prototyping and testing suitable designs for TUIs in combination with a touch-screen biometric system. At the end, we present relevant findings of a pilot study that we have conducted using an Experience Sampling Method (ESM) as part of our ongoing work.

  • 85.
    Arvidsson, Andreas
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    Andreasson, Anders
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    Distributed computing for the public transit domain2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 86.
    Arvidsson, Jonas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Utvärdering av containerbaserad virtualisering för telekomsignalering2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    New and innovative technologies to improve the techniques that are already being used are constantly developing. This project was about evaluating if containers could be something for the IT company Tieto to use on their products in telecommunications. Container are portable, standalone, executable lightweight packages of software that also contains all it needs to run the software. Containers are a very hot topic right now and are a fast-growing technology. Tieto wanted an investigation of the technology and it would be carried out with certain requirements where the main requirement was to have a working and executable protocol stack in a container environment. In the investigation, a proof of concept was developed, proof of concept is a realization of a certain method or idea in order to demonstrate its feasibility. The proof of concept led to Tieto wanting additional experiments carried out on containers. The experiments investigated if equal performance could be achieved with containers compared to the method with virtual machine used by Tieto today. The experiment observed a small performance reduction of efficiency, but it also showed benefits such as higher flexibility. Further development of the container method could provide a just as good and equitable solution. The project can therefore be seen as successful whereas the proof of concept developed, and experiments carried out both points to that this new technology will be part of Tieto's product development in the future.

  • 87.
    Asl, Arsineh Boodaghian
    et al.
    Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Handelshögskolan (from 2013).
    Gokan, Michel
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    AN EMPIRICAL STUDY ON GUI-II INTERVIEW METHODS IN PARTICIPATORY DESIGN2019Inngår i: IADIS (International association for developement of the information society) digital library / [ed] Katherine Blashki and Yingcai Xiao, IADIS Press , 2019, s. 3-10Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Graphical user interface interaction interview (GUI-ii), is a recently purposed method in which designers can remotely co-design and review GUI prototypes by eliminating the need for physical presence of co-designers. However, there are some concerns regarding the accuracy of such remote interview methods, as users do not have any physical interaction with the designers during their interview. In this work, for the first time, we compare GUI-ii methods with the traditional face-to-face interview processes to study their effectiveness in various design phases. The result shows that GUI-ii method is most effective when used in Ozlab.    

  • 88. Aspinall, David
    et al.
    Camenisch, JanHansen, MaritFischer-Hübner, SimoneKarlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).Raab, Charles
    Privacy and Identity Management – Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers2016Collection/Antologi (Fagfellevurdert)
  • 89.
    Asplund, Katarina
    Karlstads universitet, Institutionen för informationsteknologi.
    Implementation and Experimental Evaluation of a Partially Reliable Transport Protocol2004Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    In the last decade, we have seen an explosive growth in the deployment of multimedia applications on the Internet. However, the transport service provided over the Internet is not always feasible for these applications, since the network was originally designed for other types of applications. One way to better accommodate the service requirements of some of these applications is to provide a partially reliable transport service. A partially reliable transport service does not insist on recovering all, but just some of the packet losses, thus providing a lower transport delay than a reliable transport service. The work in this thesis focuses on the design, implementation, and evaluation of a partially reliable transport protocol called PRTP. PRTP has been designed as an extension to TCP in order to show that such a service could be effectively integrated with current protocol standards. An important feature of PRTP is that all modifications for PRTP are restricted to the receiver side, which means that it could be very easily deployed. The thesis presents performance results from various experiments on a Linux implementation of PRTP. The results suggest that transfer times can be decreased significantly when using PRTP as opposed to TCP in networks in which packet loss occurs. Furthermore, the thesis includes a study that investigates how users perceive an application that is based on a partially reliable service. Specifically, how users select the trade-off between image quality and latency when they download Web pages is explored. The results indicate that many of the users in the study could accept less than perfect image quality

    if the latency could be shortened.

  • 90.
    Asplund, Katarina
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Implementation and Experimental Evaluation of aPartially Reliable Transport Protocol2004Licentiatavhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    In the last decade, we have seen an explosive growth in the deployment of multimedia applications on the Internet. However, the transport service provided over the Internet is not always feasible for these applications, since the network was originally designed for other types of applications. One way to better accommodate the service requirements of some of these applications is to provide a partially reliable transport service. A partially reliable transport service does not insist on recovering all, but just some of the packet losses, thus providing a lower transport delay than a reliable transport service. The work in this thesis focuses on the design, implementation, and evaluation of a partially reliable transport protocol called PRTP. PRTP has been designed as an extension to TCP in order to show that such a service could be effectively integrated with current protocol standards. An important feature of

    PRTP is that all modifications for PRTP are restricted to the receiver side, which means that it could be very easily deployed. The thesis presents performance results from various experiments on a Linux implementation of PRTP. The results suggest that transfer times can be decreased significantly when using PRTP as opposed to TCP in networks in which packet loss occurs. Furthermore, the thesis includes a study that investigates how users perceive an application that is based on a partially reliable service. Specifically, how users select the trade-off between image quality and latency when they download Web pages is explored. The results indicate that many of the users in the study could accept less than perfect image quality if the latency could be shortened.

  • 91.
    Asplund, Katarina
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    An Evaluation of User Web Service Requirements2002Konferansepaper (Fagfellevurdert)
  • 92.
    Asplund, Katarina
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Partially Reliable Multimedia Transport2004Rapport (Annet vitenskapelig)
    Abstract [en]

    The ongoing deployment of applications that transmit multimedia data makes it important for the Internet to better accommodate the service requirements of this type of applications. One approach is to provide a partially reliable service, i.e. a service that does not insist on recovering all but only some of the packet losses, thus providing less delay than a reliable transport service. This technical report describes a transport protocol that provides a partially reliable service. The protocol, called PRTP, is especially aimed at applications with soft real-time requirements. The report also presents performance results from a number of different experiments investigating different aspects of PRTP. The results indicate that transfer times can be significantly decreased when using PRTP as opposed to TCP when packets are lost in the network.

  • 93.
    Asplund, Katarina
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    The QoS Trade-off Between Latency and Image Quality on the Web: A User Perspective2002Konferansepaper (Fagfellevurdert)
  • 94.
    Asplund, Katarina
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    The Trade-off Between Latency and Image Quality on the Web: A User Perspective2003Inngår i: / [ed] John Sören Pettersson, 2003Kapittel i bok, del av antologi (Annet vitenskapelig)
  • 95.
    Asplund, Katarina
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Garcia, Johan
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Schneyer, S.
    Decreasing Transfer Delay Through Partial Reliability2000Konferansepaper (Fagfellevurdert)
  • 96.
    Avallone, Stefano
    et al.
    Univ Naples Federico II, Dept Comp Engn, I-80125 Naples, Italy.
    Di Stasi, Giovanni
    Univ Naples Federico II, Dept Comp Engn, I-80125 Naples, Italy.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    A Traffic-Aware Channel and Rate Re-Assignment Algorithm for Wireless Mesh Networks.2013Inngår i: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 12, nr 7, s. 1335-1348Artikkel i tidsskrift (Fagfellevurdert)
  • 97.
    Axelsson, Therese
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Melani, Daniel
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT.
    Hash Comparison Module for OCFA2010Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Child abuse content on the Internet is today an increasing problem and difficult to dealwith. The techniques used by paedophiles are getting more sophisticated which means ittakes more effort of the law enforcement to locate this content.

    To help solving this issue, a EU-funded project named FIVES is developing a set oftools to help investigations involving large amounts of image and video material. One ofthese tools aims to help identifying potentially illegal files by hash signatures derived fromusing classification information from another project.

  • 98.
    Bajpai, Vaibhav
    et al.
    Technical University of Munich, Germany.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Feldmann, Anja
    Max Planck Society, Germany.
    Kellerer, Wolfgang
    Technical University of Munich, Germany.
    Pras, Aiko
    University of Twente, Netherlands .
    Schulzrinne, Henning
    Columbia University, USA.
    Smaragdakis, Georgios
    Technical University of Berlin, Germany.
    Waehlisch, Matthias
    Free University of Berlin, Germany.
    Wehrle, Klaus
    RWTH Aachen University, Germany .
    The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research2019Inngår i: Computer communication review, ISSN 0146-4833, E-ISSN 1943-5819, Vol. 49, nr 1, s. 24-30Artikkel i tidsskrift (Annet vitenskapelig)
    Abstract [en]

    Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.

  • 99.
    Bakar, Sakhinah Abu
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Characterization of essential proteins based on network topology in proteins interaction networks2014Inngår i: Proceedings of the 3rd International Conference on Mathematical Sciences, American Institute of Physics (AIP), 2014, Vol. 1602, s. 36-42Konferansepaper (Fagfellevurdert)
  • 100.
    Bakar, Sakhinah Abu
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    FIS-PNN: A Hybrid Computational Method for Protein-Protein Interactions Prediction Using the Secondary Structure Information2011Inngår i: IEEE/ACS International Conference on Computer Systems and Applications (AICCSA-2011), IEEE conference proceedings, 2011Konferansepaper (Fagfellevurdert)
1234567 51 - 100 of 1100
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf