Change search
Refine search result
1234567 101 - 150 of 1874
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 101.
    Backlund, Ola
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Policy-based IP services over UMTS2001Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Providing services over IP with real-time characteristics are one of the challenges that the next generation UMTS operators arefacing. Offering these services with adequate quality will be an important task in the management of their networks, which to alarge extent will be built on IP technology. Policy-based network management is an approach to improving network performanceand QoS. This is a network management model, suitable for highlevel service management that has been proposed as a promisingsolution for dynamic QoS. It is well suited for networks with hierarchical service models, which is the situation encountered inUMTS.

    The aim of this Master thesis is to examine IP services providedover UMTS based on the ideas from policy-based network technology and how they can be applied to this next generation ofcellular systems. A framework for policy-based QoS management support is outlined for the packet domain of UMTS, which is basedon the principles and experience derived from policy-based network technology found in fixed networks. A description of thefunctions and capabilities of a policy-based management system designed for UMTS is given, and the QoS related problems inUMTS are identified in order to evaluate the bottlenecks for improving service quality. The report ends with a proposal to howTelia may provide UMTS access to a IP access node that is currently being tested and developed in co-operation with othermanufacturers. Two possible solutions are described and evaluated from a QoS and architectural perspective.

  • 102.
    Badinson (nee Hossieni), David
    KTH, Superseded Departments, Teleinformatics. KTH, School of Information and Communication Technology (ICT).
    Adding Gigabit Ethernet to an ATM Switch1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This document contains the outcome of the final version of my thesis project: Adding Gigabit Ethernet access to an ATM switch. The accelerating growth of LAN (Local Area Network) traffic and growing number of complex and bandwidth hungry applications, such as, fast Interent, video telephony, voice over Internet, etc., is pushing  network administrators to look to high-speed network technologies.

    The Gigabit Ethernet and ATM are two dominant technologies in network backbone which are operating at gigabit-speed. These two technologies are considered to be competitors, but in reality they are appropriate for different applications and they are not equal substitute for each other. What we can do in this connection is to take up the advantages of both technologies and try to on somehow integrate them, in order to achieve high performance and powerful networks which are extremely demanded for future applications.

    The purpose with this project was to study the ATM and Gigabit Ethernet technologies and investigate the possibility of integrating them. This report includes an introduction to both technologies and design for a Gigabit Ethernet access card to an ATM switch. The document presents the including components in the card and gives a detailed description for each of components.

  • 103.
    Baecklund, Fredrik
    KTH, Superseded Departments, Teleinformatics.
    Software architecture for a scalable carrier class edge router1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    With the rapid growth of the Internet in the recent years and the expected future growth puts greater demands on high performance access and routing  technologies. The Ericsson AXI 510 Edge Router is a step in the right direction but to provide enough performance for future demands, a highly scalable system has to be designed. This new system is probably going to be based on a distributed architecture.

    In this MSc thesis the author discusses possible ways of designing a scalable distributed edge router software architecture and what implications the distributed architecture has on different edge router applications such as Network Address Translation, tunnel termination and management etc. Furthermore, the author presents a design proposal for a fully distributed architecture.

  • 104.
    Baetens, Jens
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Improving the Quality of Web Content through Automated Metrics: An attempt to process course pages at the kth.se website2015Report (Other (popular science, discussion, etc.))
    Abstract [en]

    Today many organizations make a great deal of content available via a web interface. For this project the main scope will be the public web of KTH Royal Institute of Technology. KTH has lots of data available online. The problem that occurs is that the people who write this content do not get feedback about what they post. The idea of this project is to change that and by giving the responsible person(s) feedback about their content.

    The main goal of the project is keeping track of changes of web pages. For example, each course has its own content and information pages - which can be changed by the person(s) responsible for the course. When pages are available in two languages and changes are made to one of them the logical expectation would be that the other language has to be changed as well. However, in the current system there is no systematic way that this change occurs or that someone would be reminded when only one version changed. Similarly for other content pages, although these might not be in multiple languages it would be interesting to see how often a page is updated and to notify the responsible person(s) that a certain page has not been updated in quite some time.

    A secondary goal of this project is to provide a proof of concept implementation of a tool that can automatically access web page in KTH Social (a locally developed web service) – thus enabling users to write code that can access, modify, and annotate web pages. Such a tool could be used to compute readability scores for each page and then annotate the page with this score.

    The code that was implemented for this project accomplished both goals. Some suggestions are made for how this process can be improved and how alternatively this processing could be done by working directly on the databases used to produce dynamic content.

  • 105. Bagger, Reza
    Noise reduction and tilt reduction in passive FET multi-phase mixers2012Patent (Other (popular science, discussion, etc.))
    Abstract [en]

    The noise response in a passive mixer circuit is improved by discharging the switching transistors in the mixer circuit in an appropriate time slot prior to activation. In addition to improving the noise response, tilt in conversion gains and linearity can be reduced. A passive mixer circuit includes bypass switches arranged in proximity to the switching transistors that make up the mixer core. These bypass switches, which are activated in intervals just prior to the active intervals of their neighboring switching transistors, discharge to ground accumulated charges on the switching transistors or on reactive components around switches.

  • 106.
    Bagger, Reza
    et al.
    Infineon Technology Nordic AB, Kista, Sweden.
    Hahn, T
    Wallace, R
    Edevarn, L
    System-in-package synthesizer for PCS/DCS application2007In: European Microwave Week 2007 Conference Proceedings, IEEE , 2007, 520-523 p.Conference paper (Refereed)
    Abstract [en]

    The article presents a system-in-package (SiP) approach for synthesizer system module used in frequency down-and up-conversion of PCS/DCS radio base station applications using low-temperature co-fired ceramic (LTCC). The hybrid module benefits from the latest qualified production technology based on multilayer LTCC technology. LTCC permits a relatively high level of circuit integration in which different parts of the synthesizer such as the VCO, buffer amplifier, loop filter, PLL circuit, switch, and voltage regulator are integrated in a single substrate of 21 x 16 x 4 mm3. The module exhibits minimum RF tuning sections, improved performance repeatability, excellent RF performance, and good low phase noise. The module covers 1800 MHz Rx/Tx and 1900 MHz Rx/Tx frequency bands. Adoption of the synthesizer to upper or lower frequency band is possible by means of few component changes in a novel tuneable resonator structure. The module's design concept defines 4 commercial products which is included in Infineon's portfolio of wireless infrastructure circuit solutions for PCS/DCS radio basestation applications.

  • 107. Bagger, Reza
    et al.
    Sahl, Stefan
    Signal generator and associated phase shift apparatus and method2013Patent (Other (popular science, discussion, etc.))
    Abstract [en]

    It is presented a signal generator for providing a first signal on a first output and a second signal on a second output wherein the first signal and the second signal are provided with phase shift relative to each other. The signal generator comprises: a control loop controller; a comparator; a phase shifter, the phase shifter being arranged to provide the first signal on the first output and the second signal on the second output; and a phase error detector, the inputs of which are connected to the outputs of the phase shifter and the output of which is connected to an input of the control loop controller. The output of the control loop controller is connected in a feedback loop to a first input of the comparator, and a second input of the comparator is arranged to be connected to an alternating current source.

  • 108. Bagger, Reza
    et al.
    Wallace, Richard
    Hahn, Tobias
    Palima, Dante
    Resonator for a voltage controlled oscillator and manufacturing method thereof2007Patent (Other (popular science, discussion, etc.))
    Abstract [en]

    An LC resonator (117; 122) for a voltage controlled oscillator (13; 116) has an inductive transmission line 31; 51), and input and output ports (33 a-b; 53 a-b) connected to the transmission line, wherein the transmission line is grounded (G) in at least one end portion thereof. The inductive transmission line has a plurality of connection ports (P) that are capable of being connected to each other or to ground in order to tune the resonance frequency of the LC resonator from one frequency band to another. Further, a trimming capacitor (C) may be interconnected in the transmission line in order to further tune the resonance frequency of the LC resonator. Preferably, the LC resonator is formed as a microstrip or strip line structure in essentially a C or S shape on a laminate substrate (101-103).

  • 109.
    Bai, Xin
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Broadband Wireless Access in Disaster Emergency Response2006Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The “WLAN in Disaster Emergency Response” (WIDER) project has developed and implemented an emergency communication system. It provides network and communication services to relief organizations. In order to guarantee the stable and efficient connectivity with a high quality of service (QoS) for the end user, and to make the WIDER system more adaptive to the disaster area, the IEEE 802.16 specification based broadband wireless access solution is adopted. This thesis work aims at evaluating and testing the WIDER system integrated with WiMAX. By learning and analyzing the technology, the benefits and perspective for WIDER using WiMAX are described. A WiMAX solution was configured and integrated into the WIDER system. A series of tests and measurements provide us the performance of the WiMAX solution in throughput, QoS, and reality. The tests helped us to learn and verify the improvements for WIDER due to WiMAX.

  • 110.
    Baig, Roger
    et al.
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Freitag, Felix
    Department of Computer Architecture. Universitat Politecnica de Catalunya. Barcelona, Spain .
    Moll, Agusti
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Navarro, Leandro
    Department of Computer Architecture. Universitat Politecnica de Catalunya. Barcelona, Spain.
    Pueyo, Roger
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Vlassov, Vladimir
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Cloud-based community services in community networks2016In: 2016 International Conference on Computing, Networking and Communications, ICNC 2016, IEEE conference proceedings, 2016, 1-5 p., 7440621Conference paper (Refereed)
    Abstract [en]

    Wireless networks have shown to be a cost effective solution for an IP-based communication infrastructure in under-served areas. Services and application, if deployed within these wireless networks, add value for the users. This paper shows how cloud infrastructures have been made operational in a community wireless network, as a particular case of a community cloud, developed according to the specific requirements and conditions of the community. We describe the conditions and requirements of such a community cloud and explain our technical choices and experience in its deployment in the community network. The user take-up has started, and our case supports the tendency of cloud computing moving towards the network edge.

  • 111.
    Baig, Roger
    et al.
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Freitag, Felix
    Department of Computer Architecture. Universitat Politecnica de Catalunya. Barcelona, Spain .
    Moll, Agusti
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Navarro, Leandro
    Department of Computer Architecture. Universitat Politecnica de Catalunya. Barcelona, Spain.
    Pueyo, Roger
    Fundacio Privada per la Xarxa Lliure, Oberta i Neural Guifi.net. Mas l’Esperanca, 08503 Gurb, Catalonia.
    Vlassov, Vladimir
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Community network clouds as a case for the IEEE Intercloud standardization2015In: 2015 IEEE Conference on Standards for Communications and Networking, CSCN 2015, 2015, 269-274 p., 7390456Conference paper (Refereed)
    Abstract [en]

    The IEEE P2302 Intercloud WG conducts work since 2011 on the project Standard for Intercloud Interoperability and Federation with the goal to define a standard architecture and building components for large-scale interoperability of independent cloud providers. While the standardization process has achieved fine-grained definitions of several Intercloud components, a deployment of the Intercloud to demonstrate the architectural feasibility is not yet operational. In this paper, we describe a deployed community network cloud and we show how it matches in several aspects the vision of the Intercloud. Similar to the Intercloud, the community network cloud consists of many small cloud providers, which for interoperability use a set of common services. In this sense, the community network cloud is a real use case for elements that the Intercloud standardization WG envisions, and can feed back to and even become part of the Intercloud. In fact, a study on Small or Medium Enterprise (SME) provided commercial services in the community network cloud indicates the importance of the success of the Intercloud standardization initiative for SMEs.

  • 112. Baldini, Gianmarco
    et al.
    Kounelis, Ioannis
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. European Commiss, Joint Res Ctr, Inst Protect & Secur Citizen, Ispra, VA, Italy..
    Loeschner, Jan
    Tallacchini, Mariachiara
    European Citizens and Their Trust in Social Networks2014In: Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration: First International Conference, LCT 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part II, Springer International Publishing , 2014Conference paper (Refereed)
    Abstract [en]

    In information and communication technology (ICT) trust has been considered as a crucial component of digital interactions. Trust has been dissected in a variety of potential meanings and dimensions and through the merging of trust in humans and trust in machines. In this paper, we investigate the role and the aggregation of trust in social networks and blogs and how it relates to knowledge production, and its connections to concepts such as reputation and sustainability in the European context. Moreover, we discuss knowledge production in information and communication technology and its relationship to user trust. We develop a view on the co-production of knowledge and trust and propose a policy management framework to support the users in their trusted use of social networks and blogs. This is presented based on an e-health use case analysis considering web based reputation and developing a new reputation scheme.

  • 113. Baliosian, J.
    et al.
    Stadler, Rolf
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Decentralized configuration of neighboring cells for radio access networks2007In: 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM, IEEE , 2007, 4351740- p.Conference paper (Refereed)
    Abstract [en]

    In order to execute a handover processes in a Radio Access Network, each cell has a configured list of neighbors to which such handovers are made. Rapid re-configuration of the neigh-borhood list in response to network failures and other events is currently not possible. To address this problem, this paper suggests an autonomic approach for dynamically configuring neighboring cell lists and introduces a decentralized, three-layered framework. As a key element of this framework, a novel probabilistic protocol that detects and continuously tracks the coverage overlaps among cells is presented and evaluated. The protocol, called DOC, maintains a distributed graph of over-lapping cells. Due to using Bloom fillers and aggregation techniques, it exhibits a low traffic and computational overhead. A first series of simulation studies suggests that DOC is scalable with respect to network size and the number of terminals.

  • 114. Bang, I.
    et al.
    Kim, Su Min
    KTH, School of Electrical Engineering (EES), Signal Processing.
    Sung, D. K.
    Opportunistic user selection with adaptive jamming for secure communication in heterogeneous networks2015In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, IEEE conference proceedings, 2015, 42-46 p.Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose an opportunistic user selection criterion to obtain a multiuser diversity gain for secure communication. At the same time, we also propose a strategy for utilizing a small base station in heterogeneous networks as a helper or a jammer adaptively. Our approach is to maximize the secrecy achievable rate based on an analytically derived lower bound instead of the original objective function due to its complexity. Based on a simple proposed user selection criterion considering both macro and small base stations, we propose two jamming strategies according to knowledge of eavesdropper's channel: adaptive jamming and probabilistic jamming strategies. Through simulations in two scenarios, it is shown that our proposed user selection and jamming schemes provide a good performance gain in terms of secrecy achievable rate.

  • 115. Baroffio, L.
    et al.
    Canclini, A.
    Cesana, M.
    Redondi, A.
    Tagliasacchi, M.
    Dán, György
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Eriksson, Emil
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Fodor, Viktoria
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Ascenso, J.
    Monteiro, P.
    Demo: Enabling image analysis tasks in visual sensor networks2014In: Proceedings of the 8th ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2014, Association for Computing Machinery (ACM), 2014, a46- p.Conference paper (Refereed)
    Abstract [en]

    This demo showcases some of the results obtained by the GreenEyes project, whose main objective is to enable visual analysis on resource-constrained multimedia sensor networks. The demo features a multi-hop visual sensor network operated by BeagleBones Linux computers with IEEE 802.15.4 communication capabilities, and capable of recognizing and tracking objects according to two different visual paradigms. In the traditional compress-then-analyze (CTA) paradigm, JPEG compressed images are transmitted through the network from a camera node to a central controller, where the analysis takes place. In the alternative analyze-then-compress (ATC) paradigm, the camera node extracts and compresses local binary visual features from the acquired images (either locally or in a distributed fashion) and transmits them to the central controller, where they are used to perform object recognition/tracking. We show that, in a bandwidth constrained scenario, the latter paradigm allows to reach better results in terms of application frame rates, still ensuring excellent analysis performance.

  • 116. Bauer, K.
    et al.
    Boreli, R.
    Carlsson, N.
    Chen, Z.
    Francillon, A.
    Freudiger, J.
    Friedman, A.
    Gambs, S.
    Haddadi, H.
    Hecker, A.
    Hui, P.
    Kaafar, M. -A
    Köpf, B.
    Mahanti, A.
    Önen, M.
    Papadimitratos, Panagiotis
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Ries, S.
    Salamatian, K.
    Schneider, F.
    Shikfa, A.
    Shue, C.
    Strufe, T.
    Uhlig, S.
    Uzun, E.
    Xie, G.
    Welcome message from the PADE chairs2013In: Welcome message from the PADE chairs  (Editorial), IEEE Computer Society, 2013, lxi-lxii p.Conference paper (Other academic)
  • 117.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Harper, B.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Judge, J.
    Location Aware Mobile Computing1997In: Proceedings of ICT '97, IEEE , 1997, 1319-1324 p.Conference paper (Refereed)
  • 118.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Augmented Mobile Computing and Communication Systems1997In: Proc. Third Asia-Pacific Conference on Communications (APCC’97), 1997, 827-831 p.Conference paper (Refereed)
  • 119.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Based Personal Mobile Computing and Communication1998In: Proceedings of 9th IEEE Workshop on Local and Metropolitan Area Networks, IEEE , 1998, 23-24 p.Conference paper (Refereed)
  • 120.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Using location and environment awareness in mobile communications1997In: Proceedings of the International Conference on Information, Communications and Signal Processing, ICICS, IEEE , 1997, 1781-1785 p.Conference paper (Refereed)
    Abstract [en]

    We are investigating the use of badge based wearable computers to create highly mobile location and environment aware systems. When coupled to intelligent servers the badges provide an unparalleled platform for human centred information environments. This paper describes the architecture of the badge, its distributed computing environment, and presents initial results of application development trials conducted by a class of telecommunications students at KTH.

  • 121.
    Becker, Kalle
    KTH, Superseded Departments, Teleinformatics.
    Calling your mailbox1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This paper presents how the company for whom this work was preformed should act to add an email reading feature to their platform. It also includes an evaluation of the usability of such a system (called Popeye).

    A field trial with Popeye was carried out, and also analyzed to understand both how users want to use this kind of service and also to evaluate speech technology in such applications.

    This paper also briefly describes the platform and why it is a good idea to use Microsoft Transaction Server (MTS) together with COM when building large systems in a Windows NT environment.

    Two different approaches to creation of this feature are discussed and the design of a COM interface was done. This interface will let voice mail vendors connect with the system and this will minimize the hardware that the telecom operators will have to buy and maintain.

    The solution I prefer is the one that means that the company has to build a complete new product. This solution will be harder to implement but I think that it will give the company the most benefits in the end. My conclusions can be read in chapter 5.

  • 122. Beckman, C.
    et al.
    Borg, J.
    Johansson, J.
    Tecsor, Irina
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Design Considerations for the EISCAT_3D Phased Array Antenna2014In: 8th European Conference on Antennas and Propagation, EuCAP 2014, IEEE , 2014, 1700-1704 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a background and an overview of the initial design considerations for phased array antenna being designed for the New Generation multi-static, incoherent-scatter radar station - EISCAT-3D - in Northern Scandinavia. Its anticipated electrical, mechanical and environmental design requirements are given both by the physics as well as by the extreme climate in the subarctic region of northern Scandinavia.

  • 123.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.  I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 124.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.

    I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 125. Behrooz, Alireza
    et al.
    Devlic, Alisa
    A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile Users2012In: Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers, Springer Berlin Heidelberg, 2012, 25-39 p.Conference paper (Refereed)
    Abstract [en]

    This paper introduces a Context-aware Privacy Policy Language (CPPL) that enables mobile users to control who can access their context information, at what detail, and in which situation by specifying their context-aware privacy rules. Context-aware privacy rules map a set of privacy rules to one or more user's situations, in which these rules are valid. Each time a user's situation changes, a list of valid rules is updated, leaving only a subset of the specified rules to be evaluated by a privacy framework upon arrival of a context query. In the existing context-dependent privacy policy languages a user's context is used as an additional condition parameter in a privacy rule, thus all the specified privacy rules have to be evaluated when a request to access a user's context arrives. Keeping the number of rules that need to be evaluated small is important because evaluation of a large number of privacy rules can potentially increase the response time to a context query. CPPL also enables rules to be defined based on a user's social relationship with a context requestor, which reduces the number of rules that need to be defined by a user and that consequently need to be evaluated by a privacy mechanism. This paper shows that when compared to the existing context-dependent privacy policy languages, this number of rules (that are encoded using CPPL) decreases with an increasing number of user-defined situations and requestors that are represented by a small number of social relationship groups.

  • 126.
    Bektesevic, Edin
    KTH, Superseded Departments, Teleinformatics.
    Embedded Linux for Purposes of Internet Appliances: (a.k.a. ‘The Wanderer Project’)1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the Internet continues to grow, now new Internet appliances are being marketed. At the same time, Linux is gradually becoming a competitive choice for desktop, server and embedded applications. How do these two facts relate to each other? What should be the position of Linux in Internet appliances, and how interesting is Linux? Where are the Internet appliances really positioned in terms of their needs for an operating system? How is Linux implemented in embedded applications?

    These are just some of the questions posed during this MSc. Project that this report aims to answer. In addition, we will examine how Linux is used in embedded applications and what it provides in terms of achieving their goals. Also, we will take a look at the compression methods that can be used for system size reduction and analyze their costs.

    The report will show that Linux is a competitive alternative for devices like WebPAD, that it leaves space for further time and cost efficient improvements, and that Internet appliances can get most of the benefits of Linux during its further evolution relatively cheaply.

  • 127.
    Bellagamba, Elisa
    et al.
    Ericsson Research.
    Andersson, Loa
    Ericsson AB.
    Sköldström, Pontus
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Network Systems Laboratory (NS Lab).
    Ward, Dave
    Drake, John
    Configuration of Pro-Active Operations, Administration, and Maintenance (OAM) Functions for MPLS-based Transport Networks using LSP Ping2013Other (Other (popular science, discussion, etc.))
  • 128. Bellagamba, Elisa
    et al.
    Kempf, James
    Sköldström, Pontus
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Telecommunication Systems Laboratory, TSLab (closed 2012-01-01).
    Link Failure Detection and Traffic Redirection in an Openflow Network2010Patent (Other (popular science, discussion, etc.))
    Abstract [en]

    Failure detection and traffic redirection are implemented in an OpenFlow switch. Link failure detection packets, such as Bidirectional Forwarding Detection (BFD) packets, are periodically sent out on links to peer OpenFlow switches, such as via the Multi-protocol Label Switching (MPLS) Transport Profile (MPLS-TP). Link failure detection packets are received from the peer OpenFlow switches on the links, and monitored. A link failure is detected if no incoming link failure detection packets are received on a link for a predetermined interval. In the event of a link failure, traffic is redirected from the failed link to a backup link by altering entries on a flow table of the OpenFlow switch.

  • 129.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    A low complexity antenna diversity receiver for OFDM based systems2001In: IEEE International Conference on Communications, 2001, 1147-1151 p.Conference paper (Refereed)
    Abstract [en]

    A low complexity antenna diversity architecture with a new combining technique suitable for orthogonal frequency division (OFDM) based systems is introduced in this paper. For a two branch antenna diversity, this structure requires only one FFT at the receiver and allows optimum maximum ratio combining. For systems with a higher number of antennas, the number of required FFTs when using such technique is reduced by half as compared to the conventional case where a different FFT is used for each receive antenna. As a result a considerable reduction in processing complexity is obtained especially for systems with high number of subcarriers. This method can also be seen as a way of increasing the number of antennas in OFDM transceivers without any major complexity increase. Thus, a considerable increase in diversity gain can be achieved

  • 130.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Bounds on the Distribution of a Sum of Independent Lognormal Random Variables2001In: IEEE Transactions on Communications, ISSN 0090-6778, E-ISSN 1558-0857, Vol. 49, no 6, 975-978 p.Article in journal (Refereed)
    Abstract [en]

    The distribution function of a sum of lognormal random variables (RVs) appears in several communication problems. Approximations are usually used for such distribution as no closed form nor bounds exist. Bounds can be very useful in assessing the performance of any given system. In this letter, we derive upper and lower bounds on the distribution function of a sum of independent lognormal RVs. These bounds are given in a closed form and can be used in studying the performance of cellular radio and broadcasting systems.

  • 131.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for HIPERLAN/2 with transmitter diversity2002Conference paper (Refereed)
  • 132.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for HIPERLAN/2 with transmitter diversity2002In: 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, 26-30 p.Conference paper (Refereed)
    Abstract [en]

    In this paper we propose a channel estimation technique for OFDM based systems, such as HIPERLAN/2 and IEEE 802.11a, with transmitter diversity. The proposed technique estimates all channel frequency responses, corresponding to each transmitter and receiver antenna pair, required for space-time processing In this OFDM based system. This technique is able to extract the channel state Information for two transmitter antennas using the same preamble as defined in the standard of HIPERLAN/2. The feasibility of this channel estimation method Is made possible by exploiting the structure of the OFDM modulation scheme. The results showed that the accuracy provided by this proposed method is comparable to that obtained when a single transmitter antenna is used.

  • 133.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for OFDM based systems with transmitter diversity2002In: 2002 IEEE International Conference on Systems, Man and Cybernetics,, 2002, 397-402 p.Conference paper (Refereed)
  • 134.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Peak-to-average power ratio reduction of OFDM signals using broadband pulse shaping2002In: IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, 889-893 p.Conference paper (Refereed)
    Abstract [en]

    Orthogonal Frequency Division Multiplexing (OFDM) techniques allow the transmission of high data rates over broadband radio channels subject to multipath fading without the need for powerful channel equalization. However, they are very sensitive to nonlinear effects due to the high Peak-to-Average Power Ratio (PAPR) owned by the transmitted signal. This paper proposes an efficient technique for reducing the PAPR of OFDM signals. The proposed technique is very effective and flexible. The method avoids the use of extra Inverse Fast Fourier Transformations (IFFTs) as was done in some previously published techniques but instead is based on a proper selection of the time waveforms of the different sub-carriers of the OFDM modulation scheme. Thus, its implementation complexity is much low in comparison to the previous published methods. A closed form relation between the maximum PAPR and the used pulse shaping waveform is derived. The obtained results show that with broadband pulse shaping, the PAPR of OFDM modulated signals can be made very close to that of single carrier signals. The improved statistics of the PAPR in the transmitted signal is demonstrated through numerical results for some sets of time waveforms. The significant improvement in PAPR given by the present technique permits to reduce the complexity and cost of the transmitter significantly. In that, pulse shaping can be used not only to shape the spectrum of the transmitted signal but also to reduce its PAPR.

  • 135.
    Ben Slimane, Slimane
    et al.
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Janssen, G.J.M.
    Delft University.
    Power optimization of M-PSK cochannel signals for a narrowband multiuser detector2001In: IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings, 2001, 247-250 p.Conference paper (Refereed)
    Abstract [en]

    An analytical method is presented to determine the optimum received power values for multiple cochannel multilevel phase-shift-keying (M-PSK) modulated signals. The aim is to achieve equal symbol error probability (SEP) for each of the signals when applying a narrowband multiuser detector based on successive cancellations. Power relations based on two approximations are derived and used to compute the average SEP for the different cochannel signals. The derived power relations are also compared against optimum power relations obtained through computer simulations

  • 136.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    A doubly stochastic Poisson model for self-similar traffic1995In: IEEE International Conference on Communications, 1995, 456-460 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a data traffic model capable of describing the long-range dependence and self-similar burstiness structure found in measurement studies of packet data traffic. The model introduced is based on doubly stochastic Poisson processes. The intensity of arrivals is modeled as a continuous stochastic process. This process satisfies most of the properties found in the measurement studies, namely long-range dependence and self-similarity. The generality and simplicity of this model makes it attractive in data traffic modeling

  • 137.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Coded quadrature pulse-overlapping modulation techniques for personal communications1992In: 1st International Conference on Universal Personal Communications, 1992. ICUPC '92 Proceedings, 1992, 11-03/1-11-03/5 p.Conference paper (Refereed)
    Abstract [en]

    Hard-limited quadrature pulse-overlapping modulation (QPOM) techniques have a constant envelope, good spectral properties and good performance especially in fading channels. These modulation techniques are suitable to applications using nonlinear or saturated power amplifiers to obtain high power and bandwidth efficiencies. A technique to combine convolutional codes and QPOM schemes to further improve its performance in fading channels is introduced and evaluated. At first, the QPOM scheme is decomposed into an encoder followed by a memoryless modulator. Then, the binary convolutional encoder is concatenated to the QPOM encoder and considered as one entity to be optimized. Performance of the coded QPOM scheme is analyzed and compared to uncoded QPOM and coded QPSK schemes

  • 138.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    IJF-OQPSK modulation schemes with MLSE receivers for portable/mobile communications1992Conference paper (Refereed)
    Abstract [en]

    A receiver structure for constant enveloped IJF-OQPSK modulation under fading channel conditions is introduced. Its performance in AWGN and Rayleigh fading channels was analyzed and verified by computer simulations. Results show the relation between the performance of the system and the memory introduced by the double-interval overlapping pulse shape. By properly using this memory, it is possible to achieve superior performance compared to conventional schemes. Even though no coding has been used, comparable results to coded schemes was obtained with no extra redundancy. Therefore, the complexity caused by multilevel modulation can be avoided, and transmission of signals with compact spectrum and good performance is possible. The constant envelope, compact spectrum, superior performance in fading channels and low complexity make the hardlimited IJF-OQPSK scheme a good choice for portable/mobile communications, to achieve low cost, small size, and high power and bandwidth efficiencies

  • 139.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Maximum likelihood sequence estimation of quadrature pulse-overlapping modulated signals for portable/mobile satellite1992In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 10, no 8Article in journal (Refereed)
  • 140.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QAM signals on a fading mobile satellite channel1994In: AEU - International Journal of Electronics and Communications, ISSN 1434-8411, E-ISSN 1618-0399, Vol. 48, no 2, 68-75 p.Article in journal (Refereed)
  • 141.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QPOM signals on a fading mobile satellite channel1993In: Proceedings of the IEEE Global Telecommunications Conference, IEEE , 1993, 1787-1791 p.Conference paper (Refereed)
    Abstract [en]

    Presents the bit error probability of 16-QPOM schemes over mobile satellite shadowed Rician fading channels. An upper bound on the pairwise error probability is derived, and then combined with the transfer function bounding technique. The derived upper bound is given in a closed form without the need of any numerical integration. This upper bound is then used to evaluate the performance of both linear and hard-limited 16-QPOM signals. Simulation results are also performed to verify the analytical results

  • 142.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QPOM signals on a fading mobile satellite channel1993In: Proceedings of the IEEE 1993 Pacific Rim Conference on Communications, Computers and Signal Processing, 1993, 674-677 p.Conference paper (Refereed)
    Abstract [en]

    The authors present a maximum likelihood sequence estimation (MLSE) receiver structure for both linear and hard-limited 16-quadrature pulse overlapping modulation (QPOM) schemes. Using this structure, the performance of these schemes over shadowed Rician fading channels is studied. The structure of linear 16-QPOM schemes allowed the use of independent decoding for in-phase and quadrature components of the transmitted signal, thus reducing considerably the complexity of the MLSE receiver. The hard-limited 16-QPOM scheme used two hard-limited QPOM schemes in parallel. It is shown that an optimum MLSE receiver for this type of signal needs to consider both in-phase and quadrature components at the same time. Using the MLSE receiver, both schemes outperform conventional coherent 16-quadrature amplitude modulation (QAM)

  • 143.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of quadrature pulse-overlapping modulated signals in Rayleigh fading channels1991In: IEEE Global Telecommunications Conference and Exhibition, 1991, 1802-1806 p.Conference paper (Refereed)
    Abstract [en]

    The authors discuss the average bit error probability of constant envelope quadrature pulse-overlapping modulation and maximum likelihood Viterbi decoding in a Rayleigh fading channel. The quadrature pulse-overlapping modulation is first decomposed into a linear encoder followed by a memoryless modulator. An upper bound on the average bit error probability as a function of the transfer function of the linear encoder is then developed under the assumption of using the Viterbi decoder with perfect fading amplitude measurement. Tightness of the bound was examined by means of computer simulation. A performance comparison with conventional quadrature phase shift keying is also provided

  • 144.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Quadrature Pulse-Overlapping Modulation Techniques1994In: Coded-Modulation Techniques for Fading Channels / [ed] S. Hamidreza Jamali, Tho Le-Ngoc, Kluwer Academic Publishers , 1994Chapter in book (Refereed)
  • 145.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Tight Bounds on the Error Probability of Coded Modulation Schemes in Rayleigh Fading Channels1995In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 44, no 1, 121-130 p.Article in journal (Refereed)
  • 146.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Tight bounds on the error probability of coded modulation schemes in Rayleigh fading channels1994Conference paper (Refereed)
    Abstract [en]

    This paper presents a tight upper bound on the bit error performance of coded modulation schemes in Rayleigh fading channels. Upper and lower bounds on the pairwise error probability are first derived. The upper bound is then expressed in a product form to be used with the transfer function bounding technique. This upper bound has the same simplicity as the union-Chernoff bound while providing closer results to the exact expression. Examples for 4-state and 8-state TCM 8PSK schemes are also given to illustrate the tightness and the application of this upper bound

  • 147.
    Bennani, Zakaria
    KTH, Superseded Departments, Teleinformatics.
    Quality of Service Support for Wireless LANs2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the research and development of mobile computing is becoming increasingly interesting and important to corporations and private users, great efforts are being made to ensure that the wireless network technology is being developed to match the performance level showed by wired network technologies. Introducing wireless mobile computing into already existing and operational situations, that have up to date been taken care of with wired technology, should not mean a degradation of the existing performance level. In other words, there should not be any decrease in the quality of service experienced by the end users due to the mobility or wireless factor.

    When developing quality of service support mechanisms that use characteristics specific to the Internet Protocol, considerations have to be made to make certain that the solutions and implementations developed will be deployable with the next generation Internet Protocol, IPv6. Since the ever decreasing address space in IPv4 is becoming more and more of a problem, at some point migration to IPv6 has to be made. Therefore, this thesis will base its developments on the use of IPv6.

    The thesis concerns the problem of providing statistical QoS guarantees for multimedia applications running over a wireless LAN such as WaveLAN. Using the DiffServ model and support of IPv6, we develop mechanisms for managing QoS and mobility. With the use of pre-connection schemes and a domain routing approach, Mobile Node mobility and Handoffs are handled in such a way to diminish latencies that occur when in-LAN and cross-LAN handoffs are made. To handle QoS guarantees, a bandwidth broker placed in the Access Points manages bandwidth allocations for different cells and configures the traffic parameters of each mobile so that the usage of the wireless MAC layer is controlled. The border router is connected via ATM to core routers in several places in France. Experimentation on the platform involves a DIS application (Distributed Interactive Simulation) running at different sites.

    The development work is done on FreeBSD systems in C.

  • 148.
    Bentahar, Younes
    KTH, School of Information and Communication Technology (ICT).
    DNS prestanda2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Use of computers and computer networks is nowadays a part of everyday life. You do not use them only at home when you sit at you computer, but you can use them all the time everywhere. This can involve everything from surf to any website when you are at home, to checking your email on your mobile when you are on your way to work. Most people do not think about how it really works when they try to access a web page by typing the address into their browser, but something that most people probably notice is how long it can sometimes take to access a web page.

    All items which are directly connected to the IP network have a unique IP address that is used to make it possible to communicate. The IP address is either a period separated sequence of digits representing 32 bits or a colon separated sequence of digits representing 128 bits, depending on whether the address is an IPv4 or IPv6 address. Such numeric sequences are often difficult for us humans to remember therefore, the domain name system (DNS) was constructed. DNS makes it possible for us to write addresses in a textual format to access an item stored in a device connected to the network. DNS can be seen as a directory for the network and can be compared to a telephone directory, where if you know the name of a person can find his or her phone number.

    This thesis will describe how the various address translations are done by using DNS. It will also examine how much impact DNS has on the experienced delay from the time you type a web page address in the address bar of your browser to the actual time you reach the website. A survey of DNS performance will be presented to investigate how much delay can be reduced by using one of Sweden's two most well-known public DNS servers (Google Public DNS and OpenDNS) instead of the normal default DNS server provided by one's Internet service provider (ISP).

    The survey will also show how the DNS lookup waiting time changes at different times of day and different days of the week. The purpose of this work is to provide a basic explanation of what DNS is and increase the understanding of how an everyday user in a simple way can make their network usage more effective by getting their DNS lookups to occur faster.

    The conclusion from this thesis is that the alternative DNS server, Google Public DNS has the fastest DNS lookup time for this particular computer which the measurement was carried on. But this tells us nothing about whether the case for any other network users because the observed DNS performance has a large extent dependent on the ISP you are connected to, and what place you are at.

  • 149. Bentley, Frank
    et al.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Designing From Data: A Case Study From the Health Mashups Service2013In: Workshop on Informing Future Design via Large-Scale Research Methods and Big Data, 2013Conference paper (Refereed)
    Abstract [en]

    Instrumentation of mobile service interactions now allows for the ability to understand use in new ways and to base the design of system iterations as well as future services on data obtained from use “in the wild”over extended periods of time. This position paper will detail a few specific instances in the Health Mashupsproject where we were able to use usage data to improve the design and to create design implications to increase engagement in new services.

  • 150. Bentley, Frank
    et al.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Mobile Service Laboratory (MS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Stephenson, Peter
    Levy, Laura
    Jones, Brian
    Robertson, Scott
    Price, Ed
    Catrambone, Richard
    Wilson, Jeff
    Health Mashups: Presenting Statistical Patterns between Wellbeing Data and Context in Natural Language to Promote Behavior Change2013In: ACM Transactions on Computer-Human Interaction, ISSN 1073-0516, Vol. 20, no 5, 30- p.Article in journal (Refereed)
    Abstract [en]

    People now have access to many sources of data about their health and wellbeing. Yet, most people cannot wade through all of this data to answer basic questions about their long-term wellbeing: Do I gain weight when I have busy days? Do I walk more when I work in the city? Do I sleep better on nights after I work out? We built the Health Mashups system to identify connections that are significant over time between weight, sleep, step count, calendar data, location, weather, pain, food intake, and mood. These significant observations are displayed in a mobile application using natural language, for example, "You are happier on days when you sleep more." We performed a pilot study, made improvements to the system, and then conducted a 90-day trial with 60 diverse participants, learning that interactions between wellbeing and context are highly individual and that our system supported an increased self-understanding that lead to focused behavior changes.

1234567 101 - 150 of 1874
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf