kth.sePublications
Change search
Refine search result
1234567 1 - 50 of 316
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abid, Muhammad Zeeshan
    KTH, School of Information and Communication Technology (ICT). Technische Universität Braunschweig.
    A Multi-leader Approach to Byzantine Fault Tolerance: Achieving Higher Throughput Using Concurrent Consensus2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Byzantine Fault Tolerant protocols are complicated and hard to implement.Today’s software industry is reluctant to adopt these protocols because of thehigh overhead of message exchange in the agreement phase and the high resourceconsumption necessary to tolerate faults (as 3 f + 1 replicas are required totolerate f faults). Moreover, total ordering of messages is needed by mostclassical protocols to provide strong consistency in both agreement and executionphases. Research has improved throughput of the execution phase by introducingconcurrency using modern multicore infrastructures in recent years. However,improvements to the agreement phase remains an open area.

    Byzantine Fault Tolerant systems use State Machine Replication to tolerate awide range of faults. The approach uses leader based consensus algorithms for thedeterministic execution of service on all replicas to make sure all correct replicasreach same state. For this purpose, several algorithms have been proposed toprovide total ordering of messages through an elected leader. Usually, a singleleader is considered to be a bottleneck as it cannot provide the desired throughputfor real-time software services. In order to achieve a higher throughput there is aneed for a solution which can execute multiple consensus rounds concurrently.

    We present a solution that enables multiple consensus rounds in parallel bychoosing multiple leaders. By enabling concurrent consensus, our approach canexecute several requests in parallel. In our approach we incorporate applicationspecific knowledge to split the total order of events into multiple partial orderswhich are causally consistent in order to ensure safety. Furthermore, a dependencycheck is required for every client request before it is assigned to a particular leaderfor agreement. This methodology relies on optimistic prediction of dependenciesto provide higher throughput. We also propose a solution to correct the course ofexecution without rollbacking if dependencies were wrongly predicted.

    Our evaluation shows that in normal cases this approach can achieve upto 100% higher throughput than conventional approaches for large numbers ofclients. We also show that this approach has the potential to perform better incomplex scenarios

    Download full text (pdf)
    Thesis_Zeeshan_Abid_20150701-Final.pdf
  • 2.
    Abraham, Mark James
    et al.
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Apostolov, Rossen
    KTH, School of Electrical Engineering and Computer Science (EECS), Centres, Centre for High Performance Computing, PDC.
    Barnoud, Jonathan
    Univ Groningen, NL-9712 CP Groningen, Netherlands.;Univ Bristol, Intangible Real Lab, Bristol, Avon, England..
    Bauer, Paul
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Blau, Christian
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Bonvin, Alexandre M. J. J.
    Univ Utrecht, Bijvoet Ctr, Fac Sci, Utrecht, Netherlands..
    Chavent, Matthieu
    Univ Paul Sabatier, IPBS, F-31062 Toulouse, France..
    Chodera, John
    Mem Sloan Kettering Canc Ctr, Sloan Kettering Inst, Computat & Syst Biol Program, New York, NY 10065 USA..
    Condic-Jurkic, Karmen
    Mem Sloan Kettering Canc Ctr, Sloan Kettering Inst, Computat & Syst Biol Program, New York, NY 10065 USA.;Open Force Field Consortium, La Jolla, CA USA..
    Delemotte, Lucie
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Grubmueller, Helmut
    Max Planck Inst Biophys Chem, D-37077 Gottingen, Germany..
    Howard, Rebecca
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Jordan, E. Joseph
    Stockholm Univ, Dept Biochem & Biophys, Sci Life Lab, Box 1031, SE-17121 Solna, Sweden..
    Lindahl, Erik
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Ollila, O. H. Samuli
    Univ Helsinki, Inst Biotechnol, SF-00100 Helsinki, Finland..
    Selent, Jana
    Pompeu Fabra Univ, Hosp del Mar Med Res Inst IMIM, Res Programme Biomed Informat, Barcelona 08002, Spain.;Pompeu Fabra Univ, Dept Expt & Hlth Sci, Barcelona 08002, Spain..
    Smith, Daniel G. A.
    Mol Sci Software Inst, Blacksburg, VA 24060 USA..
    Stansfeld, Phillip J.
    Univ Oxford, Dept Biochem, Oxford OX1 2JD, England.;Univ Warwick, Sch Life Sci, Coventry CV4 7AL, W Midlands, England.;Univ Warwick, Dept Chem, Coventry CV4 7AL, W Midlands, England..
    Tiemann, Johanna K. S.
    Univ Leipzig, Fac Med, Inst Med Phys & Biophys, D-04107 Leipzig, Germany..
    Trellet, Mikael
    Univ Utrecht, Bijvoet Ctr, Fac Sci, Utrecht, Netherlands..
    Woods, Christopher
    Univ Bristol, Bristol BS8 1TH, Avon, England..
    Zhmurov, Artem
    KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Sharing Data from Molecular Simulations2019In: Journal of Chemical Information and Modeling, ISSN 1549-9596, E-ISSN 1549-960X, Vol. 59, no 10, p. 4093-4099Article in journal (Refereed)
    Abstract [en]

    Given the need for modern researchers to produce open, reproducible scientific output, the lack of standards and best practices for sharing data and workflows used to produce and analyze molecular dynamics (MD) simulations has become an important issue in the field. There are now multiple well-established packages to perform molecular dynamics simulations, often highly tuned for exploiting specific classes of hardware, each with strong communities surrounding them, but with very limited interoperability/transferability options. Thus, the choice of the software package often dictates the workflow for both simulation production and analysis. The level of detail in documenting the workflows and analysis code varies greatly in published work, hindering reproducibility of the reported results and the ability for other researchers to build on these studies. An increasing number of researchers are motivated to make their data available, but many challenges remain in order to effectively share and reuse simulation data. To discuss these and other issues related to best practices in the field in general, we organized a workshop in November 2018 (https://bioexcel.eu/events/workshop-on-sharing-data-from-molecular-simulations/). Here, we present a brief overview of this workshop and topics discussed. We hope this effort will spark further conversation in the MD community to pave the way toward more open, interoperable, and reproducible outputs coming from research studies using MD simulations.

  • 3. Ahmadpanah, M. M.
    et al.
    Balliu, Musard
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Hedin, D.
    Olsson, L. E.
    Sabelfeld, A.
    Securing Node-RED Applications2021In: Protocols, Strands, and LogicEssays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, Springer Science and Business Media Deutschland GmbH , 2021, p. 1-21Conference paper (Refereed)
    Abstract [en]

    Trigger-Action Platforms (TAPs) play a vital role in fulfilling the promise of the Internet of Things (IoT) by seamlessly connecting otherwise unconnected devices and services. While enabling novel and exciting applications across a variety of services, security and privacy issues must be taken into consideration because TAPs essentially act as persons-in-the-middle between trigger and action services. The issue is further aggravated since the triggers and actions on TAPs are mostly provided by third parties extending the trust beyond the platform providers. Node-RED, an open-source JavaScript-driven TAP, provides the opportunity for users to effortlessly employ and link nodes via a graphical user interface. Being built upon Node.js, third-party developers can extend the platform’s functionality through publishing nodes and their wirings, known as flows. This paper proposes an essential model for Node-RED, suitable to reason about nodes and flows, be they benign, vulnerable, or malicious. We expand on attacks discovered in recent work, ranging from exfiltrating data from unsuspecting users to taking over the entire platform by misusing sensitive APIs within nodes. We present a formalization of a runtime monitoring framework for a core language that soundly and transparently enforces fine-grained allowlist policies at module-, API-, value-, and context-level. We introduce the monitoring framework for Node-RED that isolates nodes while permitting them to communicate via well-defined API calls complying with the policy specified for each node.

  • 4.
    Ahmed, Redve
    KTH, School of Engineering Sciences in Chemistry, Biotechnology and Health (CBH), Biomedical Engineering and Health Systems, Health Informatics and Logistics.
    Migration from Manual to Automatic Regression Testing: Best practices for Salesforce Test Automation2023Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The goal of this thesis is to explore the possibility on if it is possible to automate regression testing for a SaaS application with a serverless approach. The thesis covers the fundamentals of the software development lifecycle, cloud concepts, different types of testing frameworks, and SaaS applications. The report researches various testing tools that can be used in accordance with Polestar’s needs. The testing framework must run the existing tests and deliver the results of the tests. The system must be able to coexist with the testing strategy that is in place today. The result is a testing framework that can run a number of selected tests on the SaaS application Salesforce. The system was deployed with serverless docker containers through Amazon Web Services. The report also covers what a future implementation can look like and potential improvements. 

    Download full text (pdf)
    Migration from Manual to Automatic Regression Testing
  • 5.
    Al Tayr, Hydar
    et al.
    KTH, School of Information and Communication Technology (ICT).
    Al Hakim, Mahmud
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Mobile Ajax2008Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This report describes a master thesis performed at SICS (Swedish Institute of Computer Science) and KTH (The Royal Institute of Technology) in Stockholm.

    Ajax stands for "Asynchronous JavaScript and XML" and it's not a programming language, but a suite of technologies used to develop web applications with more interactivity than the traditional web pages.

    Ajax applications can be adapted for mobile and constrained devices. This has been called Mobile Ajax. While the technique is the same, Mobile Ajax generally is considered to be a special case of Ajax, because it deals with problems specific to the mobile market.

    The purpose of this thesis has been to examine which possibilities and disadvantages has the Mobile Ajax from developers and users perspective. In addition we compare Mobile Ajax with Java Micro Edition (Java ME) and Flash Lite.

    This has been done through literature studies and development of a databased chat client (MAIM -Mobile Ajax Instant Messenger). The application sends and receives direct messages in real time between differently mobile devices. Then MAIM application has been compared with our own developed Java ME and Flash Lite chat clients.

    We have tested all three applications with different models of mobile devices and on different web browsers. The results have shown that mobile Ajax makes possible the creation of sophisticated and dynamic mobile web applications and is better than the classic web application model, but this requires that the mobile device has a modern and compatible web browser like Opera mobile.

     

    Download full text (pdf)
    FULLTEXT01
  • 6.
    Alferez, Mauricio
    et al.
    Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, 2 Ave JF Kennedy, L-1855 Luxembourg, Luxembourg..
    Acher, Mathieu
    Univ Rennes, DiverSE Team Inria Rennes, IRISA, CNRS, Rennes, France..
    Galindo, Jose A.
    Univ Seville, Dept Comp Languages & Syst, Seville, Spain..
    Baudry, Benoit
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Benavides, David
    Univ Seville, Dept Comp Languages & Syst, Seville, Spain..
    Modeling variability in the video domain: language and experience report2019In: Software quality journal, ISSN 0963-9314, E-ISSN 1573-1367, Vol. 27, no 1, p. 307-347Article in journal (Refereed)
    Abstract [en]

    In an industrial project, we addressed the challenge of developing a software-based video generator such that consumers and providers of video processing algorithms can benchmark them on a wide range of video variants. This article aims to report on our positive experience in modeling, controlling, and implementing software variability in the video domain. We describe how we have designed and developed a variability modeling language, called VM, resulting from the close collaboration with industrial partners during 2 years. We expose the specific requirements and advanced variability constructs; we developed and used to characterize and derive variations of video sequences. The results of our experiments and industrial experience show that our solution is effective to model complex variability information and supports the synthesis of hundreds of realistic video variants. From the software language perspective, we learned that basic variability mechanisms are useful but not enough; attributes and multi-features are of prior importance; meta-information and specific constructs are relevant for scalable and purposeful reasoning over variability models. From the video domain and software perspective, we report on the practical benefits of a variability approach. With more automation and control, practitioners can now envision benchmarking video algorithms over large, diverse, controlled, yet realistic datasets (videos that mimic real recorded videos)-something impossible at the beginning of the project.

  • 7.
    Alsaadi, Zainab
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Wait Time Estimation in Distributed Multitenant Systems: Using Queuing Theory2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Queueing theory is widely used in practical queuing applications. It can be applied for specific models of queuing systems, especially the ones that follow the Markovian property. Its purpose is to predict system behaviour in order to be used for performance optimization. In this case study, it was used to evaluate an extended queuing model with agents serving multiple queues. The purpose was to try to capture more variability and input factors into the theoretical model and test its applicability on more extended models. The main objective was to use relevant queuing theory models to estimate the wait time using real contact center data. Different from the theoretical model, the service rates of the system model depended on how many queues an agent served concurrently, which increased the complexity of the model. The obtained results demonstrated some limitations that made the models too restrictive to be applied to a model with multi-skilled agents that were not equally available. Moreover, it was shown that heuristical approaches might be more suitable for more complex queuing systems that are not covered in queueing theory models.

    Download full text (pdf)
    fulltext
  • 8.
    Al-Zubaidy, Hussein
    et al.
    KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Fodor, Viktoria
    KTH, School of Electrical Engineering (EES), Network and Systems engineering. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Dán, György
    KTH, School of Electrical Engineering (EES), Network and Systems engineering. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Flierl, Markus
    KTH, School of Electrical Engineering (EES), Information Science and Engineering. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Reliable Video Streaming With Strict Playout Deadline in Multihop Wireless Networks2017In: IEEE transactions on multimedia, ISSN 1520-9210, E-ISSN 1941-0077, Vol. 19, no 10, p. 2238-2251Article in journal (Refereed)
    Abstract [en]

    Motivated by emerging vision-based intelligent services, we consider the problem of rate adaptation for high-quality and low-delay visual information delivery over wireless networks using scalable video coding. Rate adaptation in this setting is inherently challenging due to the interplay between the variability of the wireless channels, the queuing at the network nodes, and the frame-based decoding and playback of the video content at the receiver at very short time scales. To address the problem, we propose a low-complexity model-based rate adaptation algorithm for scalable video streaming systems, building on a novel performance model based on stochastic network calculus. We validate the analytic model using extensive simulations. We show that it allows fast near-optimal rate adaptation for fixed transmission paths, as well as cross-layer optimized routing and video rate adaptation in mesh networks, with less than 10% quality degradation compared to the best achievable performance.

  • 9. Andjelkovic, Igor
    et al.
    Artho, Cyrille
    Trace Server: A Tool for Storing, Querying and Analyzing Execution Traces2011In: Proc. JPF Workshop 2011, 2011Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 10. Andræ, A. S. G.
    et al.
    Möller, Patrik
    KTH, Superseded Departments (pre-2005), Microelectronics and Information Technology, IMIT.
    Liu, J.
    Uncertainty estimation by Monte Carlo simulation applied to life cycle inventory of cordless phones and microscale metallization processes2004In: Proc.Int.Conf.Asian Green Electron., 2004, p. 206-217Conference paper (Refereed)
    Abstract [en]

    This paper addressed the question whether there is an environmental advantage of using DECT phones instead of GSM phones in offices. The paper also addresses the environmental compatibility of Electrochemical Pattern Replication (ECPR) compared to classical photolithography based microscale metallization (CL) for pattern transfer. Both environmental assessments consider electricity consumption and CO2 emissions. The projects undertaken were two comparative studies of DECT phone/GSM phone and ECPR/CL respectively. The research method used was probabilistic uncertainty modelling with a limited number of inventory parameters used in the MATLAB tool. Within the chosen system boundaries and with the uncertainties added to input data, the ECPR is to 100 % probability better than CL and the DECT phone is to 90% better than the GSM phone.

  • 11.
    Annergren, Mariette
    et al.
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Larsson, C. A.
    MOOSE2—A toolbox for least-costly application-oriented input design2016In: SoftwareX, ISSN 2352-7110, Vol. 5, p. 96-100Article in journal (Refereed)
    Abstract [en]

    MOOSE2 is a MATLAB®-based toolbox for solving least-costly application-oriented input design problems in system identification. MOOSE2 provides the spectrum of the input signal to be used in the identification experiment made to estimate a linear parametric model of the system. The objective is to find a spectrum that minimizes experiment cost while fulfilling constraints imposed in the experiment and on the obtained model. The constraints considered by MOOSE2 are: frequency or power constraints on the signal spectra in the experiment, and application or quality specifications on the obtained model.

  • 12.
    Antaris, Stefanos
    et al.
    Hive Streaming AB, Sweden.
    Rafailidis, Dimitrios
    University of Thessaly, Greece.
    Girdzijauskas, Sarunas
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Meta-reinforcement learning via buffering graph signatures for live video streaming events2021In: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2021, Association for Computing Machinery (ACM) , 2021, p. 385-392Conference paper (Refereed)
    Abstract [en]

    In this study, we present a meta-learning model to adapt the predictions of the network's capacity between viewers who participate in a live video streaming event. We propose the MELANIE model, where an event is formulated as a Markov Decision Process, performing meta-learning on reinforcement learning tasks. By considering a new event as a task, we design an actor-critic learning scheme to compute the optimal policy on estimating the viewers' high-bandwidth connections. To ensure fast adaptation to new connections or changes among viewers during an event, we implement a prioritized replay memory buffer based on the Kullback-Leibler divergence of the reward/throughput of the viewers' connections. Moreover, we adopt a model-agnostic meta-learning framework to generate a global model from past events. As viewers scarcely participate in several events, the challenge resides on how to account for the low structural similarity of different events. To combat this issue, we design a graph signature buffer to calculate the structural similarities of several streaming events and adjust the training of the global model accordingly. We evaluate the proposed model on the link weight prediction task on three real-world datasets of live video streaming events. Our experiments demonstrate the effectiveness of our proposed model, with an average relative gain of 25% against state-of-the-art strategies. For reproduction purposes, our evaluation datasets and implementation are publicly available at https://github.com/stefanosantaris/melanie

  • 13.
    Applelid, Gunnar
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Evaluating template-based automatic program repair in industry2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Automatic Program Repair (APR) is a field that has gained much attention in recent years. The idea of automatically fixing bugs could save time and money for companies. Template Based Automatic Program Repair is an area within APR that uses fix templates for generating patches and a test suite for evaluating them. However, there exists many various tools and datasets, and the concept has not widely been evaluated at companies or tried in production. Critique of current research is that the bug datasets are gathered from only a few projects, are sparsely updated and are not representative of real-world projects. This thesis evaluates, TBar, Template based automatic program repair tool for Java on a large open-source bug dataset Bears and a small company dataset. Further, TBar is modified to kBar to be used for experiments. The results show that kBar presents Plausible patches to 35% (19/54) of the selected bugs and 13% (7/54) of them is Correct. Finally, a prototype were implemented at Saab, waiting for the developers to submit the first real-world bug to fix. 

    Download full text (pdf)
    fulltext
  • 14.
    Arrospide Echegaray, Daniel
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Utvärdering av Självstyrandes-utvecklarramverket2016Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Within software engineering there is a diversity of process methods where each one has its specific purpose. A process method can be described as being a repeatable set of step with the purpose to achieve a task and reach a specific result. The majority of process methods found in this study are focused on the software product being developed. There seems to be a lack of process methods that can be used by software developers for there individual soft- ware process improvement. Individual software process improvement, refers to how the in- dividual software developer chooses to structure their own work with the purpose to obtain a specific result

    The Self-Governance Developer Framework (also called SGD-framework) whilst writing this is a newly developed process framework with the purpose of aiding the individual soft- ware developer to improve his own individual software process. Briefly explained the framework is intended to contain all the activities that can come up in a software project. The problem is that this tool has not yet been evaluated and therefore it is unknown if it is relevant for its purpose. To frame and guide the study three problem questions has been for- mulated (1) Is the framework complete for a smaller company in regards to it activities? (2) How high is the cost for the SGD-framework in regard of time?

    The goal of the study is to contribute for future studies for the framework by performing an action study where the Self-Governance Developer Framework is evaluated against a set of chosen evaluation criteria.

    An inductive qualitative research method was used when conducting the study. An induc- tive method means that conclusions are derived from empirically gathered data and from that data form general theories. Specifically, the action study method was used. Data was gathered by keeping a logbook and also time logging during the action study. To evaluate the framework, some evaluation criteria was used which were (1) Completeness, (2) Se- mantic correctness, (3) Cost. A narrative analysis was conducted over the data that was gathered for the criteria. The analysis took the problem formulations in regard.

    The results from the evaluation showed that the framework was not complete with the re- gards of the activities. Although next to complete as only a few activities were further needed during the action study. A total of 3 extra activities were added over the regular 40 activities. Around 10% of the time spent in activities were in activities outside of the Self- Governance Developer Framework. The activities were considered to finely comminute for the context of a smaller company. The framework was considered highly relevant for im- proving the individual software developers own process. The introduction cost in this study reflect on the time it took until the usage of the framework was considered consistent. In this study it was approximately 24 working days with a usage about 3.54% of an eight-hour work day. The total application cost of usage of the framework in the performed action study was on average 4.143 SEK/hour or 662,88 SEK/month. The template cost used was on 172.625 SEK/hour. 

    Download full text (pdf)
    fulltext
  • 15.
    Artho, Cyrille
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Banzai, K.
    Department of Computer Science, The University of Tokyo, Tokyo, Japan.
    Gros, Q.
    Polytech Nantes, University of Nantes, Nantes, France.
    Rousset, G.
    Polytech Nantes, University of Nantes, Nantes, France.
    Ma, L.
    Faculty of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan.
    Kitamura, T.
    Institute of Information Technology Research, National Institute of Advanced Industrial Science and Technology, Osaka, Japan.
    Hagiya, M.
    Department of Computer Science, The University of Tokyo, Tokyo, Japan.
    Tanabe, Y.
    Department of Library, Archival, and Information Studies, Tsurumi University, Yokohama, Japan.
    Yamamoto, Mitsuharu
    Department of Mathematics and Informatics, Chiba University, Chiba, Japan.
    Model-based testing of Apache ZooKeeper: Fundamental API usage and watchers2019In: Software Testing Verification and Reliability, ISSN 1099-1689, article id e1720Article in journal (Refereed)
    Abstract [en]

    In this paper, we extend work on model‐based testing for Apache ZooKeeper, to handle watchers (triggers) and improve scalability. In a distributed asynchronous shared storage like ZooKeeper, watchers deliver notifications on state changes. They are difficult to test because watcher notifications involve an initial action that sets the watcher, followed by another action that changes the previously seen state.

    We show how to generate test cases for concurrent client sessions executing against ZooKeeper with the tool Modbat. The tests are verified against an oracle that takes into account all possible timings of network communication. The oracle has to verify that there exists a chain of events that triggers both the initial callback and the subsequent watcher notification. We show in detail how the oracle computes whether watch triggers are correct and how the model was adapted and improved to handle these features. Together with a new search improvement that increases both speed and accuracy, we are able to verify large test setups and confirm several defects with our model.

  • 16. Artho, Cyrille
    et al.
    Biere, Armin
    Advanced Unit Testing—How to Scale Up a Unit Test Framework2006In: Proc. Workshop on Automation of Software Test (AST 2006), 2006, p. 462-465Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 17. Artho, Cyrille
    et al.
    Biere, Armin
    Applying Static Analysis to Large-Scale, Multithreaded Java Programs2001In: Proc. 13th ASWEC, 2001, p. 68-75Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 18. Artho, Cyrille
    et al.
    Chen, Zhongwei
    Honiden, Shinichi
    AOP-based automated unit test classification of large benchmarks2007In: Proc. 3rd Int. Workshop on Aspect-Oriented Software Development (AOAsia 2007), 2007, Vol. 2, p. 17-22Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 19. Artho, Cyrille
    et al.
    Gros, Quentin
    Rousset, Guillaume
    Precondition Coverage in Software Testing2016In: Proc. 1st Int. Workshop on Validating Software Tests (VST 2016), IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Preconditions indicate when it is permitted to use a given function. However, it is not always the case that both outcomes of a precondition are observed during testing. A precondition that is always false makes a function unusable, a precondition that is always true may turn out to be actually an invariant. In model-based testing, preconditions describes when a transition may be executed from a given state. If no outgoing transition is enabled in a given state because all preconditions of all outgoing transitions are false, the test model may be flawed. Experiments show a low test coverage of preconditions in the Scala library. We also investigate preconditions in Modbat models for model-based testing, in that case, a certain number of test cases is needed to produce sufficient coverage, but remaining cases of low coverage indeed point to legitimate flaws in test models or code.

    Download full text (pdf)
    fulltext
  • 20.
    Artho, Cyrille
    et al.
    KTH, School of Computer Science and Communication (CSC). National Institute of Advanced Industrial Science and Technology (AIST), Japan.
    Gros, Quentin
    Rousset, Guillaume
    Banzai, Kazuaki
    Ma, Lei
    Kitamura, Takashi
    Hagiya, Masami
    Tanabe, Yoshinori
    Yamamoto, Mitsuharu
    Model-based API Testing of Apache ZooKeeper2017In: 2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), IEEE , 2017, p. 288-298Conference paper (Refereed)
    Abstract [en]

    Apache ZooKeeper is a distributed data storage that is highly concurrent and asynchronous due to network communication; testing such a system is very challenging. Our solution using the tool "Modbat" generates test cases for concurrent client sessions, and processes results from synchronous and asynchronous callbacks. We use an embedded model checker to compute the test oracle for non-deterministic outcomes; the oracle model evolves dynamically with each new test step. Our work has detected multiple previously unknown defects in ZooKeeper. Finally, a thorough coverage evaluation of the core classes show how code and branch coverage strongly relate to feature coverage in the model, and hence modeling effort.

  • 21. Artho, Cyrille
    et al.
    Havelund, Klaus
    Kumar, Rahul
    Yamagata, Yoriyuki
    Domain-Specific Languages with Scala2015In: Proc. 17th Int. Conf. on Formal Engineering Methods (ICFEM 2015), 2015, Vol. 9407, p. 1-16Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 22. Artho, Cyrille
    et al.
    Hayamizu, Koji
    Ramler, Rudolf
    Yamagata, Yoriyuki
    With an Open Mind: How to Write Good Models2014In: Proc. 2nd Int. Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2013), 2014, p. 3-18Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 23. Artho, Cyrille
    et al.
    Ma, Lei
    Classification of Randomly Generated Test Cases2016In: Proc. 1st Int. Workshop on Validating Software Tests (VST 2016), IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Random test case generation produces relatively diverse test sequences, but the validity of the test verdict is always uncertain. Because tests are generated without taking the specification and documentation into account, many tests are invalid. To understand the prevalent types of successful and invalid tests, we present a classification of 56 issues that were derived from 208 failed, randomly generated test cases. While the existing workflow successfully eliminated more than half of the tests as irrelevant, half of the remaining failed tests are false positives. We show that the new @NonNull annotation of Java 8 has the potential to eliminate most of the false positives, highlighting the importance of machine-readable documentation.

    Download full text (pdf)
    fulltext
  • 24. Artho, Cyrille
    et al.
    Oiwa, Yutaka
    Suzaki, Kuniyasu
    Hagiya, Masami
    Extraction of properties in C implementations of security APIs for verification of Java applications2009In: Proc. 3rd Int. Workshop on Analysis of Security APIs, 2009Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 25. Artho, Cyrille
    et al.
    Suzaki, Kuniyasu
    Cosmo, Roberto di
    Treinen, Ralf
    Zacchiroli, Stefano
    Why Do Software Packages Conflict?2012In: Proc. 9th Working Conf. on Mining Software Repositories (MSR 2012), 2012, p. 141-150Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 26. Artho, Cyrille
    et al.
    Suzaki, Kuniyasu
    Cosmo, Roberto di
    Zacchiroli, Stefano
    Sources of Inter-package Conflicts in Debian2011In: Proc. Workshop on Logics for Component Configuration (LoCoCo 2011), 2011Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 27. Artho, Cyrille
    et al.
    Suzaki, Kuniyasu
    Hagiya, Masami
    Leungwattanakit, Watcharin
    Potter, Richard
    Platon, Eric
    Tanabe, Yoshinori
    Weitl, Franz
    Yamamoto, Mitsuharu
    Using Checkpointing and Virtualization for Fault Injection2015In: International Journal of Networking and Computing, ISSN 2185-2839, E-ISSN 2185-2847, Vol. 5, no 2, p. 347-372Article in journal (Refereed)
    Download full text (pdf)
    fulltext
  • 28.
    Augier, Pierre
    et al.
    LEGI, Université Grenoble Alpes.
    Mohanan, Ashwin Vishnu
    KTH, School of Engineering Sciences (SCI), Mechanics. KTH, School of Engineering Sciences (SCI), Centres, Linné Flow Center, FLOW.
    Bonamy, Cyrille
    LEGI, Université Grenoble Alpes.
    FluidDyn: A Python Open-Source Framework for Research and Teaching in Fluid Dynamics by Simulations, Experiments and Data Processing2019In: Journal of Open Research Software, ISSN 2049-9647, Vol. 7, no 1Article in journal (Refereed)
    Abstract [en]

    FluidDyn is a project to foster open-science and open-source in the fluid dynamics community. It is thought of as a research project to channel open-source dynamics, methods and tools to do science. We propose a set of Python packages forming a framework to study fluid dynamics with different methods, in particular laboratory experiments (package fluidlab), simulations (packages fluidfft, fluidsim and fluidfoam) and data processing (package fluidimage). In the present article, we give an overview of the specialized packages of the project and then focus on the base package called fluiddyn, which contains common code used in the specialized packages. Packages fluidfft and fluidsim are described with greater detail in two companion papers [4, 5]. With the project FluidDyn, we demonstrate that specialized scientific code can be written with methods and good practices of the open-source community. The Mercurial repositories are available in Bitbucket (https://bitbucket.org/fluiddyn/). All codes are documented using Sphinx and Read the Docs, and tested with continuous integration run on Bitbucket Pipelines and Travis. To improve the reuse potential, the codes are as modular as possible, leveraging the simple object-oriented programming model of Python. All codes are also written to be highly efficient, using C++, Cython and Pythran to speedup the performance of critical functions.

    Download full text (pdf)
    fulltext
  • 29. Avetisyan, A.
    et al.
    Ivar, J.
    Pozin, B. A.
    Petrenko, A. K.
    Cavalli, A. R.
    Arlazarov, V.
    Avdoshin, S.
    Batovrin, V. K.
    Bershadsky, A. M.
    Boichenko, A.
    Juris, B.
    Vasenin, V. A.
    Schlingloff, H.
    Kalyanov, G.
    Kantorovich, G. G.
    Korolev, A.
    Kosolapov, M. S.
    Kostogryzov, A. I.
    Koznov, D. V.
    Kuznetsov, S.
    Prokhorov, S.
    Soyfer, V. A.
    Starykh, V. A.
    Stolyarov, G. K.
    Stupnikov, S. A.
    Telnov, Y.Ph.
    Shmid, A.
    Kajko-Mattsson, Mira Miroslawa
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Wentzl, W.
    Mayer, W. H.
    Yevtushenko, N.
    Zakharov, V.
    Zmeev, O.
    Preface2019In: APSSE 2019 Actual Problems of System and Software Engineering: Proceedings of the 6th International Conference Actual Problems of System and Software Engineering, CEUR-WS , 2019, Vol. 2514, p. 1-2Conference paper (Refereed)
  • 30. Azizyan, G.
    et al.
    Magarian, M. K.
    Kajko-Mattson, Mira
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Survey of agile tool usage and needs2011In: Proceedings - 2011 Agile Conference, 2011, p. 29-38Conference paper (Refereed)
    Abstract [en]

    Today little is known about what tools software companies are using to support their Agile methods and whether they are satisfied or dissatisfied with them. This is due to lack of objective surveys on the subject. The surveys that have been conducted so far are of a subjective nature and have mostly been performed by tool vendors. They are very limited in number and focus mainly on company structure and adherence to a specific Agile method rather than on tool usage and needs. For this reason many companies have difficulties to choose appropriate tools to support their Agile process. One such company is the Swedish telecommunications giant Ericsson. To account for this lack of data Ericsson commissioned us to conduct an independent survey focusing on the tool usage and needs as experienced by the Agile software community today. In this paper we report on the results of our survey. The survey covers 121 responses from 120 different companies coming from 35 different countries. Our results show that the most satisfactory tool aspect is ease of use whereas the least satisfactory one is lack of integration with other systems. Finally our results provide a list of features that are most desired by the software companies today.

  • 31.
    Balliu, Musard
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Baudry, Benoit
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Bobadilla, Sofia
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Ron Arteaga, Javier
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Sharma, Aman
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Skoglund, Gabriel
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Soto Valero, César
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Wittlinger, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Challenges of Producing Software Bill of Materials for Java2023In: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 21, no 6, p. 12-23Article in journal (Refereed)
    Abstract [en]

    Software bills of materials (SBOMs) promise to become the backbone of software supply chain hardening. We deep-dive into six tools and the SBOMs they produce for complex open source Java projects, revealing challenges regarding the accurate production and usage of SBOMs.

  • 32.
    Balliu, Musard
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Merro, Massimo
    University of Verona.
    Pasqua, Michele
    University of Verona.
    Shcherbakov, Mikhail
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Friendly Fire: Cross-App Interactions in IoT Platforms2021In: ACM Transactions on Privacy and Security (TOPS), ISSN 2471-2566, Vol. 24, no 3, p. 1-40, article id 16Article in journal (Refereed)
    Abstract [en]

    IoT platforms enable users to connect various smart devices and online services via reactive apps running onthe cloud. These apps, often developed by third-parties, perform simple computations on data triggered byexternal information sources and actuate the results of computations on external information sinks. Recentresearch shows that unintended or malicious interactions between the different (even benign) apps of a usercan cause severe security and safety risks. These works leverage program analysis techniques to build toolsfor unveiling unexpected interference across apps for specific use cases. Despite these initial efforts, we arestill lacking a semantic framework for understanding interactions between IoT apps. The question of whatsecurity policy cross-app interference embodies remains largely unexplored.This paper proposes a semantic framework capturing the essence of cross-app interactions in IoT platforms.The framework generalizes and connects syntactic enforcement mechanisms to bisimulation-based notionsof security, thus providing a baseline for formulating soundness criteria of these enforcement mechanisms.Specifically, we present a calculus that models the behavioral semantics of a system of apps executingconcurrently, and use it to define desirable semantic policies targeting the security and safety of IoT apps.To demonstrate the usefulness of our framework, we define and implement static analyses for enforcingcross-app security and safety, and prove them sound with respect to our semantic conditions. We also leveragereal-world apps to validate the practical benefits of our tools based on the proposed enforcement mechanisms.

    Download full text (pdf)
    fulltext
  • 33.
    BARRY, Raphael
    KTH, School of Industrial Engineering and Management (ITM), Energy Technology.
    Sustainable Building Design with Autodesk Ecotect2011Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 34. Basit, K. A.
    et al.
    Matskin, Mihhail
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    GUMO inspired ontology to support user experience based Citywide Mobile Learning2011In: Proc. - Int. Conf. User Sci. Eng., i-USEr, 2011, p. 195-200Conference paper (Refereed)
    Abstract [en]

    User experience has been extensively discussed in literature, yet the idea of applying it to explain and comprehend the conceptualization of Mobile Learning (ML) is relatively new. Consequently much of the existing works are mainly theoretical and they concentrate to establish and explain the relationship between ML and experience. Little has been done to apply or adopt it into practice. In contrast to the currently existing approaches, this paper presents an ontology to support Citywide Mobile Learning (CML). The ontology presented in this paper addresses three fundamental aspects of CML, namely User Model, User Experience and Places/Spaces which exist in the city. The ontology presented here not only attempts to model and translate the theoretical concepts such as user experience and Place/Spaces for citywide context for Mobile Learning, but also apply them into practice. The discussed ontology is used in our system to support Place/Space based CML.

  • 35.
    Baudry, Benoit
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Chen, Zimin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Etemadi, Khashayar
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Fu, Han
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Ginelli, Davide
    Univ Milano Bicocca, Comp Sci, I-20166 Milan, Italy..
    Kommrusch, Steve
    Colorado State Univ, Machine Learning, Ft Collins, CO 80523 USA..
    Martinez, Matias
    Univ Polytech Hauts De France, F-59260 Valenciennes, France..
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Ron Arteaga, Javier
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. KTH Royal Inst Technol, Software Engn, S-11428 Stockholm, Sweden..
    Ye, He
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Yu, Zhongxing
    Shandong Univ, Sch Comp Sci & Technol, Jinan 266237, Peoples R China..
    A Software-Repair Robot Based on Continual Learning2021In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 38, no 4, p. 28-35Article in journal (Refereed)
    Abstract [en]

    Software bugs are common, and correcting them accounts for a significant portion of the costs in the software development and maintenance process. In this article, we discuss R-Hero, our novel system for learning how to fix bugs based on continual training.

  • 36.
    Baudry, Benoit
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Dynamic Analysis in the Browser2019Other (Other (popular science, discussion, etc.))
    Download full text (pdf)
    fulltext
  • 37.
    Baudry, Benoit
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Science-changing Code2021Other (Other (popular science, discussion, etc.))
    Download full text (pdf)
    fulltext
  • 38.
    Baudry, Benoit
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Testing beyond coverage2021In: Increment, ISSN 2832-6598, Vol. Feb, no 16Article in journal (Other (popular science, discussion, etc.))
    Download full text (pdf)
    fulltext
  • 39.
    Baudry, Benoit
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.
    Toady, Tim
    KTH.
    Monperrus, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.
    Long Live Software Easter Eggs!2022In: Queue, ISSN 1542-7730, Vol. 20, no 2, p. 31-42Article in journal (Refereed)
    Abstract [en]

    It's a period of unrest. Rebel developers, striking from continuous deployment servers, have won their first victory. During the battle, rebel spies managed to push an epic commit in the HTML code of https://pro.sony. Pursued by sinister agents, the rebels are hiding in commits, buttons, tooltips, API, HTTP headers, and configuration screens. 

  • 40.
    Berezovskyi, Andrii
    et al.
    KTH, School of Industrial Engineering and Management (ITM), Engineering Design, Mechatronics and Embedded Control Systems.
    Inam, Rafia
    Ericsson Research, Ericsson Research.
    El-khoury, Jad
    KTH, School of Industrial Engineering and Management (ITM), Engineering Design, Mechatronics and Embedded Control Systems.
    Mokrushin, Leonid
    Ericsson Research, Ericsson Research.
    Fersman, Elena
    KTH, School of Industrial Engineering and Management (ITM), Engineering Design, Mechatronics and Embedded Control Systems.
    Integrating systems of systems with a federation of rule engines2024In: Journal of Industrial Information Integration, ISSN 2467-964X, E-ISSN 2452-414X, Vol. 38, article id 100545Article in journal (Refereed)
    Abstract [en]

    Systems of Systems (SoSs) integrate many critical systems our society relies on. In designing individual systems, stakeholders use bespoke protocols, custom information models, and proprietary components with limited computational resources from various vendors. We present a reference architecture that allows multiple stakeholders to carry out a flexible integration without giving up control to a single entity in the presence of the aforementioned limitations. Our architecture relies on rule engines and graph data model to integrated systems flexibly even when black-box components are used. At the same time, a federation of the rule engines allows each stakeholder to retain control over the rules that reflect their policies. We also rely on a common information model based on ontologies to account for the information model mismatch and reduce the duplication of integration efforts. Moving rule execution to the standalone rule engines allows deployment in resource-constrained and proprietary environments. A uniform application programming interface (API) is used to integrate rule engines across systems as well as components within each system with a respective rule engine. We also present a novel algorithm to determine dependencies across rules deployed in different rule engines within the federation. This allows domain experts to develop rules as usual without having to deal with the distributed aspect of the system. We also present a proof of the sufficient condition to ensure all necessary notifications will be sent to ensure correct rule activation across different rule engines. Compared to other systems involving distributed rules, the proposed architecture is well-suited for the integration of transactional workloads commonly found in enterprises. The qualitative evaluation based on the Architecture Tradeoff Analysis Method (ATAM), applied to a telecommunications use case, shows that the architecture possesses the “interoperability”, “modifiability”, and the “functional completeness” quality attributes with a trade-off around rule expressiveness. The quantitative evaluation demonstrates speedup over the single-node setup in most scenarios except in case of highly optimized rules and a poor network performance simultaneously (tr<10ms, tn=100ms).

  • 41.
    Bernhem, Kristoffer
    et al.
    KTH, School of Engineering Sciences (SCI), Applied Physics. KTH, Centres, Science for Life Laboratory, SciLifeLab.
    Brismar, Hjalmar
    KTH, School of Engineering Sciences (SCI), Applied Physics. KTH, Centres, Science for Life Laboratory, SciLifeLab. Karolinska Institutet, Sweden.
    SMLocalizer, a GPU accelerated ImageJ plugin for single molecule localization microscopy2018In: Bioinformatics, ISSN 1367-4803, E-ISSN 1367-4811, Vol. 34, no 1, p. 137-Article in journal (Refereed)
    Abstract [en]

    SMLocalizer combines the availability of ImageJ with the power of GPU processing for fast and accurate analysis of single molecule localization microscopy data. Analysis of 2D and 3D data in multiple channels is supported.

  • 42.
    Bhalsingh, Ashwini
    KTH, School of Information and Communication Technology (ICT).
    Cloud Infrastructure for Smart Devices: SmartClouds2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    On-demand resource provisioning is an important feature of cloud, which offers several benefits such as scalability, enhanced performance, low maintenance cost, elasticity, adequate storage, ubiquitous accessibility, minimum infrastructure etc. At the same time, usage of mobile phones is becoming increasingly common throughout the world. Also, these phones are coming in the market with appealing features like fast processing unit, internal and external memory up to MBs and GBs respectively, web browsing, inbuilt sensors, powerful cameras etc. This master’s thesis project proposes a novel approach of utilizing all these features of semi-autonomous mobile devices (especially smart phones) and cloud infrastructure altogether.

    The specific aim of project is to design, implement and present a framework for multi-featured smart phone on top of cloud infrastructure. Proposed framework is implemented and tested for two different communication methods known as client poll and server push. In the second phase, performance analysis of implemented framework is carried out via simulation to compare two methods of interaction and to observe server’s load. As a result, first it is found that the server-initiated communication (i.e. server push) requires 40% to 50% less times as compared to the client-initiated communication (i.e. client poll). Second, it is observed that the application server load of framework is not affected too much regarding increasing number of client’s requests.

  • 43.
    Biehl, Matthias
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Mechatronics.
    Early Automated Verification of Tool Chain Design2012In: Computational Science And Its Applications - ICCSA 2012, PT IV / [ed] Murgante, B; Gervasi, O; Misra, S; Nedjah, N; Rocha, AMAC; Taniar, D; Apduhan, BO, Springer Berlin/Heidelberg, 2012, p. 40-50Conference paper (Refereed)
    Abstract [en]

    Tool chains are expected to increase the productivity of product development by providing automation and integration. If, however, the tool chain does not have the features required to support the product development process, it falls short of this expectation. Tool chains could reach their full potential if it could be ensured that the features of a tool chain are aligned with the product development process. As part of a systematic development approach for tool chains, we propose a verification method that measures the extent to which a tool chain design conforms to the product development process and identifies misalignments. The verification method can be used early in tool chain development, when it is relatively easy and cheap to perform the necessary corrections. Our verification method is automated, which allows for quick feedback and enables iterative design. We apply the proposed method on an industrial tool chain, where it is able to identify improvements to the design of the tool chain.

  • 44.
    Biehl, Matthias
    et al.
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.).
    El-Khoury, Jad
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.).
    Törngren, Martin
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.).
    High-Level Specification and Code Generation for Service-Oriented Tool Adapters2012In: Proceedings of the International Conference on Computational Science (ICCSA2012), 2012, p. 35-42Conference paper (Refereed)
    Abstract [en]

    The development of complex systems requires tool support for the different phases of the system life cycle. To allow for an efficient development process, the involved tools need to be integrated, e.g. by exchanging tool data or providing trace ability between the data. Despite the availability of tool integration platforms and frameworks, it is labor-intensive and costly to build tool integration solutions. Industrial tool integration initiatives such as OSLC (Open Services for Lifecycle Collaboration) demand complex configurations and the adherence to integration standards. This further complicates building an integration solution. We propose an approach that uses formalized specifications to systematize tool integration and specialized code generators to automate the process of building tool adapters. We evaluate our approach with the implementation of a code generator that creates service-oriented tool adapters conforming to the OSLC industry initiative.

  • 45.
    Biehl, Matthias
    et al.
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Mechatronics.
    Sosa, J. D.
    Törngren, Martin
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Mechatronics.
    Diaz, O.
    Efficient construction of presentation integration for web-based and desktop development tools2013In: 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), New York: IEEE , 2013, p. 697-702Conference paper (Refereed)
    Abstract [en]

    The engineering of software-intensive systems is supported by a variety of development tools. While development tools are traditionally desktop tools, they are more and more complemented and replaced by web-based development tools. The resulting blend of desktop and web-based tools is difficult to integrate into a seamless tool chain, which supports product development by data, control and presentation integration. Moreover, the construction of such tool chains is a significant engineering challenge. We propose an approach for the efficient, automated construction of tool chains, which integrate both web-based and desktop development tools; and provide a proof of concept of the approach in a case study. Our approach suggests that companies can selectively take advantage of hosted web-based development tools, while maintaining a seamless flow of integration with legacy desktop tools.

  • 46.
    Biel, Martin
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Johansson, Mikael
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Efficient Stochastic Programming in Julia2022In: INFORMS journal on computing, ISSN 1091-9856, E-ISSN 1526-5528, Vol. 34, no 4, p. 1885-1902Article in journal (Refereed)
    Abstract [en]

    We present StochasticPrograms.jl, a user-friendly and powerful open-source framework for stochastic programming written in the Julia language. The framework includes both modeling tools and structure-exploiting optimization algorithms. Stochastic programming models can be efficiently formulated using an expressive syntax, and models can be instantiated, inspected, and analyzed interactively. The framework scales seamlessly to distributed environments. Small instances of a model can be run locally to ensure correctness, whereas larger instances are automatically distributed in a memory-efficient way onto supercomputers or clouds and solved using parallel optimization algorithms. These structure-exploiting solvers are based on variations of the classical L-shaped, progressive-hedging, and quasi-gradient algorithms. We provide a concise mathematical background for the various tools and constructs available in the framework along with code listings exemplifying their usage. Both software innovations related to the implementation of the framework and algorithmic innovations related to the structured solvers are highlighted. We conclude by demonstrating strong scaling properties of the distributed algorithms on numerical benchmarks in a multinode setup. 

  • 47. Biere, Armin
    et al.
    Seidl, Martina
    Artho, Cyrille
    Model-Based Testing for Verification Backends2013In: Proc. 7th Int. Conf. on Tests & Proofs (TAP 2013), 2013, Vol. 7942, p. 39-55Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 48. Bjuhr, O.
    et al.
    Segeljakt, K.
    Addibpour, M.
    Heiser, F.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Software architecture decoupling at ericsson2017In: Proceedings - 2017 IEEE International Conference on Software Architecture Workshops, ICSAW 2017: Side Track Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 259-262, article id 7958500Conference paper (Refereed)
    Abstract [en]

    In order to evaluate and increase modularity this paper combines a method for visualizing and measuring software architectures and two algorithms for decoupling. The combination is tested on a software system at Ericsson. Our analysis show that the system has one large cluster of components (18% of the system, a Core), all interacting with each other. By employing cluster and dominator analysis we suggest 19 dependencies to be removed in order to decouple the Core. Validating the analysis output with experts at Ericsson six of the suggested dependencies where deemed impossible to remove. By removing the remaining 13 dependencies Ericsson would improve the architecture of their system considerably, e.g. core size would go down to 5%.

  • 49.
    Björk, Erik
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Sustainable development, Environmental science and Engineering, Industrial Ecology.
    Åkerberg, Viktor
    KTH, School of Architecture and the Built Environment (ABE), Sustainable development, Environmental science and Engineering, Industrial Ecology.
    Data Acquisition Architecture for HVDC Grids2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The climate crisis has caused many countries around the world to invest in large amounts of renewable energy. To be able to handle the intrinsic unreliability and geographic de- pendency of many renewable energy sources, HVDC technology is considered due to its low cost when transferring electricity across great distances. Traditional AC grids are controlled with 15-minute intervals at control centers, but HVDC grids require a faster control due to more power fluctuations within the grid. The aim of this project was to propose an architecture for a gateway in a control center for an HVDC grid. The gateway was programmed in C and C++ and the data was sent using UDP packets. Testing of the gateway was done using a real-time simulation of an HVDC grid. The data was sent with intervals smaller than a second which satisfied the speed requirements for this project. A gateway like the one developed in this project can be implemented at control centers to display and process data and to improve the overall reliability of an HVDC grid. 

    Download full text (pdf)
    fulltext
  • 50. Boix, E. G.
    et al.
    Haller, Philipp
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Ricci, A.
    Varela, C.
    Workshop preview of the 2015 workshop on programming based on actors, agents, and decentralized control (AGERE! 2015)2015In: SPLASH Companion 2015 - Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity, 2015, p. 99-100Conference paper (Refereed)
    Abstract [en]

    The AGERE! workshop focuses on programming systems, languages and applications based on actors, active/concurrent objects, agents and - more generally - high-level programming paradigms promoting a mindset of decentralized control in solving problems and developing software. The workshop is designed to cover both the theory and the practice of design and programming, bringing together researchers working on models, languages and technologies, and practitioners developing real-world systems and applications.

1234567 1 - 50 of 316
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf