Change search
Refine search result
1234567 1 - 50 of 343
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Oldest first
  • Newest first
Select all
  • 1.
    Abbas, Haider
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Threats and Security Measures Involved in VoIP-Telephony2006Independent thesis Advanced level (degree of Master (One Year)), 30 credits / 45 HE creditsStudent thesis
  • 2.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Magnusson, Christer
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Analyzing IT Security Evaluation needs for Developing Countries2009In: IPID Annual Workshop 2009, Orebro, Sweden, 2009Conference paper (Other academic)
  • 3.
    Abbas, Haider
    et al.
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hemani, Ahmed
    KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
    Security Evaluation of IT Products: Bridging the Gap between Common Criteria (CC) and Real Option Thinking2008In: WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, 530-533 p.Conference paper (Refereed)
    Abstract [en]

    Information security has long been considered as a key concern for organizations benefiting from the electronic era. Rapid technological developments have been observed in the last decade which has given rise to novel security threats, making IT, an uncertain infrastructure. For this reason, the business organizations have an acute need to evaluate the security aspects of their IT infrastructure. Since many years, CC (Common Criteria) has been widely used and accepted for evaluating the security of IT products. It does not impose predefined security rules that a product should exhibit but a language for security evaluation. CC has certain advantages over ITSEC1, CTCPEC2 and TCSEC3 due to its ability to address all the three dimensions: a) it provides opportunity for users to specify their security requirements, b) an implementation guide for the developers and c) provides comprehensive criteria to evaluate the security requirements. Among the few notable shortcomings of CC is the amount of resources and a lot of time consumption. Another drawback of CC is that the security requirements in this uncertain IT environment must be defined before the project starts. ROA is a well known modern methodology used to make investment decisions for the projects under uncertainty. It is based on options theory that provides not only strategic flexibility but also helps to consider hidden options during uncertainty. ROA comes in two flavors: first for the financial option pricing and second for the more uncertain real world problems where the end results are not deterministic. Information security is one of the core areas under consideration where researchers are employing ROA to take security investment decisions. In this paper, we give a brief introduction of ROA and its use in various domains. We will evaluate the use of Real options based methods to enhance the Common Criteria evaluation methodology to manage the dynamic security requirement specification and reducing required time and resources. We will analyze the possibilities to overcome CC limitations from the perspective of the end user, developer and evaluator. We believe that with the ROA enhanced capabilities will potentially be able to stop and possibly reverse this trend and strengthen the CC usage with a more effective and responsive evaluation methodology.

  • 4. Abbasi, A. G.
    et al.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Schmölzer, Gernot
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    CryptoNET: Secure federation protocol and authorization policies for SMI2009In: Post-Proceedings of the 4th International Conference on Risks and Security of Internet and Systems, CRiSIS 2009, 2009, 19-25 p.Conference paper (Refereed)
    Abstract [en]

    The paper describes a protocol for Secure E-Mail Infrastructure for establishing trust between different domains in order to protect mail servers from spam messages. The protocol uses messages for trusted interactions between intra and inter E-mail domain components, Secure E-mail (SEM) servers and Secure Mail Infrastructure (SMI) servers. In addition, the protocol validates E-mail addresses thus guaranteeing to the recipient that the E-mail is coming from a trusted domain. We also use XACML-based authorization policies at the sending and receiving servers, enforced by associated Policy Enforcement Point (PEP) servers at SEM servers, in order to provide a complete protection against spam.

  • 5.
    Adikari, Jithra
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Efficient non-repudiation for techno-information environment2006In: 2006 International Conference on Industrial and Information Systems, Vols 1 and 2, NEW YORK: IEEE , 2006, 454-458 p.Conference paper (Refereed)
    Abstract [en]

    Non-repudiation means that a person is unable to deny a certain action that he has done under any circumstances. There are several mechanisms, standards and protocols to achieve non-repudiation in techno-information enviromnent. However efficiency in non-repudiation in legal framework was not considerably addressed within the context of those mechanisms. Lack of efficient non-repudiation in the legal framework for techno-information environment makes legal issues when evidence is generated maintained. It can be derived that traditional non-repudiation mechanism delivers efficient non-repudiation. Efficient non-repudiation in techno-information environment is achieved by mapping traditional non-repudiation. Evaluation methodology for efficiency of non-repudiation mechanisms has been improved during this work. Further most significant finding of this research is the Efficient Non-Repudiation Protocol.

  • 6. Alhammouri, M.
    et al.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Management of groups and group keys in multi-level security environments2007In: Computer Safety, Reliability, and Security, Proceedings, Springer Berlin/Heidelberg, 2007, 75-80 p.Conference paper (Refereed)
    Abstract [en]

    This paper describes techniques and solutions for management of groups and cryptographic keys when sharing secure documents protected at different classification levels. Such access control environment enforces access to documents at multiple security classification levels, starting from the membership in the group, then access to particular group applications, then access to individual documents and finally even their sections.

  • 7. Alhammouri, M.
    et al.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A design of an access control model for multilevel-security documents2008Conference paper (Refereed)
    Abstract [en]

    In this paper we describe an access control model for multilevel-security documents, those structured into multiple sections based on certain security classifications. Our access control system uses XACML policies to allow documents, whose contents have varying sensitivity levels, to be created, viewed, and edited by groups that have members with varying clearance levels, while enforcing the required security constraints.

  • 8.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, A.
    Ilayperuma, T.
    Jayaweera, P.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Enterprise sustainability through the alignment of goal models and business models2008In: CEUR Workshop Proc., 2008, 73-87 p.Conference paper (Refereed)
    Abstract [en]

    Business modelling can be used as a starting point for business analysis. The core of a business model is information about resources, events, agents, and their relations. The motivation of a business model can be found in the goals of an enterprise and those are made explicit in a goal model. This paper discusses the alignment of business models with goal models and proposes a method for constructing business models based on goal models. The method assists in the design of business models that conform to the explicit goals of an enterprise. Main benefits are clear and uniform goal formulations, well founded business model designs, and increased traceability between models.

  • 9.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, A.
    Ilayperuma, T.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Grégoire, B.
    Schmitt, M.
    Dubois, E.
    Abels, S.
    Hahn, A.
    Gordijn, J.
    Weigand, H.
    Wangler, B.
    Towards a common ontology for business models2006In: CEUR Workshop Proceedings, 2006Conference paper (Refereed)
    Abstract [en]

    To create an understanding of enterprises and the ways they do business, a starting point could be to identify the main actors and the values transferred between them. Business models are created in order to make clear who the business actors are in a business case and to make their relations explicit. The relations are formulated in terms of values exchanged between the actors. The purpose of the work reported in this paper is to create a better understanding of business models by identifying basic notions used in such models. It does so by constructing a common ontology based on three established business model ontologies: e3-value, REA, and BMO. By means of a careful analysis of these ontologies a conceptual schema is created that defines the common concepts. An example is worked out that explains how the common ontology should be understood.

  • 10.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, A.
    Ilayperuma, T.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Using strategic goal analysis for enhancing value-based business models2007In: BUSITAL 2007 - 2nd International Workshop on Business/IT Alignment and Interoperability, Workshop at the 19th International Conference on Advanced Information Systems Engineering, CAiSE 2007, 2007Conference paper (Refereed)
    Abstract [en]

    Lately business models have been recognized as a foundation for design of operational business processes. The motivation of a business model can be found in the goals of an enterprise which are made explicit in a goal model. This paper discusses the alignment of business models with goal models and proposes a method for constructing business models based on goal models. The method is based on a template and rules based approach. The outputs are business models that conform to the explicit goals of an enterprise. Main benefits are uniform goal formulations, well founded business model designs, and increased traceability between the models. A case study from the health sector is used to argument the way we ground and apply our proposed method.

  • 11.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    Ilayperuma, T.
    Jayaweera, P.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Aligning goal models and business models2008In: CEUR Workshop Proc., 2008, 13-16 p.Conference paper (Refereed)
    Abstract [en]

    This paper has argued that for an enterprise to be sustainable its operational processes should be aligned to its strategic goals. We have focused on a part of the complex issue of business and IT alignment by addressing the problems of aligning business models with goal models and a method for this was proposed. The method approach offers a number of benefits: clear and uniform goal model formulation, well founded business model design, and traceability between models.

  • 12.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    Ilayperuma, Tharaka
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A declarative foundation of process models2005In: ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS / [ed] Pastor, O; Chunha, JFE, 2005, Vol. 3520, 233-247 p.Conference paper (Refereed)
    Abstract [en]

    In this paper, a declarative foundation for process models is proposed. Three issues in process management and modeling are identified: business orientation, traceability, and flexibility. It is shown how these issues can be addressed by basing process models on business models, where a business model focuses on the transfer of value between agents. As a bridge between business models and process models, the notion of activity dependency model is introduced, which identifies, classifies, and relates activities needed for executing and coordinating value transfers.

  • 13.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Gordijn, Jaap
    Gregoire, Bertrand
    Schmitt, Michael
    Dubois, Eric
    Abels, Sven
    Hahn, Axel
    Wangler, Benkt
    Weigand, Hans
    Towards a reference ontology for business models2006In: Conceptual Modeling - ER 2006, Proceedings / [ed] Embley, DW; Olive, A; Ram, S, 2006, Vol. 4215, 482-496 p.Conference paper (Refereed)
    Abstract [en]

    Ontologies are viewed as increasingly important tools for structuring domains of interests. In this paper we propose a reference ontology of business models using concepts from three established business model ontologies; the REA, BMO, and e3-value. The basic concepts in the reference ontology concern actors, resources, and the transfer of resources between actors. Most of the concepts in the reference ontology are taken from one of the original ontologies, but we have also introduced a number of additional concepts, primarily related to resource transfers between business actors. The purpose of the proposed ontology is to increase the understanding of the original ontologies as well as the relationships between them, and also to seek opportunities to complement and improve on them.

  • 14.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Department of Computer and Systems Sciences, Stockholm University, Sweden.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Department of Computer and Systems Sciences, Stockholm University, Sweden.
    Grégoire, B.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Department of Computer and Systems Sciences, Stockholm University, Sweden.
    Schmitt, M.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Department of Computer and Systems Sciences, Stockholm University, Sweden.
    From business to process models: A chaining methodology2006Conference paper (Refereed)
    Abstract [en]

    In this paper we discuss the problem of how to go from a business model to a process model in a systematic way. Business models are economic models used for business analysis, while process models capture low-level business activities and their coordination. We propose a method that starts with a business model where the main actors and their relationships are identified. This forms a basis for design of a final process model. Processes are described in terms of patterns stored in a pattern library.

  • 15.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Purpose driven value model design2009In: CEUR Workshop Proceedings, 2009Conference paper (Refereed)
    Abstract [en]

    It is increasingly recognized that value models offer an abstraction that is useful for the exploration of new business networks and their properties. Among others, value models can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, as value models can be used for many different purposes, there is a risk that they become overloaded and difficult to understand. In this paper we claim that the form and contents of a value model should be governed by its purpose. We identify a number of basic purposes of value models and outline how a value model is affected by those. The approach builds on an analysis and classification of resources and resource exchanges.

  • 16.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bider, I.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Perjons, Erik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Towards a formal definition of goal-oriented business process patterns2005In: Business Process Management Journal, ISSN 1463-7154, E-ISSN 1758-4116, Vol. 11, no 6, 650-662 p.Article in journal (Refereed)
    Abstract [en]

    Purpose - Organizations of today are becoming ever more focused on their business processes. This has resulted in an increasing interest in using best practices for business process re-engineering. Two problems arise in connection to using best practices: how to find a best practice that suits particular purposes, and how to ensure that the process from the best practice has the same nature as the process under re-engineering. The purpose of this paper is to address these issues. Design/methodology/approach - The paper suggests using business process patterns, i.e. relatively high level business process models, for making near formal comparison of business processes. The paper analyzes widespread modeling techniques to find out which of them suits the task of building patterns for comparison. Based on this analysis, the state-flow modeling technique is chosen and first steps towards formal definition of business process patterns based on this technique are suggested. Findings - A pattern is defined based on the notions of state space, goal, as a surface in the state space, and valid movements towards the goal. A thinkable procedure of constructing patterns is demonstrated on two real-life examples. A hypothetical procedure for comparing process is suggested but it still needs to be verified in practice. Originality/value - The originality of the paper is the way the patterns are formulated and the underlying model, the state-flow view of processes, upon which the patterns are founded.

  • 17.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bider, I
    Perjons, Erik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Business process support as a basis for computerized knowledge management2005In: PROFESSIONAL KNOWLEDGE MANAGEMENT / [ed] Althoff, KD; Dengel, A; Bergmann, R; Nick, M; RothBerghofer, T, BERLIN: SPRINGER-VERLAG BERLIN , 2005, Vol. 3782, 542-553 p.Conference paper (Refereed)
    Abstract [en]

    One of the major factors behind the less successful implementations of computerized knowledge management systems (KMS) is lack of motivation to use such a system on behalf of the end-users. To create such a motivation, i.e., achieve usability, a computerized KMS should be integrated with a business process support (BPS) system and provide three main functionalities: (1) provide a process context, (2) gather automatically experience-based knowledge, and (3) provide an active generalized knowledge base. Such an integrated KMS/BPS can be built using a state-oriented view on business processes. The paper describes a version of a system built according to this view. The system fully implements the first two functionalities, the third one being under development. The system is currently installed at a pilot site. Research work in progress includes creating a formal language for representing an active generalized knowledge base, and investigating the impact of the introduction of an integrated KMS/BPS on the pilot organization.

  • 18.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    Aligning goals and services through goal and business modelling2009In: Information Systems and E-Business Management, ISSN 1617-9846, E-ISSN 1617-9854, Vol. 7, no 2, 143-169 p.Article in journal (Refereed)
    Abstract [en]

    E-services are used as the cornerstones for modelling interaction points of cooperating IT systems, within and between enterprises. So far, research and development of e-services have mainly focused on an operational perspective, such as the development of standards for message exchanges and service coordination. However, on a strategic level, the success of e-services depends on their ability to work as a medium for the exchange of business values. In this paper, we present an approach that utilizes goal and business models as the foundation for designing e-services. The approach can be used to ensure that the developed e-services support the desired goals and business values of involved actors. A case study from the Swedish health care sector is used to ground and apply the presented approach.

  • 19.
    Andersson, Mats B.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Allestädes närvarande kunskap: webbplatser som informativt stöd2005Doctoral thesis, comprehensive summary (Other scientific)
  • 20.
    Andrenucci, Andrea
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Automated question-answering techniques and the medical domain2008In: HEALTHINF 2008: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, VOL 2 / [ed] Azevedo, L; Londral, AR, SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION , 2008, 207-212 p.Conference paper (Refereed)
    Abstract [en]

    The question-answering (QA) paradigm, i.e. the process of retrieving precise answers to natural language (NL) questions, was introduced in late 1960-ies and early 1970-ies within the framework of Artificial Intelligence. The advent of WWW and the need to provide advanced, user-friendly search tools has extended the QA paradigm to a larger audience of people and a larger number of fields, including medicine. This paper reviews and compares three main question-answering approaches based on Natural Language Processing, Information Retrieval, and question templates, eliciting their differences and the context of application that best suits each of them within the medical domain.

  • 21.
    Andrenucci, Andrea
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Medical information portals: An empirical study of personalized search mechanisms and search interfaces2006In: ICEIS 2006: Proceedings of the Eighth International Conference on Enterprise Information Systems: Human-Computer Interaction, 2006, 95-102 p.Conference paper (Refereed)
    Abstract [en]

    The World Wide Web has become, since its creation, one of most popular tools for accessing and distributing medical information. The purpose of this paper is to provide indications about how users search for health-related information and how medical portals should be implemented to fit users' needs. The results are mainly based on the evaluation of a prototype that tailors the retrieval of documents from the Web4health portal to users' characteristics and information needs with the help of a user model. The evaluation is conducted through a user empirical study based on user observation and in-depth interviews.

  • 22.
    Andrenucci, Andrea
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Creating a bilingual psychology lexicon for cross lingual question answering - A pilot study2007In: ICEIS 2007: Proceedings Of The Ninth International Conference On Enterprise Information Systems: Artificial Intelligence And Decision Support Systems / [ed] Cardoso, J; Cordeiro, J; Filipe, J, 2007, 129-136 p.Conference paper (Refereed)
    Abstract [en]

    This paper introduces a pilot study aimed at investigating the extraction of word relations from a sample of a medical parallel corpus in the field of Psychology. Word relations are extracted in order to create a bilingual lexicon for cross lingual question answering between Swedish and English. Four different variants of the sample corpus were utilized: word inflections with and without POS tagging, lemmas with and without POS tagging. The purpose of the study was to analyze the quality of the word relations obtained from the different versions of the corpus and to understand which version of the corpus was more suitable for extracting a bilingual lexicon in the field of psychology. The word alignments were evaluated with the help of reference data (gold standards), which were constructed before the word alignment process.

  • 23.
    Andrenucci, Andrea
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Sneiders, Eriks
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Automated question answering: Review of the main approaches2005In: Third International Conference on Information Technology and Applications, Vol 1, Proceedings / [ed] He, X; Hintz, T; Piccardi, M; Wu, Q; Huang, M; Tien, D, 2005, 514-519 p.Conference paper (Refereed)
    Abstract [en]

    Automated Question-Answering aims at delivering concise information that contains answers to user questions. This paper reviews and compares three main question-answering approaches based on Natural Language Processing, Information Retrieval, and question templates, eliciting their differences and the context of application that best suits each of them.

  • 24.
    Annamalai, Neelambari
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also aim at improving the competitive advantages using cloud computing. Hence, this has given rise to a new horizon in IT/IS outsourcing. With a collaboration of cloud computing and outsourcing emerged a new concept called cloudsourcing. Cloudsourcing can be termed as the next generation outsourcing and the next phase of cloud computing promising benefits from both the areas. Cloudsourcing is outsourcing traditional business via the cloud infrastructure. Though there is pompous popularity surrounding this new technology, there is much hesitation in adopting it due to the inherent security issues. This paper discusses in detail the security issues and possible solution to the same. As this is a new concept, not much work is identified to be done in providing a set of guidelines to adopt cloudsourcing that are very specific to information security. This work intends to fill this aperture by building a set of well-defined information security guidelines, which can be termed as a novel. For this purpose, design science research method proposed by Hevner et al is used so as to accomplish this goal. Initially, a literature study is done after which an exploratory study comprising of interviews is done to gather qualitative data. The results of the exploratory interview is tested for correctness and evaluated based on an evaluation study comprising a survey based questionnaire. The analysis of the evaluation study results provides the final results. In such an attempt, the identified countermeasures to risks are classified into three groups namely, organisational, technical and regulatory and compliance guidelines. Hence the end results constituting the set of information security guidelines are classified into the above mentioned groups. This work is assumed to contribute to our understanding of information security in cloudsourcing and in supporting IT decision makers, IT project managers and security executives of organisations for a smooth and secure transition towards cloudsourcing their business.

  • 25.
    Argaw, Atelach Alemu
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Amharic-English information retrieval with pseudo relevance feedback2007In: CLEF2007 Working Notes, CEUR-WS , 2007Conference paper (Refereed)
    Abstract [en]

    We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 2007. Two monolingual and eight bilingual runs were submitted. The bilingual experiments designed varied in terms of usage of long and short queries, presence of pseudo relevance feedback (PRF), and three approaches (maximal expansion, first-translation-given, manual) for word sense disambiguation. We used an Amharic-English machine readable dictionary (MRD) and an online Amharic-English dictionary in order to do the lookup translation of query terms. In utilizing both resources, matching query term bigrams were always given precedence over unigrams. Out of dictionary Amharic query terms were taken to be possible named entities in the language, and further filtering was attained through restricted fuzzy matching based on edit distance. The fuzzy matching was performed for each of these terms against automatically extracted English proper names. The Lemur toolkit for language modeling and information retrieval was used for indexing and retrieval. Although the experiments are too limited to draw conclusions from, the obtained results indicate that longer queries tend to perform similar to short ones, PRF improves performance considerably, and that queries tend to fare better when we use the first translation given in the MRD rather than using maximal expansion of terms by taking all the translations given in the MRD.

  • 26.
    Argaw, Atelach Alemu
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Amharic-English Information Retrieval with Pseudo Relevance Feedback2008In: Advances In Multilingual And Multimodal Information Retrieval / [ed] Peters, C; Jikoun, V; Mandl, T; Muller, H; Oard, DW; Penas, A; Petras, V; Santos, D, 2008, Vol. 5152, 119-126 p.Conference paper (Refereed)
    Abstract [en]

    We describe cross language retrieval experiments using Amharic queries and English language d ocument collection. Two monolingual and eight bilingual runs were submitted with variations in terms of 1 sage of long and short queries, presence of pseudo relevance feedback (PRF), and approaches for word sense disambiguation (WSD). We used an Amharic-English machine readable dictionary (MRD), and an online Amharic-English dictionary for lookup translation of query terms. Out of dictionary Amharic query terms were considered as possible named entities, and further filtering was attained through restricted fuzzy matching based on edit distance which is calculated against automatically extracted English proper names. The obtained results indicate that longer queries tend to perform similar to short ones, PRF improves performance considerably, and that queries tend to fare better with WSD rather than using maximal expansion of terms by taking all the translations given in the MRD.

  • 27.
    Argaw, Atelach Alemu
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Asker, Lars
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Amharic-English information retrieval2006In: CLEF2006 Working Notes, CEUR-WS , 2006Conference paper (Refereed)
    Abstract [en]

    We describe Amharic-English cross lingual information retrieval experiments in the adhoc bilingual tracs of the CLEF 2006. The query analysis is supported by morphological analysis and part of speech tagging while we used different machine readable dictionaries for term lookup in the translation process. Out of dictionary terms were handled using fuzzy matching and Lucene[4] was used for indexing and searching. Four experiments that differed in terms of utilized fields in the topic set, fuzzy matching, and term weighting, were conducted. The results obtained are reported and discussed.

  • 28.
    Argaw, Atelach Alemu
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Asker, Lars
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Amharic-english information retrieval2007In: Evaluation of Multilingual and Multi-modal Information Retrieval / [ed] Peters, C, 2007, Vol. 4730, 43-50 p.Conference paper (Refereed)
    Abstract [en]

    We describe Amharic-English cross lingual information retrieval experiments in the ad hoc bilingual tracks of the CLEF 2006. The query analysis is supported by morphological analysis and part of speech tagging while we used two machine readable dictionaries supplemented by online dictionaries for term lookup in the translation process. Out of dictionary terms were handled using fuzzy matching and Lucene[4] was used for indexing and searching. Four experiments that differed in terms of utilized fields in the topic set, fuzzy matching, and term weighting, were conducted. The results obtained are reported and discussed.

  • 29.
    Argaw, Atelach Alemu
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Asker, Lars
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Coster, R
    Karlgren, J
    Dictionary-based amharic - English information retrieval2005In: MULTILINGUAL INFORMATION ACCESS FOR TEXT, SPEECH AND IMAGES / [ed] Peters, C; Clough, P; Gonzalo, J; Jones, GJF; Kluck, M; Magnini, B, BERLIN: SPRINGER-VERLAG BERLIN , 2005, Vol. 3491, 143-149 p.Conference paper (Refereed)
    Abstract [en]

    We present two approaches to the Amharic - English bilingual track in CLEF 2004. Both experiments use a dictionary based approach to translate the Amharic queries into English Bags-of-words, but while one approach removes non-content bearing words from the Amharic queries based on their IDF value, the other uses a list of English stop words to perform the same task. The resulting translated (English) terms are then submitted to a retrieval engine that supports the Boolean and vector-space models. In our experiments, the second approach (based on a list of English stop words) performs slightly better than the one based on IDF values for the Amharic terms.

  • 30.
    Argaw, Atelach Alemu
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Asker, Lars
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Coster, Rickard
    Karlgren, Jussi
    Sahlgren, Magnus
    Dictionary-based Amharic-French information retrieval2006In: Accessing Multilingual Information Repositories / [ed] Peters, C; Gey, FC; Gonzalo, J; Muller, H; Jones, GJF; Kluck, M; Magnini, B; DeRijke, M, 2006, Vol. 4022, 83-92 p.Conference paper (Refereed)
    Abstract [en]

    We present four approaches to the Amharic - French bilingual track at CLEF 2005. All experiments use a dictionary based approach to translate the Amharic queries into French Bags-of-words, but while one approach uses word sense discrimination on the translated side of the queries, the other one includes all senses of a translated word in the query for searching. We used two search engines: The SICS experimental engine and Lucene, hence four runs with the two approaches. Non-content bearing words were removed both before and after the dictionary lookup. TF/IDF values supplemented by a heuristic function was used to remove the stop words from the Amharic queries and two French stopwords lists were used to remove them from the French translations. In our experiments, we found that the SICS search engine performs better than Lucene and that using the word sense discriminated keywords produce a slightly better result than the full set of non discriminated keywords.

  • 31.
    Argaw, Atelach Alemu
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Asker, Lars
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Karlgren, J.
    Sahlgren, M.
    Cöster, R.
    Dictionary-based Amharic-French information retrieval2005In: CLEF2005 Working Notes, CEUR-WS , 2005Conference paper (Refereed)
    Abstract [en]

    We present four approaches to the Amharic -French bilingual track at CLEF 2005. All experiments use a dictionary based approach to translate the Amharic queries into French Bags-of-words, but while one approach uses word sense discrimination on the translated side of the queries, the other one includes all senses of a translated word in the query for searching. We used two search engines: The SICS experimental engine and Lucene, hence four runs with the two approaches. Non-content bearing words were removed both before and after the dictionary lookup. TF/IDF values supplemented by a heuristic function was used to remove the stop words from the Amharic queries and two French stopwords lists were used to remove them from the French translations. In our experiments, we found that the SICS search engine performs better than Lucene and that using the word sense discriminated keywords produce a slightly better result than the full set of non discriminated keywords.

  • 32. Ask, U.
    et al.
    Magnusson, J.
    Enquist, H.
    Juell-Skielse, Gustaf
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Applied business intelligence in the making: An inter-university case from swedish higher education2009In: Business Information Systems Workshops, Springer Berlin/Heidelberg, 2009, 226-230 p.Conference paper (Refereed)
    Abstract [en]

    There has long been a debate regarding the inclusion of IT into the curriculum for business students. With IT being a natural part of their coming working environment, the under-developed use of for instance Enterprise Resource Planning (ERP) and Business Intelligence (BI) solutions has suffered much critique. As a response to this, the Centre for Business Solutions and the Scandinavian Academic Network for Teaching Enterprise Systems (SANTE) have created a joint initiative together with the industry. Through making the full accounts from a medium-sized manufacturing company available to the students through a specially designed BI solution, the students are given the task to identify potential problems with the accounts. The assignment is intended to be run in the form of a competition, where the students from different Swedish universities compete in analyzing the company in a given time-frame. The purpose of this case is to present the outline and outset for the competition, together with some initial reflections on the setup-phase.

  • 33. Bakari, Jabiri Kuwe
    et al.
    Magnusson, Christer
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Tarimo, Charles N.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    The mitigation of ICT risks using EMITL tool: An empirical study2005In: Security Management, Integrity, and Internal Control in Information Systems / [ed] Dowland, P; Furnell, S; Thuraisingham, B; Wang, XS, 2005, Vol. 193, 157-173 p.Conference paper (Refereed)
    Abstract [en]

    As the dependence on ICT in running organisations' core services is increasing, so is the exposure to the associated risks due to ICT use. In order to meet organisational objectives in ICT dependent organisations, risks due to ICT insecurity need to be addressed effectively and adequately. To achieve this, organisations must have effective means for the management of ICT risks. This involves assessment of the actual exposure to ICT risks relevant to their environment and implementation of relevant countermeasures based on the assessment results. On the contrary, in most organisations, ICT security (or ICT risk management) is perceived by the top management as a technical problem. As a result, measures for ICT risk mitigation that are ultimately put in place in such organisations tend to be inadequate. Furthermore, the traditional way of managing risks by transferring them to the insurance companies is not yet working, as it is difficult to estimate the financial consequences due to ICT-related risks. There is, therefore, a need to have methods or ways which can assist in interpreting ICT risks into a financial context (senior management language) thereby creating a common understanding of ICT risks among technical people and the management within ICT-dependent organisations. With a common understanding, it would be possible to realise a coordinated approach towards ICT risk mitigation. This paper is an attempt to investigate whether ICT risk mitigation can be enhanced using a customised software tool. A software tool for converting financial terminologies (financial risk exposure) to corresponding ICT security terminologies (countermeasures) is presented. The Estimated Maximum Information Technology Loss (EMitL) tool is investigated for its suitability as an operational tool for the above-mentioned purpose. EMitL is a tool utilised in a framework (Business Requirements on Information Technology Security BRITS) to bridge the understanding gap between senior management and the technical personnel (when it comes to ICT risk management). This work is based on an empirical study which involved interviews and observations conducted in five non-commercial organisations in Tanzania. The study was designed to establish the state of ICT security management practice in the studied organisations. The results of the study are being used here to investigate the applicability of the EMitL tool to address the observed state. The results from this study show that it is possible to customise EMitL into a usefully operational tool for interpreting risk exposure due to ICT into corresponding countermeasures. These results underline the need to further improve EMitL for wider use.

  • 34.
    Bakari, Jabiri Kuwe
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Tarimo, Charles N.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Magnusson, Christer
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Yngstrom, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bridging the gap between general management and technicians - A case study in ICT security2006In: Security and Privacy in Dynamic Environments / [ed] FischerHubner, S; Rannenberg, K; Yngstrom, L; Lindskog, S, NEW YORK, NY: SPRINGER , 2006, Vol. 201, 442-447 p.Conference paper (Refereed)
    Abstract [en]

    The lack of planning, business re-engineering, and coordination in the whole process of computerisation, is the most pronounced problem facing organisations in developing countries. These problems often lead to a discontinuous link between. technology. and the business processes. As a result, the introduced technology poses some critical risks to the organisations due to the different perceptions of the management and technical staff in viewing the ICT security problem. Ibis paper discusses a practical experience of bridging the gap between the general management and ICT technicians.

  • 35. Bakari, Jabiri Kuwe
    et al.
    Tarimo, Charles N.
    Yngstrom, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Magnusson, Christer
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Kowalski, Stewart
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bridging the gap between general management and technicians - A case study on ICT security in a developing country2007In: Computers & security (Print), ISSN 0167-4048, Vol. 26, no 1, 44-55 p.Article in journal (Refereed)
    Abstract [en]

    The lack of planning, business re-engineering, and coordination in the whole process of computerisation is the most pronounced problem facing organisations. These problems often lead to a discontinuous link between technology and the business processes. As a result, the introduced technology poses some critical risks for the organisations due, in part, to different perceptions of the management and technical staffs in viewing the ICT security problem. This paper discusses a practical experience on bridging the gap between the general management and ICT technicians.

  • 36. Bakari, Jabiri Kuwe
    et al.
    Tarimo, Charles N.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Magnusson, Christer
    State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study2005In: 5th IEEE International Conference on Advanced Learning Technologies, Proceedings / [ed] Goodyear, P; Sampson, DG; Yang, DJT; Kinshuk, X; Okamoto, T; Hartley, R; Chen, NS, 2005, 1007-1011 p.Conference paper (Refereed)
    Abstract [en]

    Information and Communication Technology (ICT) is of strategic importance and essential functional requirements for many institutions of higher learning. In the developing world, ICT is achieving a breakthrough in management and teaching of online learning, which helps to cater for the increased student population. However the security of the information being processed, stored and exchanged is a growing concern to the management as the dependence on ICT for most of the institutions' core services functions is increasing. This paper discusses the current state of ICT security management practices in three institutions Of higher learning in Tanzania. The discussion includes the problems and consequences of ICT risks.

  • 37. Bertels, K.
    et al.
    Jacques, J. -M
    Boman, Magnus
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Swedish Institute of Computer Science, Sweden.
    Risk and crises management in complex systems2005In: Micro Meso Macro: Addressing Complex Systems Couplings, World Scientific Publishing , 2005, 305-316 p.Chapter in book (Refereed)
  • 38. Bider, Ilia
    et al.
    Johansson, Lena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Perjons, Erik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Striy, Alexey
    Activation of knowledge in an integrated business Process Support/Knowledge Management System2006In: Practical Aspects of Knowledge Management, Proceedings / [ed] Reimer, U; Karagiannis, D, 2006, Vol. 4333, 13-24 p.Conference paper (Refereed)
    Abstract [en]

    The paper is devoted to the issue of activation of knowledge in automated Knowledge Management Systems (KMS). According to the authors, activation of knowledge means that a system, based on the knowledge stored in it, automatically suggests a solution appropriate for a task at hand and/or guards against the user invoking inappropriate solutions. The paper discusses activation of knowledge, first, in general, and then, in a more specific manner, while applying general concepts to an integrated Business Process Support and Knowledge Management System (BPS/KMS) that is based on the state-oriented view on business processes. Activation of knowledge in such a system is done through rules of planning. The paper presents a classification of such rules, which is based on deontic logic concepts, and shows how rules of different categories can be used for activation of knowledge. The discussion is illustrated by an example already implemented in a working system. Some details of the current implementation of rules of planning are also presented in the paper.

  • 39.
    Bigert, Johnny
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Automatic and unsupervised methods in natural language processing2005Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    Natural language processing (NLP) means the computer-aided processing of language produced by a human. But human language is inherently irregular and the most reliable results are obtained when a human is involved in at least some part of the processing. However, manual workis time-consuming and expensive. This thesis focuses on what can be accomplished in NLP when manual workis kept to a minimum.

    We describe the construction of two tools that greatly simplify the implementation of automatic evaluation. They are used to implement several supervised, semi-supervised and unsupervised evaluations by introducing artificial spelling errors. We also describe the design of a rule-based shallow parser for Swedish called GTA and a detection algorithm for context-sensitive spelling errors based on semi-supervised learning, called ProbCheck.

    In the second part of the thesis, we first implement a supervised evaluation scheme that uses an error-free treebankto determine the robustness of a parser when faced with noisy input such as spelling errors. We evaluate the GTA parser and determine the robustness of the individual components of the parser as well as the robustness for different phrase types. Second, we create an unsupervised evaluation procedure for parser robustness. The procedure allows us to evaluate the robustness of parsers using different parser formalisms on the same text and compare their performance. Five parsers and one tagger are evaluated. For four of these, we have access to annotated material and can verify the estimations given by the unsupervised evaluation procedure. The results turned out to be very accurate with few exceptions and thus, we can reliably establish the robustness of an NLP system without any need of manual work.

    Third, we implement an unsupervised evaluation scheme for spell checkers. Using this, we perform a very detailed analysis of three spell checkers for Swedish. Last, we evaluate the ProbCheck algorithm. Two methods are included for comparison: a full parser and a method using tagger transition probabilities. The algorithm obtains results superior to the comparison methods. The algorithm is also evaluated on authentic data in combination with a grammar and spell checker.

  • 40. Boella, G.
    et al.
    Van Der Torre, L.
    Verhagen, Harko
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Introduction to the special issue on normative multiagent systems2008In: Autonomous Agents and Multi-Agent Systems, ISSN 1387-2532, Vol. 17, no 1, 1-10 p.Article in journal (Refereed)
    Abstract [en]

    This special issue contains four selected and revised papers from the second international workshop on normative multiagent systems, for short NorMAS07 (Boella et al. (eds) Normative multiagent systems. Dagstuhl seminar proceedings 07122, 2007), held at Schloss Dagstuhl, Germany, in March 2007. At the workshop a shift was identified in the research community from a legal to an interactionist view on normative multiagent systems. In this editorial we discuss the shift, examples, and 10 new challenges in this more dynamic setting, which we use to introduce the papers of this special issue.

  • 41. Boella, G.
    et al.
    van der Torre, L.
    Verhagen, Harko
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Introduction to normative multiagent systems2006In: Computational and mathematical organization theory, ISSN 1381-298X, E-ISSN 1572-9346, Vol. 12, no 2-3 SPEC. ISS., 71-79 p.Article in journal (Refereed)
    Abstract [en]

    This article introduces the research issues related to and definition of normative multiagent systems. It also describes the papers selected from NorMAS05 that are part of this double special issue and relates the papers to each other.

  • 42. Boella, G.
    et al.
    Van Der Torre, L.
    Verhagen, Henricus
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Introduction to normative multiagent systems2005In: AISB'05 Convention: Social Intelligence and Interaction in Animals, Robots and Agents: Proceedings of the Symposium on Normative Multi-Agent Systems, 2005, 1-7 p.Conference paper (Refereed)
    Abstract [en]

    In this paper we give a short introduction to the emerging area of normative multiagent systems by presenting definitions and examples.

  • 43.
    Boman, Magnus
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Sandin, Anna
    Implementing an agent trade server2006In: Decision Support Systems, ISSN 0167-9236, Vol. 42, no 1, 318-327 p.Article in journal (Refereed)
    Abstract [en]

    An experimental server for stock trading autonomous agents is presented and made available, together with an agent shell for swift development. The server, written in Java, was implemented as proof-of-concept for an agent trade server for a real financial exchange.

  • 44.
    Boström, Gustav
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Aspects in the user interface: the case of access controlArticle in journal (Other academic)
  • 45.
    Boström, Gustav
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A case study on estimating the software engineering properties of implementing database encryption as and aspect2005In:  SPLAT 05: Papers, 2005Conference paper (Refereed)
  • 46.
    Boström, Gustav
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Wäyrynen, Jaana
    Henkel, Martin
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Aspects in the Agile toobox2005In:   SPLAT 05: Papers, 2005Conference paper (Refereed)
  • 47.
    Brouwers, Lisa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Fördelning av pandemivaccin mellan Sveriges landsting: simuleringsresultat2009Report (Other academic)
    Abstract [sv]

    I denna rapport finns en utredning om man genom olika strategier kan påverka hur snabbt en pandemi sprider sig i samhället och rapporten kommer att utgöra en del av grunden för det fortsatta arbetet med att ta fram strategier för hur man ska vaccinera när ett vaccin blir tillgängligt.

  • 48.
    Brouwers, Lisa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    MicroPox: a Large-scale and Spatially Explicit Microsimulation Model for Smallpox Transmission2005In: The Proceedings of the 15th International Conference on Health Sciences Simulation, 2005, 70-76 p.Conference paper (Refereed)
    Abstract [en]

    The motivation for this microsimulation model is the need to analyze and compare effects of implementing potential intervention policies against smallpox. By including contact patterns and spatial information extracted from governmental registers, we strive to make the simulation model more realistic than traditional transmission models, and thus better suited as a policy tool. MicroPox, the probabilistic large-scale microsimulation model described in this article uses real but anonymized data for the entire Swedish population. Since the unique data set contains family relations and workplace data for all Swedes, we have been able to incorporate many of their close social contacts, the type of contacts that are important for the transmission of smallpox. The level of detail of the data makes it possible to capture a large amount of the heterogeneity of the contact structure; most people have a small number of contacts, while a few have a large number. As the data set also contains geographic coordinates for all workplaces and dwellings, we were able to make the model spatially explicit. Besides a description of the model, the article also describes a preliminary experiment in which 50 initially infected persons spread the disease among 2,500,000 people, mainly located in Stockholm, Sweden.

  • 49.
    Bubenko, Janis A.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    SISU: The Swedish Institute for Systems Development2011In: History of nordic computing 3, 2011, 360-367 p.Conference paper (Refereed)
    Abstract [en]

    The research institute SISU aimed at supporting the public sector as well as Sweden's business and industry in introducing modern methods and tools when developing information systems within their organizations. SISU was founded in 1984 by support from twenty-four companies and organizations and the Swedish Board for Technical Development (STU). In its peak period around 1993, SISU had forty employees and a turnover of 35 million Swedish crowns. The institute carried out a large number of national as well collaborative, EU-supported projects. One result of the projects was the forming of innovative Swedish companies and development of IT-products. SISU was discontinued in the year 2000 primarily due to lack of financial support.

  • 50.
    Bubenko, Janis A., Jr.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    From information algebra to enterprise modelling and ontologies - a historical perspective on modelling for information systems2007In: Conceptual Modelling in Information Systems Engineering / [ed] Krogstie, J; Opdahl, AL; Brinkkemper, S, 2007, 1-18 p.Conference paper (Refereed)
    Abstract [en]

    Evolution of research and practice in the area of conceptual modelling for information systems during more than four decades is examined. it focuses on activities related to research and practice in the early system development phases. It comments on a large number of modelling methods published in the 1960-ies, 70-ies, and 80-ies as well as on the report "Concepts and Terminology of the Conceptual Schema and the Information Base" reporting the work by the ISO working group ISO/TC97/SC5/WG5 in the early 80-ies. Approaches which are based on a temporal and deductive view of the application domain as well as object-oriented modelling languages are acknowledged. The paper continues with a discussion of principles and research problems related to a topic we call "Enterprise Modelling" and "Ontology Modelling". The role of conceptual modelling in information systems development during all these decades is seen as an approach for capturing fuzzy, ill-defined, informal "real-world" descriptions and user requirements, and then transforming them to formal, in some sense complete, and consistent conceptual specifications. During the last two decades an additional role of modelling has evolved - to support user and stakeholder participation in enterprise analysis and requirements formulation and in development of shared conceptualisations of specific domains.

1234567 1 - 50 of 343
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf