Change search
Refine search result
123456 1 - 50 of 254
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Abaglo, A. J.
    et al.
    Bonalda, C.
    Pertusa, Emeline
    KTH.
    Environmental Digital Model: Integration of BIM into environmental building simulations2017In: CISBAT 2017 International ConferenceFuture Buildings & Districts – Energy Efficiency from Nano to Urban Scale, Elsevier, 2017, Vol. 122, p. 1063-1068Conference paper (Refereed)
    Abstract [en]

    The digital model and the BIM are creating a revolution with a transition from 2D to 3D models. However, environmental professions carry out building simulations with a wide range of software with little or no communication between them. This often leads to the realization of several 3D models and therefore a significant loss of time, as well as possible inconsistencies of geometrical information. Our research aims to use the interoperability potential offered by BIM-friendly software to develop gateways to optimize the modeling phase and improve the restitution of the studies through visual integration in a digital mockup.

  • 2.
    Abbasi, Abdul Ghafoor
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
    Hotamov, I.
    Web contents protection, secure execution and authorized distribution2010In: Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010, 2010, p. 157-162Conference paper (Refereed)
    Abstract [en]

    This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources in PKCS#7, extended secure execution environment for Java Web Server, eXtensible Access Control Markup Language (XACML) based authorization policies, and secure Web proxy. Design and implementation of our system is based on the concepts of generic security objects and component-based architecture that makes it compatible with exiting Web infrastructures without any modification.

  • 3.
    Abdullah, Nazri
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Håkansson, Anne
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Moradian, E.
    Blockchain based approach to enhance big data authentication in distributed environment2017In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE Computer Society, 2017, p. 887-892Conference paper (Refereed)
    Abstract [en]

    Existing authentication protocols for Big Data system such as Apache Hadoop is based on Kerberos. In the Kerberos protocol, there are numerous security issues that have remained unsolved; replay attacks, DDoS and single point of failure are some examples. These indicate potential security vulnerabilities and Big Data risks in using Hadoop. This paper presents drawbacks of Kerberos implementations and identifies authentication requirements that can enhance the security of Big Data in distributed environments. The enhancement proposed is based on the rising technology of blockchain that overcomes shortcomings of Kerberos.

  • 4.
    Ahlgren, Per
    et al.
    KTH, School of Education and Communication in Engineering Science (ECE).
    Colliander, C.
    Sjögårde, Peter
    KTH, School of Education and Communication in Engineering Science (ECE). Department of ALM, Uppsala University, Uppsala, Sweden.
    Exploring the relation between referencing practices and citation impact: A large-scale study based on Web of Science data2018In: Journal of the Association for Information Science and Technology, ISSN 2330-1635, E-ISSN 2330-1643, Vol. 69, no 5, p. 728-743Article in journal (Refereed)
    Abstract [en]

    In this large-scale contribution, we deal with the relationship between properties of cited references of Web of Science articles and the field normalized citation rate of these articles. Using nearly 1 million articles, and three classification systems with different levels of granularity, we study the effects of number of cited references, share of references covered by Web of Science, mean age of references and mean citation rate of references on field normalized citation rate. To expose the relationship between the predictor variables and the response variable, we use quantile regression. We found that a higher number of references, a higher share of references to publications within Web of Science and references to more recent publications correlate with citation impact. A correlation was observed even when normalization was done with a finely grained classification system. The predictor variables affected citation impact to a larger extent at higher quantile levels. Regarding the relative importance of the predictor variables, citation impact of the cited references was in general the least important variable. Number of cited references carried most of the importance for both low and medium quantile levels, but this importance was lessened at the highest considered level.

  • 5. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    De Martino, Monica
    Demšar, Urška
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Hauska, Hans
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Visual and Automatic Data Mining for Exploration of Geographical MetadataManuscript (Other academic)
  • 6. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    Demšar, Urška
    KTH, Superseded Departments, Infrastructure.
    De Martino, Monica
    Hauska, Hans
    KTH, Superseded Departments, Infrastructure.
    Knowledge Extraction by Visual Data Mining of Metadata in Site PlanningManuscript (Other academic)
    Abstract [en]

    The paper describes a tool designed within the first stage of the European project INVISIP in order to explore geographical metadata in the site planning process. A visual data mining approach is applied to a database of geographical metadata to help the user find an optimal subset of the existing geographical datasets for his particular planning task. It allows the user to perform both confirmative and explorative analysis. The approach is implemented in the Visual Data Mining tool, which integrates different types of visualisations with various interaction functionalities. It includes the interactive communication with the user and the brushing and linking process between different visualisations. The paper also presents an example of an application on a test metadatabase which was created for this purpose.

  • 7. Alexanderson, Petter
    et al.
    Tollmar, Konrad
    Department of Informatics, HCID Group.
    Being and mixing: designing interactive soundscapes2006In: Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, 2006, p. 252-261Conference paper (Refereed)
    Abstract [en]

    This paper describes a study of the auditory environment in a chemical factory, and how a group of process operators ascribe meaning to a selection of sound clips from their daily work environment. We argue for a design-oriented phenomenological approach to soundscape studies, and suggest an approach based on an exploration of how already occurring sounds are used. This knowledge will be used to inform the design of new useful auditory environments. Our study shows that the richness of the auditory environment is a crucial aspect of the distributed work environment. An important part of the design process is the operator’s contribution to the concepts suggested. From design workshops several design concepts aiming to explore and test different approaches for making sound affordances available have been developed. This has led us to a new understanding of how interactive soundscapes enable distributed awareness – what we refer to as ’Being and Mixing’.

  • 8.
    Altosaar, Toomas
    et al.
    Aalto Univ. School of Science and Tech., Dept. of Signal Proc. & Acoustics.
    ten Bosch, Louis
    Radboud University Nijmegen, Language and Speech unit.
    Aimetti, Guillaume
    Univ. of Sheffield, Speech & Hearing group, Dept. of Computer Science.
    Koniaris, Christos
    KTH, School of Electrical Engineering (EES), Sound and Image Processing.
    Demuynck, Kris
    K.U.Leuven - ESAT/PSI.
    van den Heuvel, Henk
    Radboud University Nijmegen, Language and Speech unit.
    A Speech Corpus for Modeling Language Acquisition: CAREGIVER2010In: 7th International Conference on Language Resources and Evaluation (LREC) 2010, Valletta, Malta / [ed] Nicoletta Calzolari (Conference Chair) and Khalid Choukri and Bente Maegaard and Joseph Mariani and Jan Odijk and Stelios Piperidis and Mike Rosner and Daniel Tapias, European Language Resources Association (ELRA) , 2010, p. 1062-1068Conference paper (Refereed)
    Abstract [en]

    A multi-lingual speech corpus used for modeling language acquisition called CAREGIVER has been designed and recorded within the framework of the EU funded Acquisition of Communication and Recognition Skills (ACORNS) project. The paper describes the motivation behind the corpus and its design by relying on current knowledge regarding infant language acquisition. Instead of recording infants and children, the voices of their primary and secondary caregivers were captured in both infant-directed and adult-directed speech modes over four languages in a read speech manner. The challenges and methods applied to obtain similar prompts in terms of complexity and semantics across different languages, as well as the normalized recording procedures employed at different locations, is covered. The corpus contains nearly 66000 utterance based audio files spoken over a two-year period by 17 male and 17 female native speakers of Dutch, English, Finnish, and Swedish. An orthographical transcription is available for every utterance. Also, time-aligned word and phone annotations for many of the sub-corpora also exist. The CAREGIVER corpus will be published via ELRA.

  • 9.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Purpose driven value model design2009In: CEUR Workshop Proceedings, 2009Conference paper (Refereed)
    Abstract [en]

    It is increasingly recognized that value models offer an abstraction that is useful for the exploration of new business networks and their properties. Among others, value models can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, as value models can be used for many different purposes, there is a risk that they become overloaded and difficult to understand. In this paper we claim that the form and contents of a value model should be governed by its purpose. We identify a number of basic purposes of value models and outline how a value model is affected by those. The approach builds on an analysis and classification of resources and resource exchanges.

  • 10.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bider, I.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Perjons, Erik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Towards a formal definition of goal-oriented business process patterns2005In: Business Process Management Journal, ISSN 1463-7154, E-ISSN 1758-4116, Vol. 11, no 6, p. 650-662Article in journal (Refereed)
    Abstract [en]

    Purpose - Organizations of today are becoming ever more focused on their business processes. This has resulted in an increasing interest in using best practices for business process re-engineering. Two problems arise in connection to using best practices: how to find a best practice that suits particular purposes, and how to ensure that the process from the best practice has the same nature as the process under re-engineering. The purpose of this paper is to address these issues. Design/methodology/approach - The paper suggests using business process patterns, i.e. relatively high level business process models, for making near formal comparison of business processes. The paper analyzes widespread modeling techniques to find out which of them suits the task of building patterns for comparison. Based on this analysis, the state-flow modeling technique is chosen and first steps towards formal definition of business process patterns based on this technique are suggested. Findings - A pattern is defined based on the notions of state space, goal, as a surface in the state space, and valid movements towards the goal. A thinkable procedure of constructing patterns is demonstrated on two real-life examples. A hypothetical procedure for comparing process is suggested but it still needs to be verified in practice. Originality/value - The originality of the paper is the way the patterns are formulated and the underlying model, the state-flow view of processes, upon which the patterns are founded.

  • 11.
    Andersson, Martin
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Transport and Economics (closed 20110301).
    Ejermo, Olof
    How does Accessibility to Knowledge Sources Affect the Innovativeness of Corporations?: Evidence from Sweden2005In: The annals of regional science, ISSN 0570-1864, E-ISSN 1432-0592, Vol. 39, no 4, p. 741-765Article in journal (Refereed)
    Abstract [en]

    This paper studies the innovative performance of 130 Swedish corporations during 1993-1994. The number of patents per corporation is explained as a function of the accessibility to internal and external knowledge sources of each corporation. A coherent way of handling accessibility measures, within and between corporations located across regions, is introduced. We examine the relative importance of intra- and interregional knowledge sources from 1) the own corporation, 2) other corporations, and 3) universities. The results show that there is a positive relationship between the innovativeness of a corporation and its accessibility to university researchers within regions where own research groups are located. Good accessibility among the corporation's research units does not have any significant effects on the likelihood of generation of patents. Instead the size of the R&D staff of the corporation seems to be the most important internal factor. There is no indication that intraregional accessibility to other corporations' research is important for a corporation's innovativeness. However, there is some indication of reduced likelihood for own corporate patenting when other corporate R&D is located in nearby regions. This may reflect a negative effect from competition for R&D labor.

  • 12. Arribas-Bel, D.
    et al.
    Kourtit, Karima
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Urban and Regional Studies. Mickiewicz University, Poznan, Poland.
    Nijkamp, P.
    Steenbruggen, J.
    Cyber Cities: Social Media as a Tool for Understanding Cities2015In: Applied Spatial Analysis and Policy, ISSN 1874-463X, Vol. 8, no 1, p. 231-247Article in journal (Refereed)
    Abstract [en]

    ‘Big’ urban data are increasingly becoming accessible for scientific research and policy use. They may enhance the intelligence that is needed for understanding and mapping out social connectivity phenomena (in the sense of Jane Jacobs) in modern smart cities. The present paper aims to highlight and demonstrate the rich potential of information based on digital technology in modern cities. As a case study example of the power of social media data as a support tool in smart cities, we consider Twitter data in the municipality of Amsterdam. We use machine learning techniques to identify temporal patterns that we then relate back to their spatial dimension, effectively connecting the digital with physical aspect of cities. We also show that analysis of geo-referenced tweets can shed significant light on physical aspects of the city and on the spatial distribution of urban functions.

  • 13. Atserias, Albert
    et al.
    Lauria, Massimo
    Nordström, Jakob
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Narrow Proofs May Be Maximally Long2016In: ACM Transactions on Computational Logic, ISSN 1529-3785, E-ISSN 1557-945X, Vol. 17, no 3, article id 19Article in journal (Refereed)
    Abstract [en]

    We prove that there are 3-CNF formulas over n variables that can be refuted in resolution in width w but require resolution proofs of size n(Omega(w)). This shows that the simple counting argument that any formula refutable in width w must have a proof in size n(O(w)) is essentially tight. Moreover, our lower bound generalizes to polynomial calculus resolution and Sherali-Adams, implying that the corresponding size upper bounds in terms of degree and rank are tight as well. The lower bound does not extend all the way to Lasserre, however, since we show that there the formulas we study have proofs of constant rank and size polynomial in both n and w.

  • 14.
    Azhari, Mohammad
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    Raghothama, Jayanth
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    Meijer, Sebastiaan
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    A Design and Implementation of Interactive Visualizations and Simulation in Transportation2014In: The Shift from Teaching to Learning: Individual, Collective and Organizational Learning Through Gaming Simulation: Proceedings of the 45th Conferenceof the International Simulation and Gaming Association, 2014Conference paper (Refereed)
    Abstract [en]

    Transportation Planners have a long history of using Geographical Information Systems, Simulation Models and Visualizations for decision support. A frame-work that integrates all three can provide enhanced decision support, opportuni-ties for training and planning future scenarios. In the current paper, we describe the concept of such a framework and the first steps toward its development.

  • 15. Badashian, A. S.
    et al.
    Afzali, Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Khalkhali, I.
    Delcheh, M. A.
    Shafiei, M. S.
    Mahdavi, M.
    CFM: A file manager with multiple categorization support2010In: SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, 2010, p. 748-751Conference paper (Refereed)
    Abstract [en]

    This paper introduces a new file manager to support multiple categorization. The proposed file manager is designed based on a subtle idea named Conceptual File Management (CFM). According to this approach, files are not contained by folders; nevertheless, each file can be a member of one or more folders (concepts). A prototype file manager is designed and implemented based on the new approach. Filtering by set operations and also manual concept selection improves retrieval of the files. CFM improves file system's clarity and avoids ambiguity and redundancy. As a result, it reduces the size of file system and enhances file access.

  • 16. Badashian, A. S.
    et al.
    Afzali, Seyyed Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Delcheh, M. A.
    Mahdavi, M.
    Alipour, M.
    Conceptual file management: Revising the structure of classificationbased information retrieval2010In: 2010 5th International Conference on Digital Information Management, ICDIM 2010, 2010, p. 108-113Conference paper (Refereed)
    Abstract [en]

    This paper addresses the Information Retrieval issues by today's hierarchical systems such as file systems. They usually contain substantial amount of redundant items. Maintaining the structure becomes difficult when large amount of items exist and ambiguity occurs in the structure. In this study, a conceptual method is presented that replaces the " containment" principle involved in current systems by " membership" principle. The proposed Conceptual File Management (CFM) method allows a file to be accessed from multiple folders; furthermore, it keeps the current hierarchical structure with minor changes. CFM reduces the ambiguity and redundancy, therefore the quality of information retrieval is improved. A Conceptual File Manager based on the above-mentioned principle has been developed. Experiments show that it improves the quality of the system in terms of maintaining the structure and retrieving the desired items easier and faster based on users' viewpoints. CFM is applicable to not only traditional file systems on computers, but also file systems on cell phones (and message storage systems), site maps in Web sites, Content Management Systems, taxonomies, and in general, classification based structures.

  • 17. Badashian, A. S.
    et al.
    Firouzabadi, A. D.
    Delcheh, M. A.
    Afzali, Seyyed Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Mahdavi, M.
    Designing a collaborative educational system: A competitive approach to e-learning2010In: 2010 5th International Conference on Digital Information Management, ICDIM 2010, 2010, p. 478-483Conference paper (Refereed)
    Abstract [en]

    Tens of thousands of universities are today educating students with different methods for a vast variety of majors. This paper aims to introduce Knowledge Tree (KT) as an integrated virtual structure to be used in the educational systems. A collaborative structure is utilized to define a universal curriculum for various university majors worldwide to maximize e-learning capabilities. Then, a collaborative competitive approach is introduced to enrich the contents of course topics offered based on the mentioned structure. The results based on both educational facts fetched from the search engines and a questionnaire filled by a group of academics from different universities show that this system performs well in educational systems in terms of time, effort and cost.

  • 18.
    Bahri, Leila
    et al.
    KTH.
    Carminati, B.
    Ferrari, E.
    Bianco, A.
    Enhanced audit strategies for collaborative and accountable data sharing in social networks2018In: ACM Transactions on Internet Technology, ISSN 1533-5399, E-ISSN 1557-6051, Vol. 18, no 4, article id 44Article in journal (Refereed)
    Abstract [en]

    Data sharing and access control management is one of the issues still hindering the development of decentralized online social networks (DOSNs), which are now gaining more research attention with the recent developments in P2P computing, such as the secure public ledger-based protocols (Blockchains) for monetary systems. In a previous work, we proposed an initial audit-based model for access control in DOSNs. In this article, we focus on enhancing the audit strategies and the privacy issues emerging from records kept for audit purposes. We propose enhanced audit and collaboration strategies, for which experimental results, on a real online social network graph with simulated sharing behavior, show an improvement in the detection rate of bad behavior of more than 50% compared to the basic model.We also provide an analysis of the related privacy issues and discuss possible privacy-preserving alternatives.

  • 19.
    Ban, Yifang
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Jacob, Alexander
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Gamba, Paolo
    University of Pavia, Pavia, Italy.
    Spaceborne SAR Data for Global Urban Mapping at 30m Resolution Utilizing a Robust Urban Extractor2015In: ISPRS journal of photogrammetry and remote sensing (Print), ISSN 0924-2716, E-ISSN 1872-8235, Vol. 103Article in journal (Refereed)
    Abstract [en]

    With more than half of the world population now living in cities and 1.4 billion more people expected to move into cities by 2030, urban areas pose significant challenges on local, regional and global environment. Timely and accurate information on spatial distributions and temporal changes of urban areas are therefore needed to support sustainable development and environmental change research. The objective of this research is to evaluate spaceborne SAR data for improved global urban mapping using a robust processing chain, the KTH-Pavia Urban Extractor. The proposed processing chain includes urban extraction based on spatial indices and Grey Level Co-occurrence Matrix (GLCM) textures, an existing method and several improvements i.e., SAR data preprocessing, enhancement, and post-processing. ENVISAT Advanced Synthetic Aperture Radar (ASAR) C-VV data at 30m resolution were selected over 10 global cities and a rural area from six continents to demonstrated robustness of the improved method. The results show that the KTH-Pavia Urban Extractor is effective in extracting urban areas and small towns from ENVISAT ASAR data and built-up areas can be mapped at 30m resolution with very good accuracy using only one or two SAR images. These findings indicate that operational global urban mapping is possible with spaceborne SAR data, especially with the launch of Sentinel-1 that provides SAR data with global coverage, operational reliability and quick data delivery.

  • 20.
    Bao, Lei
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Fischione, Carlo
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Johansson, Karl Henrik
    KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Optimized Rate Allocation for State Estimation over Noisy Channels2009In: 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, NEW YORK: IEEE , 2009, p. 2684-2688Conference paper (Refereed)
    Abstract [en]

    Optimal rate allocation in a networked control system with limited communication resources is instrumental to achieve satisfactory overall performance. In this paper, a practical rate allocation technique for state estimation in linear dynamic systems over a noisy channel is proposed. The method consists of two steps: (i) the overall distortion is expressed as a function of rates at all time instants by means of high-rate quantization theory, and (ii) a constrained optimization problem to minimize the overall distortion is solved by using Lagrange duality. Monte Carlo simulations illustrate the proposed scheme, which is shown to have good performance when compared to arbitrarily selected rate allocations.

  • 21. Bennaceur, A.
    et al.
    Meinke, Karl
    KTH.
    Machine learning for software analysis: Models, methods, and applications2018In: International Dagstuhl Seminar 16172 Machine Learning for Dynamic Software Analysis: Potentials and Limits, 2016, Springer, 2018, Vol. 11026, p. 3-49Conference paper (Refereed)
    Abstract [en]

    Machine Learning (ML) is the discipline that studies methods for automatically inferring models from data. Machine learning has been successfully applied in many areas of software engineering including: behaviour extraction, testing and bug fixing. Many more applications are yet to be defined. Therefore, a better fundamental understanding of ML methods, their assumptions and guarantees can help to identify and adopt appropriate ML technology for new applications. In this chapter, we present an introductory survey of ML applications in software engineering, classified in terms of the models they produce and the learning methods they use. We argue that the optimal choice of an ML method for a particular application should be guided by the type of models one seeks to infer. We describe some important principles of ML, give an overview of some key methods, and present examples of areas of software engineering benefiting from ML. We also discuss the open challenges for reaching the full potential of ML for software engineering and how ML can benefit from software engineering methods.

  • 22. Bentley, F
    et al.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Dernirdjian, D
    Koile, K
    Darrell, T
    Perceptive presence2003In: IEEE Computer Graphics and Applications, ISSN 0272-1716, E-ISSN 1558-1756, Vol. 23, p. 26-36Article in journal (Refereed)
    Abstract [en]

    Perceptive presence systems automatically convey awareness of user states to a remote location or application without the user having to perform explicit commands or mode selection. The article describes a component-based architecture for creating presence applications using perceptual user interface widgets. Each widget performs a machine perception function, such as tracking a face or monitoring activity in a specific 3D location. Widgets provide an abstraction barrier between the perception algorithms and the needs of application writers. Two example applications developed using this framework are presented: one uses a luminous display to express a user’s availability for communication to a colleague at a remote location, and a second uses activity to control devices in a context-aware environment.

  • 23. Bessani, A.
    et al.
    Brandt, J.
    Bux, M.
    Cogo, V.
    Dimitrova, L.
    Dowling, Jim
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Gholami, Ali
    KTH.
    Hakimzadeh, Kamal
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Hummel, M.
    Ismail, Mahmoud
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Laure, Erwin
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC. KTH, School of Computer Science and Communication (CSC), High Performance Computing and Visualization (HPCViz).
    Leser, U.
    Litton, J. -E
    Martinez, R.
    Niazi, Salman
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Reichel, J.
    Zimmermann, K.
    BiobankCloud: A platform for the secure storage, sharing, and processing of large biomedical data sets2016In: 1st International Workshop on Data Management and Analytics for Medicine and Healthcare, DMAH 2015 and Workshop on Big-Graphs Online Querying, Big-O(Q) 2015 held in conjunction with 41st International Conference on Very Large Data Bases, VLDB 2015, Springer, 2016, p. 89-105Conference paper (Refereed)
    Abstract [en]

    Biobanks store and catalog human biological material that is increasingly being digitized using next-generation sequencing (NGS). There is, however, a computational bottleneck, as existing software systems are not scalable and secure enough to store and process the incoming wave of genomic data from NGS machines. In the BiobankCloud project, we are building a Hadoop-based platform for the secure storage, sharing, and parallel processing of genomic data. We extended Hadoop to include support for multi-tenant studies, reduced storage requirements with erasure coding, and added support for extensible and consistent metadata. On top of Hadoop, we built a scalable scientific workflow engine featuring a proper workflow definition language focusing on simple integration and chaining of existing tools, adaptive scheduling on Apache Yarn, and support for iterative dataflows. Our platform also supports the secure sharing of data across different, distributed Hadoop clusters. The software is easily installed and comes with a user-friendly web interface for running, managing, and accessing data sets behind a secure 2-factor authentication. Initial tests have shown that the engine scales well to dozens of nodes. The entire system is open-source and includes pre-defined workflows for popular tasks in biomedical data analysis, such as variant identification, differential transcriptome analysis using RNA-Seq, and analysis of miRNA-Seq and ChIP-Seq data.

  • 24.
    Boman, Magnus
    et al.
    Swedish Institute of Computer Science (SICS).
    Johansson, S. J.
    Modeling epidemic spread in synthetic populations - Virtual plagues in Massively Multiplayer Online Games2007In: 3rd Digital Games Research Association International Conference: "Situated Play", DiGRA 2007, 2007, p. 357-361Conference paper (Refereed)
    Abstract [en]

    A virtual plague is a process in which a behavior-affecting property spreads among characters in a Massively Multiplayer Online Game (MMOG). The MMOG individuals constitute a synthetic population, and the game can be seen as a form of interactive executable model for studying disease spread, albeit of a very special kind. To a game developer maintaining an MMOG, recognizing, monitoring, and ultimately controlling a virtual plague is important, regardless of how it was initiated. The prospect of using tools, methods and theory from the field of epidemiology to do this seems natural and appealing. We will address the feasibility of such a prospect, first by considering some basic measures used in epidemiology, then by pointing out the differences between real world epidemics and virtual plagues. We also suggest directions for MMOG developer control through epidemiological modeling. Our aim is understanding the properties of virtual plagues, rather than trying to eliminate them or mitigate their effects, as would be in the case of real infectious disease.

  • 25.
    Boman, Magnus
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS. RISE SICS AB, Sweden.
    Kruse, E.
    Supporting global health goals with information and communications technology2017In: Global Health Action, ISSN 1654-9716, E-ISSN 1654-9880, Vol. 10, article id 1321904Article in journal (Refereed)
    Abstract [en]

    The objective of this study is to critically assess the possible roles of information and communications technology (ICT) in supporting global health goals. This is done by considering privilege and connectibility. In short, ICT can contribute by providing health information via four different kinds of access, each with its own history and prospective future. All four are analyzed here, in two perspectives: business-as-usual and disruptive. Health data analytics is difficult since the digital representation of past, current, and future health information is lacking. The flow of analytics that may prove beneficial to the individual and not just meet abstract population-level goals or ambitions is analyzed in detail. Sensemaking is also needed, to meet the minimum requirement of making prospective future services understandable to policymakers. Drivers as well as barriers for areas in which policy decisions have the potential to drive positive developments for meeting the Sustainable Development Goals are identified.

  • 26. Borkar, A.
    et al.
    Hayes, M.
    Smith, Mark T.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
    A template matching and ellipse modeling approach to detecting lane markers2010In: Advanced Concepts for Intelligent Vision Systems: 12th International Conference, ACIVS 2010, Sydney, Australia, December 13-16, 2010, Proceedings, Part II, Springer, 2010, no PART 2, p. 179-190Conference paper (Refereed)
    Abstract [en]

    Lane detection is an important element of most driver assistance applications. A new lane detection technique that is able to withstand some of the common issues like illumination changes, surface irregularities, scattered shadows, and presence of neighboring vehicles is presented in this paper. At first, inverse perspective mapping and color space conversion is performed on the input image. Then, the images are cross-correlated with a collection of predefined templates to find candidate lane regions. These regions then undergo connected components analysis, morphological operations, and elliptical projections to approximate positions of the lane markers. The implementation of the Kalman filter enables tracking lane markers on curved roads while RANSAC helps improve estimates by eliminating outliers. Finally, a new method for calculating errors between the detected lane markers and ground truth is presented. The developed system showed good performance when tested with real-world driving videos containing variations in illumination, road surface, and traffic conditions.

  • 27.
    Bowers, John
    et al.
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    Bannon, L.
    Fraser, M.
    Hindmarsh, J.
    Benford, S.
    Heath, C.
    Taxén, Gustav
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    Ciolfi, L.
    From the disappearing computer to living exhibitions: Shaping interactivity in museum settings2007In: The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments / [ed] Norbert Streitz, Achilles Kameas, Irene Mavrommati, Springer, 2007, p. 30-49Chapter in book (Refereed)
  • 28.
    Bradley, Gunilla
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Software and Computer Systems, SCS (Closed 20120101).
    The convergence theory and the good ICT society - Trends and visions2009In: Industrial Engineering and Ergonomics: Visions, Concepts, Methods and Tools, Springer Berlin/Heidelberg, 2009, p. 43-55Chapter in book (Refereed)
    Abstract [en]

    The area of Information and Communication Technology (ICT) and its interaction with social changes on organizational, individual and societal levels has, in the 21st Century attracted increasing attention, due to the depth and wide use of ICT. The focus on the ICT related disciplines has focused far too much on the technology push in contrast to human needs and requirements of the development, introduction and use of ICT. This was also the reason, when organising and chairing the Fourth ODAM conference (Organisational Design and Management) in Stockholm in 1994, that this author gave the conference the subtitle - Development, Introduction and Use of New Technology - Challenges for Human Organisation and Human Resource Development in a Changing World.

  • 29.
    Bradley, Gunilla
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Software and Computer Systems, SCS (Closed 20120101).
    The convergence theory on ICT, society and human beings - towards the good ICT society2010In: tripleC (cognition, communication, co-operation): Journal for a Global Sustainable Information Society / Unified Theory of Information Research Group, ISSN 1726-670X, E-ISSN 1726-670X, Vol. 8, no 2, p. 183-192Article in journal (Refereed)
    Abstract [en]

    The convergence model illustrates ongoing changes in the Net Society. However the theoretical model goes back and synthesises the theoretical framework in research on psychosocial work environment and computerization. Interdisciplinary research programs were initiated by the author in the 70th and then analyzed changes in society related to various periods in "the history" of ICT. The description of the convergence model is structured with reference to the concepts Globalization, ICT, Life Environment, Life Role, Effects on Humans. Both Convergence and Interactions are important features in the model. There are four levels of analysis - individual, organisational, community, and societal.

  • 30.
    Bradley, Gunilla
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Software and Computer Systems, SCS (Closed 20120101).
    The convergence theory on ICT, society, and human beings: Towards the good ICT society2010In: Information and Communication Technologies, Society and Human Beings: Theory and Framework, IGI Global, 2010, p. 30-46Chapter in book (Refereed)
    Abstract [en]

    The convergence model illustrates ongoing changes in the Net Society. The theoretical model synthesises the theoretical framework in the author's research on the psychosocial work environment and computerization. Interdisciplinary research programs were initiated by the author in the 1970s, leading to analysis of societal changes related to various periods in 'the history' of ICT. The description of the convergence model is structured with reference to the core concepts of Globalisation, ICT, Life Environment, Life Role, and Effects on Humans. Convergence and Interactions are important features of the model that organizes analysis at the individual, organisational, community, and societal levels.

  • 31.
    Bradley, Gunilla
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Whitehouse, D.
    Challenges to peace in the 21st century: Working towards a good information and communication society2012In: ICT Critical Infrastructures and Society: 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings, 2012, p. 274-284Conference paper (Refereed)
    Abstract [en]

    This short reflection paper emphasises the need for contemporary society to focus on the positive, the beneficial and the humane. There are considerable challenges to peace in the 21st century. People are increasingly concentrating on war and violence. To counter this preoccupation with the negative, the authors explore a number of avenues that may - from a psycho- logical, sociological or societal perspective - help human beings to think and act in a more peaceful, non-violent manner. The ideas covered are contained within an overall framework that focuses on the need to work together towards a Good Information and Communication Society. The focus is on action, education and study that have an international orientation rather than simply being undertaken on the local or national levels.

  • 32.
    Bronder, Axel
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Persson, Erik
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Design, Implementation and Evaluation of a Mobile GIS Solution for a Land Registration Project in Lesotho2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis describes in detail how a mobile Geographical Information System (GIS) was designed, implemented and evaluated for the prevailing circumstances of a land regularisation project in Lesotho in Southern Africa. The GIS was developed as an application for the Android platform, primarily with the tablet-computer format in mind, to be used for land registration field work.

    The main purpose of the paper is to determine whether an ad hoc mobile GIS solution can improve the efficiency of the field work as well as the integrity of the data collected in the field work of the land regularisation project in Lesotho. The aim is also to evaluate the performance and usefulness of modern tablet computers in this context.

    The application was developed and tested on site in Lesotho on two tablet computers borrowed from Samsung Electronics AB in Sweden. After the development phase, the solution was later implemented on tablet computers of a different model for the remainderof the land regularisation project in Lesotho.

    The design process started with a field visit where the work-flow of the project was analysed. From this a needs analysis were formed together with the management staff on site that served as a base for the development process. The development and implementation was then performed with continuous communication and evaluation with the personnel of the project. As the development progressed, the solution was also tested and evaluated continuously in the field work.

    Not only did the solution perform well both software- and hardware-wise, despite strong sun from high altitudes and lack of internet connection in Lesotho, it also exceeded the expectations of the staff. The solution significantly improved the work environment for the field workers of the project and the efficiency was raised, according to the evaluation. A unified management staff concludes in the evaluation of this paper that they will consider using tablet computers together with an ad hoc application for the field work of their next project.

  • 33.
    Brouwer, A.-M.
    et al.
    TNO Human Factors.
    Hogervorst, M.A.
    TNO Human Factors.
    Herman, Pawel
    Radboud University.
    Kooi, F.
    TNO Human Factors.
    Are you really looking?: Finding the answer through fixation patterns and EEG2009In: FOUNDATIONS OF AUGMENTED COGNITION, PROCEEDINGS  , Springer, 2009, Vol. 5638 LNAI, p. 329-338Conference paper (Refereed)
    Abstract [en]

    Eye movement recordings do not tell us whether observers are 'really looking' or whether they are paying attention to something else than the visual environment. We want to determine whether an observer's main current occupation is visual or not by investigating fixation patterns and EEG. Subjects were presented with auditory and visual stimuli. In some conditions, they focused on the auditory information whereas in others they searched or judged the visual stimuli. Observers made more fixations that are less cluttered in the visual compared to the auditory tasks, and they were less variable in their average fixation location. Fixated features revealed which target the observers were looking for. Gaze was not attracted more by salient features when performing the auditory task. 8-12 Hz EEG oscillations recorded over the parieto-occipital regions were stronger during the auditory task than during visual search. Our results are directly relevant for monitoring surveillance workers.

  • 34. Browall, C.
    et al.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Petterson, F.
    Camelot - Rundabordssamtal och seminarier kring framtidens boende (A workshop serie about domestic technologies)2002Book (Other academic)
  • 35.
    Brynielsson, Joel
    et al.
    KTH, School of Computer Science and Communication (CSC).
    Yap, M. H.
    Message from the Program Chairs2015In: Proceedings - 2015 European Intelligence and Security Informatics Conference, EISIC 2015, IEEE conference proceedings, 2015, article id 7379713Conference paper (Refereed)
  • 36.
    Bubenko, Janis
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Persson, A.
    Stirna, Janis
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    An intentional perspective on enterprise modeling2010In: Intentional Perspectives on Information Systems Engineering, Springer Berlin/Heidelberg, 2010, p. 215-237Chapter in book (Refereed)
    Abstract [en]

    Enterprise Modeling (EM) has two main purposes: (1) Developing the business, which entails developing business vision, strategies, redesigning the way the business operates, developing the supporting information systems, etc., and (2) ensuring the quality of the business where the focus is on sharing the knowledge about the business, its vision and the way it operates, and ensuring the acceptance of business decisions through committing the stakeholders to the decisions made. In addition, EM has also shown to be useful as a general tool for articulating, discussing, and solving organizational problems. Based on a number of case studies, interviews and observations this chapter defines what is required from EM when adopted for these purposes and intentions respectively. More precisely, it addresses the following types of requirements: documents and models required as input, models that should be developed, requirements on the modeling language, requirements on the modeling process, tool requirements and model quality requirements. The defined requirements are then discussed taking a specific EM method, Enterprise Knowledge Development (EKD) as example.

  • 37.
    Bubenko Jr., Janis
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lindencrona, E.
    Experiences from technology transfer initiatives at SISU2008In: Information Systems Engineering: From Data Analysis to Process Networks, IGI Global, 2008, p. 331-348Chapter in book (Refereed)
    Abstract [en]

    The institute SISU (Swedish Institute for Systems Development) was formed by the Swedish govermnet in 1984 based on the support of more than 20 organisations in business, industry and in the civic sector. SISU operated during 1985 to 2000. In this chapter we reflect on our experiences from this initiative to technology transfer in Sweden in the field of information systems development tools and methods. We are concerned with transfer of knowledge as well as of technical prototypes from academic research to product development, exploitation, and practical use in organisations. We reflect over a number of collaborative projects, national as well as EU-supported, initiated by SISU. We describe, firstly, which were the main "products" of technology transfer, and, secondly, which are the main factors that influence (or hinder) the success of a technology transfer initiative of this kind. The purpose of writing this chapter is to contribute to the experiences of the European Commission of successful technology transfer activities in Europe.

  • 38.
    Burger, Birgitta
    et al.
    University of Cologne, Dept. of Systematic Musicology, Germany.
    Bresin, Roberto
    KTH, Superseded Departments, Speech, Music and Hearing.
    Displaying expression in musical performance by means of a mobile robot2007In: Affective Computing And Intelligent Interaction, Proceedings, 2007, Vol. 4738, p. 753-754Conference paper (Refereed)
  • 39. Cao, J.
    et al.
    Liu, Y.
    Luo, J.
    Mao, Bo
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics (closed 20110301).
    Efficient multi-QoS attributes negotiation for service composition in dynamically changeable environments2010In: 2010 IEEE International Conference on Systems Man and Cybernetics (SMC), 2010, p. 3118-3124Conference paper (Refereed)
    Abstract [en]

    Service composition with Quality of Service (QoS) is widely studied nowadays and there are some approaches effective for the composition problem in ideal conditions but no feasible solution for dynamic and uncertain QoS constraints environment. Therefore, a novel service negotiation mechanism is proposed in this paper. The mechanism is composed by three parts for negotiation: model, protocol and strategy. The model creates a new hierarchy architecture based on negotiation agent to improve the efficiency of tasks execution of each agent. The protocol dynamically updates solution search line, on which proposals are made by trading partners, and approximate Pareto-optimal solution is achieved through the neutral mediator. The strategy enhances the negotiation sensibility by considering three factors: time, opponent actions and global negotiation states. The negotiation process is coordinated by Manger Agent (MA), which provides suggestions for the next negotiation round based on the overall negotiation context. Experimental results show that the proposed approach is effective to find a feasible solution in the dynamically changeable composition environment.

  • 40. Cao, J.
    et al.
    Sun, X.
    Zheng, X.
    Liu, B.
    Mao, Bo
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics (closed 20110301).
    Efficient multi-objective services selection algorithm based on particle swarm optimization2010In: Proceedings - 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, IEEE , 2010, p. 603-608Conference paper (Refereed)
    Abstract [en]

    With the development of Web Service, it has become a key issue to select appropriate services from a large number of candidates for creating complex composite services according to users' different QoS levels requirements. However, the existing service selection algorithms have many defects such as high time complexity, non-global optimal solutions, and poor quality solutions. To solve these defects, an efficient multi-objective services selection algorithm, EMOSS, is proposed in this paper based on particle swarm optimization. The essence of EMOSS is to model the service selection problem as a constrained multi-objective optimization problem. First the services in each sub-service set are sorted by their concept of domination, then the new sub-service set nSi , whose size is far less than the original one, is constructed and finally output pareto optimal set. The theoretical analysis and experimental results show that EMOSS can effectively obtain high quality solutions.

  • 41. Cao, J.
    et al.
    Zhang, B.
    Mao, Bo
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics (closed 20110301).
    Bo, L.
    Constraint rules-based recovery for business transaction2010In: Proceedings - 9th International Conference on Grid and Cloud Computing, GCC 2010, 2010, p. 282-289Conference paper (Refereed)
    Abstract [en]

    In web service computing, a business transaction is integrated by web services provided by multiple enterprises, therefore the transaction is deployed in a loose-coupled, heterogeneous and autonomous environment. When failures or exceptions occur, the traditional rolling back technique is inappropriate for recovery since locking is inapplicable. Current solutions, including forward recovery and backward recovery, didn't take into consideration enough business logic of the business transaction and thus were lack of flexibility and efficiency. In this paper, we introduce the conception-constraint rule, which express the business logic of a business transaction. A better control of recovery is achieved based on the constraint rules. A detailed description of our algorithms for recovery is given and a travel agency case study is illustrated. In addition, we compare our recovery mechanism with some existing solutions and the simulation results show that our method has both better success rate and efficiency.

  • 42.
    Carlquist, Olle
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Boström Leijon, Santos
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Implikat: A System for Categorizing Products using Implicit Feedback on a Website2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Implicit feedback is a form a relevance feedback that is inferred from how users interact with an information retrieval system such as an online search engine. This degree project report describes a method of using implicit feedback to establish relevance judgments and rank products based on their relevance to a specified attribute. The report contains an overview of the benefits and limitations of implicit feedback, as well as a description on how those limitations can be mitigated.

    A prototype that interpreted user actions as relevance votes and calculat-ed a fair relevance score based on these votes with the help of an algo-rithm was developed. This system was then tested on a website with real users during a limited period of time. The results from the test period were evaluated and the system was concluded to be far from perfect, but that improvements could be made by making adjustments to the algo-rithm. The system performed better when looking at the algorithm’s pre-cision rather than its sensitivity.

  • 43.
    Combes, Richard
    et al.
    Centrale-Supelec, L2S, France.
    Magureanu, Stefan
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Proutiere, Alexandre
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Minimal Exploration in Structured Stochastic Bandits2017In: Advances in Neural Information Processing Systems, Neural information processing systems foundation , 2017, p. 1764-1772Conference paper (Refereed)
    Abstract [en]

    This paper introduces and addresses a wide class of stochastic bandit problems where the function mapping the arm to the corresponding reward exhibits some known structural properties. Most existing structures (e.g. linear, lipschitz, unimodal, combinatorial, dueling,...) are covered by our framework. We derive an asymptotic instance-specific regret lower bound for these problems, and develop OSSB, an algorithm whose regret matches this fundamental limit. OSSB is not based on the classical principle of " role="presentation" style="box-sizing: border-box; display: inline-block; line-height: 0; font-size: 16.38px; word-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; margin: 0px; padding: 1px 0px; color: rgb(51, 51, 51); font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; position: relative;">optimism in the face of uncertainty'' or on Thompson sampling, and rather aims at matching the minimal exploration rates of sub-optimal arms as characterized in the derivation of the regret lower bound. We illustrate the efficiency of OSSB using numerical experiments in the case of the linear bandit problem and show that OSSB outperforms existing algorithms, including Thompson sampling.

  • 44.
    Coskun, Volkan
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Automatisering av underhåll av produkter med inbyggda trådlösa sensorsystem: Fallstudie om tvättmaskin2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This project involves controlling a washing machine and examining it as efficient as possible, with a wireless in-built sensorsystem. The idea with this project is to oversee and connect it to a cloud, where it can be further analyzed. Two cloud services are presented, whereof one of which of them are used. Several usable sensors for the washing machine have been ex-amined and presented in order to find the most appropriate sensors. A smart sensor design is presented which describes the smart sensorsystem on a hardware-and software level. Five different input-/output models are presented.As shown in the results, the most accurate input-/output model is practi-cally tested on the washing machine where the sensorvalues are sent to the cloud, through the wireless embedded sensorsystem. The sensorvalues are thereafter presented on graphs and further analyzed. Simulated graphs with different methods are presented in order to show, that these models can benefit the economy and the environment.The evaluation of the results showed that an automation of the mainte-nance is possible based upon the measurements of the chosen parameters, from the presented input-/output model for a washing machine.

  • 45.
    Coyle, D.
    et al.
    University of Ulster.
    Herman, Pawel Andrzej
    University of Ulster.
    Prasad, G.
    University of Ulster.
    McGinnity, T.M.
    University of Ulster.
    Multi-classifier Verification of Neural Time-Series Prediction Preprocessing for a BCI2007In: IET Irish Signals and System Conference 2007: Proc., 2007Conference paper (Refereed)
  • 46.
    Coyle, D.
    et al.
    University of Ulster.
    Prasad, G.
    University of Ulster.
    McGinnity, T.M.
    University of Ulster.
    Herman, Pawel Andrzej
    University of Ulster.
    Estimating the Predictability of EEG Recorded Over the Motor Cortex Using Information Theoretic Functionals2004In: Biomedizinische Technik (Berlin. Zeitschrift), ISSN 1862-278X, E-ISSN 0013-5585, Vol. 49, no 1, p. 43-44Article in journal (Refereed)
  • 47. Darrell, Trevor
    et al.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Bentley, Frank
    Checka, Neal
    Morency, Loius-Phillipe
    Rahimi, Ali
    Oh, Alice
    Face-Responsive Interfaces: From Direct Manipulation to Perceptive Presence2002In: Proceedings of the 4th international conference on Ubiquitous Computing, ACM Press, 2002, p. 135-151Conference paper (Refereed)
    Abstract [en]

    Systems for tracking faces using computer vision have recently become practical for human-computer interface applications. We are developing prototype systems for face-responsive interaction, exploring three different interface paradigms: direct manipulation, gazemediated agent dialog, and perceptually-driven remote presence. We consider the characteristics of these types of interactions, and assess the performance of our system on each application. We have found that face pose tracking is a potentially accurate means of cursor control and selection, is seen by users as a natural way to guide agent dialog interaction, and can be used to create perceptually-driven presence artefacts which convey real-time awareness of a remote space.

  • 48. Daudi, M.
    et al.
    Hauge, Jannicke
    KTH, School of Industrial Engineering and Management (ITM).
    Thoben, K. -D
    Influence of information sharing behavior on trust in collaborative logistics2017In: 18th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2017, Springer-Verlag New York, 2017, Vol. 506, p. 493-506Conference paper (Refereed)
    Abstract [en]

    Collaborations are based on mutual trust to strengthen confidence in the sharing of various resources such as information. Particularly in logistics, collaborations benefit emerged rich-data environments to successfully manage demand fluctuation and visibility of in-store logistics; as well as the sharing of physical assets. Shared information is gathered from various sources and manipulated by specific partner to match or maximize individual payoff. Such information may become vulnerable to information sharing behavior of the partner to henceforth affect trust. This paper investigates the influence of the information sharing behavior on trust. It focuses on a dimension of information accuracy to answer a research question: how do information sharing behaviors of partner affect trust in logistics collaboration? A framework of information behavior is established, and subsequently a trust model specified. Afterwards, simulation experiments are conducted to observe resulting impacts. Results unveil that both, the positively and negatively manipulated information influence trust in similar magnitudes. It is further argued that partner’s deceitful behavior underlying information sharing can be reduced although it might be difficult to eliminate.

  • 49.
    Davidson, Alan
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Näckros, Kjell
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Practical assignments in IT security for contemporary higher education: An experiment in exploiting student initiative2007In: Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA, Springer, 2007, p. 25-32Conference paper (Refereed)
    Abstract [en]

    Modern university studies cater to large groups of students with consideable variation in background knowledge. This creates problems when designing viable practical exercises, not least for the subject of IT Security. We address these problems by creating a study environment within which students have the freedom to design and execute their own exercises. We suggest and test ideas for providing sufficient motivation and structure for student activity while minimising the need and cost for staff intervention.

  • 50.
    Davidson, Alan
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Oja, R.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A Swedish IT forensics course - Expert opinions2009In: International Journal of Electronic Security and Digital Forensics, ISSN 1751-911X, E-ISSN 1751-9128, Vol. 2, no 3, p. 322-333Article in journal (Refereed)
    Abstract [en]

    There is mounting pressure for institutes of higher education to fill society's need for qualified IT forensics practitioners. Despite that pressure, it is not clear how that need should be filled, for whom, and by whom. There are many published texts available on which one might base a course, though they are primarily written for English speaking countries. Given the differences in legal practices in different countries, and forensic's dependency on legal procedures, it is not clear how applicable such texts are to Swedish education in the subject. This paper summarises some of the ongoing work at the Department of Computer and Systems Sciences at Stockholm University where we seek to define what the primary elements of a Swedish IT forensics education should be. Interviews conducted with specialists in IT law and IT forensics indicate that there are discrepancies between how representatives from on the one hand the public legal system and on the other private enterprise view the need and the subject matter.

123456 1 - 50 of 254
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf