Change search
Link to record
Permanent link

Direct link
BETA
Maguire Jr., Gerald Q.ORCID iD iconorcid.org/0000-0002-6066-746X
Alternative names
Publications (10 of 299) Show all publications
Bogdanov, K., Reda, W., Kostic, D., Maguire Jr., G. Q. & Canini, M. (2018). Kurma: Fast and Efficient Load Balancing for Geo-Distributed Storage Systems: Evaluation of Convergence and Scalability.
Open this publication in new window or tab >>Kurma: Fast and Efficient Load Balancing for Geo-Distributed Storage Systems: Evaluation of Convergence and Scalability
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This report provides an extended evaluation of Kurma, a practical implementation of a geo-distributed load balancer for backend storage systems. In this report we demonstrate the ability of distributed Kurma instances to accurately converge to the same solutions within 1% of the total datacenter’s capacity and the ability of Kurma to scale up to 8 datacenters using a single CPU core at each datacenter.

National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-222289 (URN)
Note

QR 20180212

Available from: 2018-02-05 Created: 2018-02-05 Last updated: 2018-02-12Bibliographically approved
Roozbeh, A., Soares, J., Maguire Jr., G. Q., Wuhib, F., Padala, C., Mahloo, M., . . . Kostic, D. (2018). Software-Defined "Hardware" Infrastructures: A Survey on Enabling Technologies and Open Research Directions. IEEE Communications Surveys and Tutorials, 20(3), 2454-2485
Open this publication in new window or tab >>Software-Defined "Hardware" Infrastructures: A Survey on Enabling Technologies and Open Research Directions
Show others...
2018 (English)In: IEEE Communications Surveys and Tutorials, ISSN 1553-877X, E-ISSN 1553-877X, Vol. 20, no 3, p. 2454-2485Article in journal (Refereed) Published
Abstract [en]

This paper provides an overview of software-defined "hardware" infrastructures (SDHI). SDHI builds upon the concept of hardware (HW) resource disaggregation. HW resource disaggregation breaks today's physical server-oriented model where the use of a physical resource (e.g., processor or memory) is constrained to a physical server's chassis. SDHI extends the definition of of software-defined infrastructures (SDI) and brings greater modularity, flexibility, and extensibility to cloud infrastructures, thus allowing cloud operators to employ resources more efficiently and allowing applications not to be bounded by the physical infrastructure's layout. This paper aims to be an initial introduction to SDHI and its associated technological advancements. This paper starts with an overview of the cloud domain and puts into perspective some of the most prominent efforts in the area. Then, it presents a set of differentiating use-cases that SDHI enables. Next, we state the fundamentals behind SDI and SDHI, and elaborate why SDHI is of great interest today. Moreover, it provides an overview of the functional architecture of a cloud built on SDHI, exploring how the impact of this transformation goes far beyond the cloud infrastructure level in its impact on platforms, execution environments, and applications. Finally, an in-depth assessment is made of the technologies behind SDHI, the impact of these technologies, and the associated challenges and potential future directions of SDHI.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
CR-software-defined infrastructure, resource disaggregation, cloud infrastructure, rack-scale, hyperscale computing, disaggregated DC
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-235270 (URN)10.1109/COMST.2018.2834731 (DOI)000443030500033 ()2-s2.0-85046804138 (Scopus ID)
Funder
Swedish Foundation for Strategic Research Knut and Alice Wallenberg Foundation
Note

QC 20180919

Available from: 2018-09-19 Created: 2018-09-19 Last updated: 2018-09-19Bibliographically approved
Yalew, S. D., Maguire Jr., G. Q., Haridi, S. & Correia, M. (2017). Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. In: Gkoulalasdivanis, A Correia, MP Avresky, DR (Ed.), 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017: . Paper presented at 16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, United States, 30 October 2017 through 1 November 2017 (pp. 351-358). Institute of Electrical and Electronics Engineers (IEEE), 2017
Open this publication in new window or tab >>Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid
2017 (English)In: 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017 / [ed] Gkoulalasdivanis, A Correia, MP Avresky, DR, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 2017, p. 351-358Conference paper, Published paper (Refereed)
Abstract [en]

The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the dissemination of Android ransomware. Ransomware is a class of malware that makes data inaccessible by blocking access to the device or, more frequently, by encrypting the data; to recover the data, the user has to pay a ransom to the attacker. A solution for this problem is to backup the data. Although backup tools are available for Android, these tools may be compromised or blocked by the ransomware itself. This paper presents the design and implementation of RANSOMSAFEDROID, a TrustZone based backup service for mobile devices. RANSOMSAFEDROID is protected from malware by leveraging the ARM TrustZone extension and running in the secure world. It does backup of files periodically to a secure local persistent partition and pushes these backups to external storage to protect them from ransomware. Initially, RANSOMSAFEDROID does a full backup of the device filesystem, then it does incremental backups that save the changes since the last backup. As a proof-of-concept, we implemented a RANSOMSAFEDROID prototype and provide a performance evaluation using an i.MX53 development board.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-225237 (URN)10.1109/NCA.2017.8171377 (DOI)000426971900053 ()2-s2.0-85046532213 (Scopus ID)9781538614655 (ISBN)
Conference
16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, United States, 30 October 2017 through 1 November 2017
Note

QC 20180403

Available from: 2018-04-03 Created: 2018-04-03 Last updated: 2018-05-22Bibliographically approved
Yalew, S. D., Mendonca, P., Maguire Jr., G. Q., Haridi, S. & Correia, M. (2017). TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. In: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB): . Paper presented at 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), OCT 09-11, 2017, Rome, ITALY (pp. 791-799). IEEE
Open this publication in new window or tab >>TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps
Show others...
2017 (English)In: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2017, p. 791-799Conference paper, Published paper (Refereed)
Abstract [en]

In less than a decade, mobile apps became an integral part of our lives. In several situations it is important to provide assurance that a mobile app is authentic, i.e., that it is indeed the app produced by a certain company. However, this is challenging, as such apps can be repackaged, the user malicious, or the app tampered with by an attacker. This paper presents the design of TRUAPP, a software authentication service that provides assurance of the authenticity and integrity of apps running on mobile devices. TRUAPP provides such assurance, even if the operating system is compromised, by leveraging the ARM TrustZone hardware security extension. TRUAPP uses a set of techniques (static watermarking, dynamic watermarking, and cryptographic hashes) to verify the integrity of the apps. The service was implemented in a hardware board that emulates a mobile device, which was used to do a thorough experimental evaluation of the service.

Place, publisher, year, edition, pages
IEEE, 2017
Series
IEEE International Conference on Wireless and Mobile Computing Networking and Communications-WiMOB, ISSN 2160-4886
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-222218 (URN)000419818000108 ()978-1-5386-3839-2 (ISBN)
Conference
13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), OCT 09-11, 2017, Rome, ITALY
Note

QC 20180205

Available from: 2018-02-05 Created: 2018-02-05 Last updated: 2018-03-07Bibliographically approved
Olivecrona, H., Maguire, G. Q. ., Noz, M. E., Zeleznik, M. P., Kesteris, U. & Weidenhielm, L. (2016). A CT method for following patients with both prosthetic replacement and implanted tantalum beads: preliminary analysis with a pelvic model and in seven patients. Journal of Orthopaedic Surgery and Research, 11, Article ID 27.
Open this publication in new window or tab >>A CT method for following patients with both prosthetic replacement and implanted tantalum beads: preliminary analysis with a pelvic model and in seven patients
Show others...
2016 (English)In: Journal of Orthopaedic Surgery and Research, ISSN 1749-799X, E-ISSN 1749-799X, Vol. 11, article id 27Article in journal (Refereed) Published
Abstract [en]

Background: Radiostereometric analysis (RSA) is often used for evaluating implanted devices over time. Following patients who have had tantalum beads implanted as markers in conjunction with joint replacements is important for longitudinal evaluation of these patients and for those with similar implants. As doing traditional RSA imaging is exacting and limited to specialized centers, it is important to consider alternative techniques for this ongoing evaluation. This paper studies the use of computed tomography (CT) to evaluate over time tantalum beads which have been implanted as markers. Methods: The project uses both a hip model implanted with tantalum beads, acquired in several orientations, at two different CT energy levels, and a cohort of seven patients. The model was evaluated twice by the same observer with a 1-week interval. All CT volumes were analyzed using a semi-automated 3D volume fusion (spatial registration) tool which provides landmark-based fusion of two volumes, registering a target volume with a reference volume using a rigid body 3D algorithm. The mean registration errors as well as the accuracy and repeatability of the method were evaluated. Results: The mean registration error, maximum value of repeatability, and accuracy for the relative movement in the model were 0.16 mm, 0.02 degrees and 0.1 mm, and 0.36 degrees and 0.13 mm for 120 kVp and 0.21 mm, 0.04 degrees and 0.01 mm, and 0.39 degrees and 0.12 mm for 100 kVp. For the patients, the mean registration errors per patient ranged from 0.08 to 0.35 mm. These results are comparable to those in typical clinical RSA trials. This technique successfully evaluated two patients who would have been lost from the cohort if only RSA were used. Conclusions: The proposed technique can be used to evaluate patients with tantalum beads over time without the need for stereoradiographs. Further, the effective dose associated with CT is decreasing.

Place, publisher, year, edition, pages
BioMed Central, 2016
Keywords
Radiostereometry, Longitudinal studies, CT analysis, RSA
National Category
Medical Image Processing
Identifiers
urn:nbn:se:kth:diva-183622 (URN)10.1186/s13018-016-0360-7 (DOI)000370777100001 ()2-s2.0-84959129104 (Scopus ID)
Note

QC 20160319

Available from: 2016-03-19 Created: 2016-03-18 Last updated: 2017-11-30Bibliographically approved
Brodén, C., Olivecrona, H., Maguire Jr., G. Q., Noz, M. E., Zeleznik, M. P. & Sköldenberg, O. (2016). Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study. BioMed Research International, Article ID 5909741.
Open this publication in new window or tab >>Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study
Show others...
2016 (English)In: BioMed Research International, ISSN 2314-6133, E-ISSN 2314-6141, article id 5909741Article in journal (Refereed) Published
Abstract [en]

Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty.

Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated.

Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv.

Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting.

Place, publisher, year, edition, pages
Hindawi Publishing Corporation, 2016
National Category
Orthopaedics Radiology, Nuclear Medicine and Medical Imaging
Identifiers
urn:nbn:se:kth:diva-189725 (URN)10.1155/2016/5909741 (DOI)
Available from: 2016-07-11 Created: 2016-07-11 Last updated: 2018-01-10Bibliographically approved
Kim, Y. S., Maguire Jr., G. Q. & Noz, M. E. (2016). Do Small-Mass Neutrinos Participate in Gauge Transformations?. Advances in High Energy Physics, 1-7, Article ID 1847620.
Open this publication in new window or tab >>Do Small-Mass Neutrinos Participate in Gauge Transformations?
2016 (English)In: Advances in High Energy Physics, ISSN 1687-7357, E-ISSN 1687-7365, p. 1-7, article id 1847620Article in journal (Refereed) Published
Abstract [en]

Neutrino oscillation experiments presently suggest that neutrinos have a small but finite mass. If neutrinos have mass, there should be a Lorentz frame in which they can be brought to rest. This paper discusses how Wigner’s little groups can be used to distinguish between massive and massless particles. We derive a representation of the SL(2,c) group which separates out the two sets of spinors: one set is gauge dependent and the other set is gauge invariant and represents polarized neutrinos. We show that a similar calculation can be done for the Dirac equation. In the large-momentum/zero-mass limit, the Dirac spinors can be separated into large and small components. The large components are gauge invariant, while the small components are not. These small components represent spin-1/2 non-zero-mass particles. If we renormalize the large components, these gauge invariant spinors represent the polarization of neutrinos. Massive neutrinos cannot be invariant under gauge transformations.

Place, publisher, year, edition, pages
Hindawi Publishing Corporation, 2016
National Category
Subatomic Physics
Identifiers
urn:nbn:se:kth:diva-189756 (URN)10.1155/2016/1847620 (DOI)2-s2.0-84979656442 (Scopus ID)
Note

QC 20160713

Available from: 2016-07-13 Created: 2016-07-13 Last updated: 2017-11-28Bibliographically approved
Yalew, S. D., Maguire Jr., G. Q. & Correia, M. (2016). Light-SPD: a platform to prototype secure mobile applications. In: Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO '16): . Paper presented at 1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO '16) (pp. 11-20). New York, NY, USA: Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Light-SPD: a platform to prototype secure mobile applications
2016 (English)In: Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO '16), New York, NY, USA: Association for Computing Machinery (ACM), 2016, p. 11-20Conference paper, Published paper (Refereed)
Abstract [en]

Securely storing sensitive personal data is critical for protecting privacy. Currently, many persons use smartphones to store their private data. However, smartphones suffer from many security issues. To overcome this situation, the PCAS project is designing a secure personal storage device called the Secure Portable Device (SPD), to be attached to a smartphone for securely storing sensitive personal data. However, this device is unavailable, closed, and expensive to deploy for prototyping applications. We propose a platform that emulates the SPD and the smartphone using a board with an ARM processor with the TrustZone security extension. This platform is open, inexpensive, and secure. A payment application is used as an example to show the platform's capabilities. As a proof-of-concept, we implemented this platform and provide a performance evaluation using a i.MX53 board.

Place, publisher, year, edition, pages
New York, NY, USA: Association for Computing Machinery (ACM), 2016
Keywords
Mobile Computing, Privacy, Hardware Security, Trusted Computing, ARM TrustZone
National Category
Communication Systems Computer Systems
Identifiers
urn:nbn:se:kth:diva-189742 (URN)10.1145/2940343.2940349 (DOI)978-1-4503-4346-6 (ISBN)
Conference
1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO '16)
Note

QC 20160719

Available from: 2016-07-12 Created: 2016-07-12 Last updated: 2016-07-19Bibliographically approved
Svedmark, P., Berg, S., Noz, M. E., Maguire Jr., G. Q., Zeleznik, M. P., Weidenhielm, L., . . . Olivecrona, H. (2015). A New CT Method for Assessing 3D Movements in Lumbar Facet Joints and Vertebrae in Patients before and after TDR. BioMed Research International, 2015, 1-9, Article ID 260703.
Open this publication in new window or tab >>A New CT Method for Assessing 3D Movements in Lumbar Facet Joints and Vertebrae in Patients before and after TDR
Show others...
2015 (English)In: BioMed Research International, ISSN 2314-6133, Vol. 2015, p. 1-9, article id 260703Article in journal (Refereed) Published
Abstract [en]

This study describes a 3D-CT method for analyzing facet joint motion and vertebral rotation in the lumbar spine after TDR. Ten patients were examined before and then three years after surgery, each time with two CT scans: provoked flexion and provoked extension. After 3D registration, the facet joint 3D translation and segmental vertebral 3D rotation were analyzed at the operated level (L5-S1) and adjacent level (L4-L5). Pain was evaluated using VAS. The median (±SD) 3D movement in the operated level for the left facet joint was 3.2 mm (±1.9 mm) before and 3.5 mm (±1.7 mm) after surgery and for the right facet joint was 3.0 mm (±1.0 mm) before and 3.6 mm (±1.4 mm) after surgery. The median vertebral rotation in the sagittal plane at the operated level was 5.4° (±2.3°) before surgery and 6.8° (±1.7°) after surgery and in the adjacent level was 7.7° (±4.0°) before and 9.2° (±2.7°) after surgery. The median VAS was reduced from 6 (range 5–8) to 3 (range 2–8) in extension and from 4 (range 2–6) to 2 (range 1–3) in flexion.

National Category
Orthopaedics Radiology, Nuclear Medicine and Medical Imaging
Identifiers
urn:nbn:se:kth:diva-176268 (URN)10.1155/2015/260703 (DOI)2-s2.0-84947475183 (Scopus ID)
Note

QC 20151102

Available from: 2015-11-02 Created: 2015-11-02 Last updated: 2018-01-10Bibliographically approved
Lee, S., Noz, M. E. & Maguire Jr., G. Q. (2015). Dynamic PET visualization of bone remodeling using NaF-18. Stockholm: KTH Royal Institute of Technology
Open this publication in new window or tab >>Dynamic PET visualization of bone remodeling using NaF-18
2015 (English)Report (Other academic)
Abstract [en]

Positron emission tomography (PET) studies acquired in list mode offer the opportunity to provide a cine loop showing the dynamics of 18F- PET uptake, giving a visualization of regional bone remodeling. The focus of this report is a group of patients treated with Taylor spatial frames (TSF). The studies were acquired for a period of 45 minutes and saved in list mode. The list was decoded and subsequently segmented into time intervals of one minute each. For each time interval a sinogram was generated from which volumes of one minute each were reconstructed. Slices projected from these volumes could then be displayed as a dynamic loop superimposed on the corresponding computed tomography (CT) slice in order to visualize the 18F- uptake insitu. It was indicated that this technique has the potential of becoming an additional technique to that of using static volumes and SUV values only.

As the list mode data was decoded it also offered a method to evaluate the potential decrease in injected activity by eliminating every Nth event from the list before reconstructing the 45 minute volume. This was done and the indication was that the injected activity and hence the effective dose to the patient can be decreased. However, in this work, this was not proven clinically.

The open source STIR software was used to reconstruct volumes from sinograms to enable an unlimited access to reconstructing volumes without disturbing the daily routine at the clinic. The data was acquired on a clinical Siemens Medical Solutions Biograph 64 TruePoint TrueV, PET/CT scanner situated at the Nuclear Medicine Department at the Karolinska University Hospital in Solna. This scanner was not supported by the STIR software, hence the data collected by the Siemens PET/CT scanner was translated so that 3D reconstructions could be computed using the STIR tools. The reconstructions made in STIR resulted in volumes of sufficient visual quality, but not as good as those reconstructed by the scanner itself. Further optimization in STIR was left for future work.

According to the physicians who treat these patients, dynamic visualization was of sufficient interest to continue to develop and optimize this method. The cine loops that were presented to the physicians were made from JPEG slices produced from the one minute volumes and put together as GIF files. It was also possible to vary the reconstruction time (from uniformly one minute) as well as the presentation rate in the cine loop, but this was left for future work. Ultimately, the cine loop will be implemented in the locally developed software tool.

Abstract [sv]

Positronemissionstomografi (PET) studier som förvärvats i list mode erbjuder möjligheten att göra film slingor som visar dynamiken i 18F- PET upptag. Detta förväntas ge en dynamisk visualisering av var ben nybildas. Fokus i denna rapport är en grupp patienter som behandlats med Taylor spatial frames (TSF). Bilderna i studien förvärvades under en period av 45 minuter och sparades i list mode. List mode data avkodades och delades därefter upp i tidsintervaller på en minut vardera. För varje tidsintervall rekonstruerades ett sinogram för vilka bilder av volymen rekonstruerades. Skivor från dessa volymer kan sedan visas som en dynamisk slinga ovanpå motsvarande datortomografi (CT) skiva för att visualisera 18F- upptaget in situ. Denna teknik visade sig ha potential att bli en ytterligare teknik utöver de statiska volymer och SUV-värden som redan finns tillgängliga.

Eftersom listmode data avkodats erbjuds också en metod för att utvärdera en potentiell minskning av den injicerade aktivitet genom att eliminera varje N: te händelse från listan innan volymen på 45 minuter rekonstrueras. Detta utfördes och det visade sig att den injicerade aktiviteten och därmed den effektiva dosen till patienten potentiellt kan minskas men i detta arbete har detta inte bevisats kliniskt.

Mjukvaran STIR, som är tillgängligt för allmänheten, användes för att rekonstruera volymer från sinogram för att möjliggöra en obegränsad tillgång till att rekonstruera volymer utan att störa den dagliga rutinen på kliniken. Data förvärvades i en klinisk Siemens Medical Solutions Biograph 64 TruePoint TrueV, PET/CT-skanner som är placerad vid nuklearmedicinska avdelningen vid Karolinska Universitetssjukhuset i Solna. Skannern var inte kompatibel med STIR mjukvaran. Därför översattes det data som samlats in av Siemens PET/CT-skannern så att 3D-rekonstruktioner kan beräknas med hjälp av verktygen i STIR. De rekonstruktioner som gjorts i STIR gav upphov till volymer av tillräcklig visuell kvalitet för denna studie, men var inte lika bra som de som rekonstrueras genom själva skannern. Ytterligare optimering i STIR lämnades för framtida arbete.

Enligt de läkare som behandlar dessa patienter var en dynamisk visualisering av tillräckligt intresse att fortsätta utveckla och optimera den här metoden. Film slingor som presenterades för läkarna gjordes från JPEG bilder tagna från skivor av volymer på en minut vardera som producerats och sattes ihop som GIF-filer. Det var också möjligt att variera återuppbyggnadstiden (från jämnt en minut) samt presentationshastigheten i film slingan, men detta lämnades till framtida arbetet. I slutändan kommer film slingan implementeras i ett lokalt utvecklat verktyg.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2015. p. xvii,131
Series
TRITA-ICT ; 2015:24
Keywords
PET, Image Reconstruction, Dynamic Visualization, List Mode, STIR, PET, Bildrekonstruktion, Dynamisk visualisering, List mode, STIR
National Category
Radiology, Nuclear Medicine and Medical Imaging
Identifiers
urn:nbn:se:kth:diva-176272 (URN)
Note

QC 20151102

Available from: 2015-11-02 Created: 2015-11-02 Last updated: 2015-11-17Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6066-746X

Search in DiVA

Show all publications