Change search
Refine search result
34567 251 - 300 of 348
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 251. Russell, N.
    et al.
    Van Der Aalst, W. M. P.
    Ter Hofstede, A. H. M.
    Wohed, Petia
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    On the suitability of UML 2.0 Activity Diagrams for business process modelling2006In: Conferences in Research and Practice in Information Technology, 2006Conference paper (Refereed)
    Abstract [en]

    UML is posited as the "swiss army knife" for systems modelling and design activities. It embodies a number of modelling formalisms that have broad applicability in capturing both the static and dynamic aspects of software systems. One area of UML that has received particular attention is that of Activity Diagrams (ADs), which provide a high-level means of modelling dynamic system behaviour. In this paper we examine the suitability of UML 2.0 Activity Diagrams for business process modelling, using the Workflow Patterns as an evaluation framework. The Workflow Patterns are a collection of patterns developed for assessing control-flow, data and resource capabilities in the area of Process Aware Information Systems (PAIS). In doing so, we provide a comprehensive evaluation of the capabilities of UML 2.0 ADs, and their strengths and weaknesses when utilised for business process modelling.

  • 252.
    Rusu, Lazar
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Wireless technologies issues in designing and implementation of a communication infrastructure within an organization2005In: Proceedings of the 4th International Conference on Business Informatics Research, BIR 2005, University of Skovde , 2005, Vol. 2005, no 2, p. 97-106Conference paper (Refereed)
    Abstract [en]

    This paper describes the wireless technologies issues when we wanted to design and implement a communication infrastructure within an organization in order to improve performance of learning and teaching and create new models for active learning. In this context we have outline a comparison between the wireless and wired Local Area Networks (LAN) in four aspects: scalability, reliability, performance and cost for emphasis of advantages and disadvantages between them. In addition, this paper addresses the wireless LAN security issues that must be considered before wireless devices can be used in education scenarios. The paper also describes the safety issues associated with the level of radiation in a wireless LAN environment and clarify the effects on people health, when they are using the wireless devices in general and particularly in education process. In order to the see the practical results of the wireless technologies applications in designing and implementation of a communication infrastructure within an organization I have used a case study done in a Stockholm high school and I have analyzed the solutions adopted and developed here including the benefits of designing and implementation of a wireless LAN in a education environment.

  • 253.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Chen, Liang
    Deficiency of credibility: Bottleneck to e-business in China2008In: INFORMATION MANAGEMENT IN THE MODERN ORGANIZATIONS: TRENDS & SOLUTIONS / [ed] Soliman, KS, GARDEN CITY PARK: INT BUSINESS INFORMATION MANAGEMENT ASSOC-IBIMA , 2008, p. 663-666Conference paper (Refereed)
    Abstract [en]

    In the lost few years, China e-business market has experienced a very difficult adjustment. After surmounting the obstacles of cash flow and commodity flow, credibility construction becomes the next bottleneck to overcome. Therefore the aims of this paper is to analyze the cause for the deficiency of credibility reveal its major impacts on e-business development and suggest further solutions to this problem.

  • 254.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    El Mekawy, Mohamed
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    The Strategic Role of IT: A Case Study of Two Swedish Retail Companies2010In: INFORMATION SYSTEMS: PEOPLE, ORGANIZATIONS, INSTITUTIONS, AND TECHNOLOGIES / [ed] DAtri A; Sacca D, BERLIN: SPRINGER-VERLAG BERLIN , 2010, p. 559-567Conference paper (Refereed)
    Abstract [en]

    The purpose of this paper is to study how IT can play a strategic role in retail business through a case study research approach of two Swedish companies. The main focus in this research approach is looking to examine: (1) how IT supports business and organizational strategies and (2) how business-IT strategies can be aligned. For this purpose we have applied two evaluation frameworks through which we have analyzed the business, organizational and IT strategies and compared business-IT alignment maturity. Finally, we have concluded with a discussion and suggestions for (a) successful relationship between three business, information and organizational strategies and for (b) improving business-IT strategic alignment that will help the IT decision makers in these retail companies to understand in which areas they should act in order to improve the strategic use of IT resources.

  • 255.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    El Mekawy, Mohamed
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Hodosi, Georg
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Information Technology Leadership in Swedish Leading Multinational Corporations: A WEB SCIENCE PERSPECTIVE, PROCEEDINGS2009In: LECT NOTE ARTIF INTELL, 2009, Vol. 5736, p. 511-522Conference paper (Refereed)
    Abstract [en]

    This paper presents a comparative study of the Chief Information Officer (CIO) role, responsibilities, profile and the IT impact in five leading multinational corporations (MNCs) in Sweden. The first part of the paper comprehends a research review regarding the CIO role, responsibilities and barriers that the CIO is facing today in MNCs with references to the European business environment. After that in the second part of the paper a comparative analysis is provided regarding the CIO role, responsibilities and CIO profile using the Sojer et al. model [25] in the Swedish leading MNCs. Moreover the paper is providing in this part an analysis upon if the CIO is adding value by using Earl and Fenny profile [7]. In the last part of the paper an analysis is done concerning the IT impact in the Swedish MNCs by using McFarlan strategic grid framework [20] together with IT strategies used by the CIOs to support the business operations and strategies. The results of this analysis provide a detail overview that can be usefully for Swedish IT executives or top managers about the development of the CIO role, responsibilities and profile.

  • 256.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    El-Mekawy, Mohamed
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hodosi, Georg
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Mahmoud, Mahmoud
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Adding value to IT Outsourcing practices in global companies: A case study of Electrolux2008In: INFORMATION MANAGEMENT IN THE MODERN ORGANIZATIONS: TRENDS & SOLUTIONS / [ed] Soliman, KS, GARDEN CITY PARK: INT BUSINESS INFORMATION MANAGEMENT ASSOC-IBIMA , 2008, p. 667-673Conference paper (Refereed)
    Abstract [en]

    In today's business, organizations seek to optimize the use of their global IT resources therefore IT Outsourcing (ITO) is a toot that enables this optimization, especially when resources with specific competence are needed. The purpose of this paper is to examine what can be learned from best practices regarding ITO in case of Electrolux a Swedish leading global company. We have done that by carrying out a critical analysis of the ITO success factors by analyzing different aspects of ITO in case of Electrolux, and also by using transaction cost economics (TCE). Moreover, in our analysis, we have considered as important factors the outsourcing drivers and models and types of outsourcing that we have identified to have a great impact on the IT outsourcing practices and outcomes.

  • 257.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Huang, Yu
    Rizvi, Ali Turab
    KTH, School of Information and Communication Technology (ICT).
    Strategic IT alignment in Swedish public healthcare system2008In: Emerging Technologies And Information Systems For The Knowledge Society, Proceedings / [ed] Lytras, MD; Carroll, JM; Damiani, E; Tennyson, RD, 2008, Vol. 5288, p. 105-113Conference paper (Refereed)
    Abstract [en]

    Information and communication technology (ICT) is not only beneficial for the business sector but has a lot to offer for the public sector as well. in fact, the public sector can benefit the most by the advancement of ICT that it offers numerous potential benefits in terms of improvements for patients, health and elderly care professionals and decision makers. In this context this research paper has studied the healthcare sector in Stockholm and has analyzed if their IT strategy is aligned with the government strategy. During this analysis we have found a lot of models developed for the alignment of business and IT strategy but we haven't found any model for the alignment of IT with the government strategy. Therefore in the analysis we have done in this paper we have proposed an integrated model and used the Swedish healthcare system as a case study in order to see if their IT strategy is aligned with their government's strategy.

  • 258.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lin, Yifeng
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Hodosi, Georg
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Management Guidelines for Database Developers' Teams in Software Development Projects: knowledge, learning, development and technology for all2009In: Communications in Computer and Information Science , 2009, Vol. 49, p. 377-386Conference paper (Refereed)
    Abstract [en]

    Worldwide job market for database developers (DBDs) is continually increasing in last several years. In some companies, DBDs are organized as a special team (DBDs team) to support other projects and roles. As a new role, the DBDs team is facing a major problem that there are not any management guidelines for them. The team manager does not know which kinds of tasks should be assigned to this team and what practices should be used during DBDs work. Therefore in this paper we have developed a set of management guidelines, which includes 8 fundamental tasks and 17 practices from software development process, by using two methodologies Capability Maturity Model (CMM) and agile software development in particular Serum in order to improve the DBDs team work. Moreover the management guidelines developed here has been complemented with practices from authors' experience in this area and has been evaluated in the case of a software company. The management guidelines for DBD teams presented in this paper could be very usefully for other companies too that are using a DBDs team and could contribute towards an increase of the efficiency of these teams in their work on software development projects.

  • 259.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Man, Yi
    KTH.
    RFID technology applications in mobile payment2007In: Information Management In The Networked Economy: Issues & Solutions / [ed] Soliman, KS, 2007, p. 511-516Conference paper (Refereed)
    Abstract [en]

    In the last years, the development of information and communication technologies has brought significant changes in the business world. In this perspective Radio Frequency Identification (RFID) technology is one of the wireless technologies used mainly to control, detect and track objects that have many applications today mainly in retailing, healthcare and security. On the other hand the RFID applications are numerous but as Jar as we have investigate till now not many studies were done and focus on mobile payment area. In fact in our view we see mobile payment as one of the new set-vices that it could bring a lot of new opportunities to enterprises who are struggling in the drastic competition on the business market and it could also makes people's life much easier and more convenient than before. Meanwhile, most people still feel confused about how to use RFID technology in mobile payment and how RFID technology it could bring benefits to them. For this reason, this paper is looking to analyze different case studies that are mainly focuses on the applications of RFID technology in mobile payment in different countries. Therefore in our analysis we have selected different kinds of applications of RFID technology, such as Stockholm Congestion Charges Project and i-mode Felica of NTT DoCoMo and we have analyzed mainly their benefits together with the advantages and disadvantages of their use in that particular area of application.

  • 260.
    Rusu, Lazar
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Sobaih, El-Mekawy Mohamed
    Haseeb, Nabeel Ahmad
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    ERP systems implementation: Characteristics and critical success factors: A case study of Electrolux2007In: Information Management In The Networked Economy: Issues & Solutions / [ed] Soliman, KS, 2007, p. 501-508Conference paper (Refereed)
    Abstract [en]

    The new era of business information systems promises a sagacity of information flow among different modules and departments within an organization. In this context Enterprise Resource Planning (ERP) systems or enterprise systems are playing today a crucial part and their advantages and benefits gained are noteworthy. Therefore the paper has analyzed and identified which are the key aspects of the ERP systems implementation such as their critical success factors and their characteristics using as a case study Electrolux that has continue to maintain their strategic advantage on the business market in spite that the competitors have implemented global ERP systems versus lite local ERP systems implemented by Electrolux. Based upon the review of other ERP systems implementation out research has looked mainly to highlight the processes streamlined by using local ERP systems that are integrated now in Electrolux which is in fact a global organisation. The main research questions addressed in the paper were looking to: (1) Highlight the characteristics of the ERP systems that are essential for any enterprise system and in particular in the case of Electrolux ERP system; (2) The examination of the different critical success factors of an ERP system implementation in order to improve the organization business information flow: (3) The investigation of how can organizations improve their practices in successfully implementation of their ERP systems. Finally the research paper it is analyzing why in the designing phase of different processes, it is important to involve both the customers and the users with their needs which in case of Electrolux has due to the increased of their benefits from ERP systems implementation locally.

  • 261.
    Saffarian, Mohsen
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ciobanu Morogan, Matei
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A Novel Protocol to Prevent Malicious Nodes from Misdirecting Forward Ants in AntNet Algorithm2008In: PROCEEDINGS OF THE 23RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, NEW YORK: ASSOC COMPUTING MACHINERY , 2008, p. 1849-1853Conference paper (Refereed)
    Abstract [en]

    AntNet is an adaptive multi-agent routing algorithm inspired by ants' behavior, which can be used for the management of highly dynamic networks such as internet and wireless networks. Making use of their ability to autonomously migrate from one node to another, AntNet's forward ants explore the current condition of the network and then backward ants update the routing information stored on each node accordingly [3]. Although in comparison with other routing algorithms, AntNet have a better performance, especially regarding the load balancing factor, they are vulnerable against several security threats [8]. One important security threat is that a malicious node (router) can easily misdirect a forward ant to a node which is not located in the best path towards the destination node of that ant. In this paper this threat is precisely described and a protocol to mitigate it is suggested and to some extent analyzed. It is important to note that this threat arises from the nature of free-roaming mobile agents and thus, it exists in other routing algorithms utilizing such agents as well.

  • 262.
    Sahin, Nazli Yasemin
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Cloud ERP Security: Guidelines for Evaluation2013Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    The aim of this study is to investigate and discuss the potential security issues arising from deploying of the cloud Enterprise Resource Planning technology, which may be inherent in the conventional Enterprise Resource Planning systems and Cloud Computing. Literature reviews and interviews point out some common concerns regarding cloud Enterprise Resource Planning but there was dissidence between provider and customers perspectives. This study underlines the security concerns both from user and provider perspectives in order to contribute current knowledge about the Cloud Enterprise Resource Planning.

    This study was conducted by applying a qualitative research methodology and six semi-structured interviews with professionals on ERP, Cloud Computing and cloud ERP, both from user and provider perspectives. During the interviews, it has found that cloud ERP technology can help users to reduce burden of data security, availability and maintenance since the services established by Cloud ERP provider. As a result of this study, observed security issues are data security, authentication& authorization, architecture, threats, implementation of ERP and compliance. These security issues are categorized into three headers according to their relevance: First, issues inherited from conventional ERP systems and Cloud Computing, secondly new issues that arose with cloud ERP, and thirdly issues to be solved by cloud ERP.

  • 263. Samuelsson, Y.
    et al.
    Täckström, O.
    Velupillai, Sumithra
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Eklund, J.
    Fišel, M.
    Saers, M.
    Mixing and blending syntactic and semantic dependencies2008In: CoNLL - Proc. Twelfth Conf. Comput. Nat. Lang. Learn., 2008, p. 248-252Conference paper (Refereed)
    Abstract [en]

    Our system for the CoNLL 2008 shared task uses a set of individual parsers, a set of stand-alone semantic role labellers, and a joint system for parsing and semantic role labelling, all blended together. The system achieved a macro averaged labelled F 1- score of 79.79 (WSJ 80.92, Brown 70.49) for the overall task. The labelled attachment score for syntactic dependencies was 86.63 (WSJ 87.36, Brown 80.77) and the labelled F 1-score for semantic dependencies was 72.94 (WSJ 74.47, Brown 60.18).

  • 264.
    Sandholm, Thomas
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Autoregressive Time Series Forecasting of Computational Demand2007Report (Other academic)
    Abstract [en]

    We study the predictive power of autoregressive moving average models when forecasting demand in two shared computational networks, PlanetLab and Tycoon. Demand in these networks is very volatile, and predictive techniques to plan usage in advance can improve the performance obtained drastically.

    Our key finding is that a random walk predictor performs best for one-step-ahead forecasts, whereas ARIMA(1,1,0) and adaptive exponential smoothing models perform better for two and three-step-ahead forecasts. A Monte Carlo bootstrap test is proposed to evaluate the continuous prediction performance of different models with arbitrary confidence and statistical significance levels. Although the prediction results differ between the Tycoon and PlanetLab networks, we observe very similar overall statistical properties, such as volatility dynamics.

  • 265.
    Sandholm, Thomas
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Statistical Methods for Computational Markets: Proportional Share Market Prediction and Admission Control2008Doctoral thesis, comprehensive summary (Other scientific)
    Abstract [en]

    We design, implement and evaluate statistical methods for managing uncertainty when consuming and provisioning resources in a federated computational market. To enable efficient allocation of resources in this environment, providers need to know consumers' risk preferences, and the expected future demand. The guarantee levels to offer thus depend on techniques to forecast future usage and to accurately capture and model uncertainties. Our main contribution in this thesis is threefold; first, we evaluate a set of techniques to forecast demand in computational markets; second, we design a scalable method which captures a succinct summary of usage statistics and allows consumers to express risk preferences; and finally we propose a method for providers to set resource prices and determine guarantee levels to offer. The methods employed are based on fundamental concepts in probability theory, and are thus easy to implement, as well as to analyze and evaluate. The key component of our solution is a predictor that dynamically constructs approximations of the price probability density and quantile functions for arbitrary resources in a computational market. Because highly fluctuating and skewed demand is common in these markets, it is difficult to accurately and automatically construct representations of arbitrary demand distributions. We discovered that a technique based on the Chebyshev inequality and empirical prediction bounds, which estimates worst case bounds on deviations from the mean given a variance, provided the most reliable forecasts for a set of representative high performance and shared cluster workload traces. We further show how these forecasts can help the consumers determine how much to spend given a risk preference and how providers can offer admission control services with different guarantee levels given a recent history of resource prices.

  • 266.
    Sandholm, Thomas
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Lai, Kevin
    Hewlett-Packard Laboratories, Information Dynamics Laboratory, Palo Alto.
    A Statistical Approach to Risk Mitigation in Computational Markets2007In: Proceedings of the 16th International Symposium on High Performance Distributed Computing 2007, HPDC'07, 2007, p. 85-96Conference paper (Refereed)
    Abstract [en]

    We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers whopurchase services expect both price and performance guarantees. They need to predict future demand to budget for sustained performance despite price fluctuations. Conversely, providers need to estimate demand to price future usage. The skewed and bursty nature of demand in large-scale computer networks challenges the common statistical assumptions of symmetry, independence, and stationarity. This discrepancy leads to under estimation of investment risk. We confirm this non-normal distribution behavior in our study of demand in computational markets. The high agility of a dynamic resource market requires flexible, efficient, and adaptable predictions. Computational needs are typically expressed using performance levels, hence we estimate worst-case bounds of price distributions to mitigate the risk of missing execution deadlines. To meet these needs, we use moving time windows of statistics to approximate price percentile functions. We use snapshots of summary statistics to calculate prediction intervals and estimate model uncertainty. Our approach is model-agnostic, distribution-free both in prices and prediction errors, and does not require extensive sampling nor manual parameter tuning. Our simulations and experiments show that a Chebyshev inequality model generates accurate predictions with minimal sample data requirements. We also show that this approach mitigates the risk of dropped service level performance when selecting hosts to run a bag-of-task Grid application simulation in a live computational market cluster.

  • 267.
    Sandholm, Thomas
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lai, Kevin
    Informations Dynamics Laboratory, HP Labs, Palo Alto.
    Evaluating Demand Prediction Techniques for Computational Markets2006In: GECON ’06: Proceedings of the 3rd Interna-tional Workshop on Grid Economics and Business Models, 2006Conference paper (Refereed)
  • 268.
    Sandholm, Thomas
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Lai, Kevin
    Hewlett-Packard Laboratories, Information Dynamics Laboratory, Palo Alto.
    Prediction-Based Enforcement of Performance Contracts2007In: Grid Economics and Business Models / [ed] Altmann, J; Veit, DJ, 2007, Vol. 4685, p. 71-82Conference paper (Refereed)
    Abstract [en]

    Grid computing platforms require automated and distributed resource allocation with controllable quality-of-service (QoS). Market-based allocation provides these features using the complementary abstractions of proportional shares and reservations. This paper analyzes a hybrid resource allocation system using both proportional shares and reservations. We also examine the use of price prediction to provide statistical QoS guarantees and to set admission control prices.

  • 269.
    Sandholm, Thomas
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC. KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lai, Kevin
    Hewlett-Packard Laboratories, Information Dynamics Laboratory, Palo Alto.
    Andrade, Jorge
    KTH, School of Biotechnology (BIO), Gene Technology.
    Odeberg, Jacob
    KTH, School of Biotechnology (BIO), Gene Technology.
    Market-Based Resource Allocation using Price Prediction in a high performance computing Grid for scientific applications2006In: Proceedings of the IEEE International Symposium on High Performance Distributed Computing 2006, 2006, Vol. 15th IEEE International Symposium, p. 132-143Conference paper (Refereed)
    Abstract [en]

    We present the implementation and analysis of a market-based resource allocation system for computational Grids. Although Grids provide a way to share resources and take advantage of statistical multiplexing, a variety of challenges remain. One is the economically efficient allocation of resources to users from disparate organizations who have their own and sometimes conflicting requirements for both the quantity and quality of services. Another is secure and scalable authorization despite rapidly changing allocations.

    Our solution to both of these challenges is to use a market-based resource allocation system. This system allows users to express diverse quantity- and quality-of-service requirements, yet prevents them from denying service to other users. It does this by providing tools to the user to predict and tradeoff risk and expected return in the computational market. In addition, the system enables secure and scalable authorization by using signed money-transfer tokens instead of identity-based authorization. This removes the overhead of maintaining and updating access control lists, while restricting usage based on the amount of money transferred We examine the performance of the system by running a bioinformatics application on a fully operational implementation of an integrated Grid market.

  • 270.
    Sandholm, Thomas
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lai, Kevin
    Information Dynamics Laboratory, Hewlett-Packard Laboratories, Palo Alto.
    Clearwater, Scott
    Admission Control in a Computational Market2008In: Proceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid / [ed] Priol, T.; Lefevre, L.; Buyya, R., 2008, p. 277-286Conference paper (Refereed)
    Abstract [en]

    We propose, implement and evaluate three admission models for computational Grids. The models take the expected demand into account and offer a specific performance guarantee. The main issue addressed is how users and providers should make the tradeoff between a best effort (low guarantee) spot market and an admission controlled (high guarantee) reservation market. Using a realistically modeled high performance computing workload and utility models of user preferences, we run experiments highlighting the conditions under which different markets and admission models are efficient. The experimental results show that providers can make large efficiency gains if the admission model is chosen dynamically based on the current load, likewise we show that users have an opportunity to optimize their job performance by carefully picking the right market based on the state of the system, and the characteristics of the application to be run. Finally, we provide simple functional expressions that can guide both users and providers when making decisions about guarantee levels to request or offer.

  • 271. Saretok, Paul
    et al.
    Brouwers, Lisa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Microsimulation of Pandemic Influenza in Sweden2007In: 2007  International Conference On Health Sciences Simulation (ICHSS' 07) / [ed] The Society for Modelling and Simulation International (ScS), 2007Conference paper (Refereed)
  • 272.
    Schmölzer, Gernot
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Teiniker, Egon
    Kreiner, Christian
    Model-typed component interfaces2008In: Journal of systems architecture, ISSN 1383-7621, E-ISSN 1873-6165, Vol. 54, no 6, p. 551-561Article in journal (Refereed)
    Abstract [en]

    Component based software engineering (CBSE) allows to design and develop reusable software components that can be assembled to construct software systems via well defined interfaces. However, designing such reusable components for data intensive business logic often requires heavy data transfer between components over interfaces. Static interface definitions using basic data types or structures of such lead to large interfaces susceptible to modifications. The goal of this paper is to present model-typed interfaces based on generic interface parameters, which allows to transfer complex structured data between components. Providing such generic, model-defined types (MDT) with data models specifying the parameter structure supports compatibility checks of model-typed interfaces at platform independent system design time. The methodology is described platform independently and the coherency with our system development process is discussed. Moreover, a technology mapping to IDL and the CORBA component model (CCM) is illustrated.

  • 273.
    Shahzad, Khurram
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    From conventional to multiversion data warehouse: Practical issues2009In: Evolving Application Domains of Data Warehousing and Mining: Trends and Solutions, IGI Global, 2009, p. 41-63Chapter in book (Refereed)
    Abstract [en]

    The Data warehouse is not an autonomous data store, because it depends upon its operational source(s) for data population. Due to changes in real-world scenarios, operational sources may evolve, but the conventional data warehouse is not developed to handle the modifications in evolved operational sources. Therefore, instance and schema changes in operational sources cannot be adapted in the conventional data warehouse without loss of information. Multiversion data warehouses are proposed as an alternative to handle these problems of evolution. In this chapter we discuss and illustrate how versioning is implemented and how it can be used in practical data warehouse lifecycle. It is designed as a tutorial for users to collect and understand the concepts behind a versioning solution. Therefore, the purpose of this chapter is to collect and integrate the concepts, issues and solutions of multiversion data warehouses in a tutorial-like approach, to provide a unified source for users that need to understand version functionality and mechanisms.

  • 274.
    Shahzad, Khurram
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Semi-star schema for operational and analytical requirements of SMEs2009In: International Journal of Management and Decision Making, ISSN 1462-4621, E-ISSN 1741-5187, Vol. 10, no 1-2, p. 33-52Article in journal (Refereed)
    Abstract [en]

    Decision-making is a very complex process, as it requires complete knowledge and analysis of the business happenings. Large organisations are using data warehouse for analysis of their business because of its specialised properties. But, these organisations bear high maintenance cost, if operational sources are changed. Small and medium enterprises (SMEs) cannot afford development and maintenance cost of data warehouse therefore their decision quality suffers. In order to equip these enterprises with data warehousing functionalities, key-properties of DW are analysed and decision-support (analytical) requirements of SMEs are collected. Based on the analysis, semi-star schema is proposed and evaluated for its advantages. In our study, we have found that semi-star schema can be used for fulfilling operational and analytical requirements of SME.

  • 275.
    Shahzad, Khurram
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Jayaweera, Prasad
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Elicitation of Requirements for a Business Process Model Repository2009In: BUSINESS PROCESS MANAGEMENT WORKSHOPS / [ed] Ardagna D; Mecella M; Yang J, 2009, Vol. 17, p. 44-55Conference paper (Refereed)
    Abstract [en]

    Today, there exist a number of process repositories with the aim of supporting the reuse of process models. Designing such repositories is a complex task, which should be guided by clear requirements. In order to support the development of future process repositories, we propose and justify a set of requirements for such repositories. These requirements are based on a number of essential properties of process repositories as well as a set of use cases. Furthermore, we carry out a Survey and evaluation of a number of existing repositories based on the requirements identified in this paper.

  • 276. Shahzad, Khurram
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    An evaluation of process warehousing approaches for business process analysis2009In: EOMAS 2009 - International Workshop on Enterprise and Organizational Modeling and Simulation, Held in Conjunction with CAiSE 2009, 2009, p. 1750417-Conference paper (Refereed)
    Abstract [en]

    Execution of a process model produces data that can be used for analysis and optimization of business processes. For several years, data warehouse (DW) technology has been used for analysis and decision making. A data warehouse developed for business processes is called a process warehouse. The capabilities of a process warehouse are seldom evaluated, since a generic framework that can be used for the evaluation is missing. Therefore, in this paper, we develop a generic framework called Process Analysis Framework (PAF) that can be used for evaluating analysis capabilities of a process warehouse. Furthermore, the framework has been used to evaluate various process warehousing approaches, collected through a comprehensive survey.

  • 277.
    Shahzad, Khurram
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Mustafa, G.
    Virtual data warehouse: Implementation and experimental comparison2010In: International Journal of Management and Decision Making, ISSN 1462-4621, E-ISSN 1741-5187, Vol. 11, no 1, p. 69-88Article in journal (Refereed)
    Abstract [en]

    The purpose of this paper is to evaluate the virtual data warehousing (VDW) concept, by evaluating its capabilities to solve the problems that are identified in recent studies. In this study, we have developed a tool (called VDW-tool), with the capability of implementing virtual data warehouse, and proposed a framework (called 4-DEF), for evaluation of data warehouse. In order to evaluate the virtual data warehouse, we have compared its capabilities with conventional data warehouse, by means of 4-DEF framework. To demonstrate that, results from four experimental case studies are included in this paper. It is found that virtual data warehouse not only enhances schema and content flexibility, but it also provides on-the-fly data for decision support purposes. Furthermore, our experiments demonstrate that the performance of conventional data warehouse (DW) is slightly better than virtual data warehouse, as long as the size of DW is not too large.

  • 278.
    Shahzad, Khurram
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Sohail, A.
    A systematic approach for transformation of ER Schema to dimensional schema2009In: Proceedings of the 6th International Conference on Frontiers of Information Technology, FIT '09, 2009, p. 1838060-Conference paper (Refereed)
    Abstract [en]

    Development of Star model for data warehouse (DW) requires ample amount of time, experience, expertise and adequate knowledge of data warehouse designing steps. As an alternative to data warehouse designing steps, transformation techniques are used. These techniques transform ER model (of relational OLTP) to Star model/s. In this study, we present and evaluate a systematic approach for transformation of ER model to Star model. Based on an experiment, we prove that, by using our approach, inexperienced designers can produce Star models identical to the star models produced by experienced data warehouse designers.

  • 279.
    Shahzad, Muhammad Khurram
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Improving Business Processes using Process-oriented Data Warehouse2012Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The Business Process Management (BPM) lifecycle consists of four phases: design and analysis, configuration, enactment, and evaluation - also known as performance analysis and improvement. Performance analysis and improvement of business processes, one of the core phases in the BPM life cycle, is becoming on top of the agenda for many enterprises. An emerging approach to that is to use the business intelligence approaches that attempt to facilitate the analytical capabilities of business process management systems by implementing process-oriented data warehouse and mining techniques. However, little work has been has done on developing core methods and tools for performance analysis and improvement of business processes. In particular, adequate methods, clearly defined steps or instructions that can guide process managers for analyzing and improving processes using process warehouse (PW) are not available. In the absence of such methods, guidelines or clearly defined steps, important steps may be ignored and credible improvements steps cannot be taken.

    This research addresses the described limitations by developing a method for performance analysis and improvement of business processes. The key feature of the developed method is, it employs business-orientation in the design and utilization of a PW. The method is composed of three steps, building goal-structure, integrating goal-structure with PW, and analyzing and improving business processes. During the first step, a set of top-level performance goals are identified for the process of interest. Subsequently, the identified  goals are decomposed to generate a goal-structure that is aligned with the functional decomposition of the process of interest. The second step describes a technique for integrating the generated goal-structure with PW. The third step describes, a performance estimation model, a decision model and a step by step approach that focuses on utilizing PW for analysis and improvement of business processes.

    In order to facilitate the use of the proposed method a prototype is developed. The prototype offers a graphical user interface for defining goal structure, integrating goals with PW, and goal-based navigation of PW. In order to evaluate the proposed method, we first develop an evaluation framework and subsequently use it for the evaluation of the proposed method. The framework consists of three components, each representing a type of evaluation. The components are, methodological-structure evaluation, performance-based evaluation and perception-based evaluation. The results of the evaluation show partial support for the methodological structure. However, the results of performance and perception evaluation show promising results of the proposed method.

  • 280.
    Shahzad, Muhammad Khurram
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Recent issues identified and conceptualized for simulating business scenarios in multi-version data warehouse2006In: International Journal of Soft Computing, ISSN 1816-9503, Vol. 1, no 2, p. 97-102Article in journal (Refereed)
    Abstract [en]

    Data Warehouse provides an opportunity to analyze businesses in order to precise decision- making, various tools has been build and used for such purpose. But due to static structure of DW it is unable to manage changes in external sources, also simulating various scenarios can increase the decision efficiency, for such purpose Multi-Version Data Warehouse is proposed which contains two types of versions called real and alternative. But due to diversity in simulations two types of alternative versions has been proposed. Also for querying these versions we are extending the functionality of Synthetic Warehouse Builder. This study presents the challenges we are facing and visualizing during the extensions.

  • 281.
    Shibli, Awais
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Security Infrastructure and Applicationsfor Mobile Agents2010Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network and distributed environments more conveniently, robustly, and efficiently than traditional client-server applications. But, in spite of significant benefits of the mobile agent paradigm, the technology is still mainly in a research domain and so far it has not been adopted on a large scale by the industry and users. One of the reasons for that is security related issues and security concerns.

    Current research in the area of mobile agents’ security is focused mainly on protection and security of agents and agents’ runtime platforms. But most of the currently available mobile agent systems do not support comprehensive security requirements for a general mobile agents paradigm. Therefore, there is a need for a complete and comprehensive security infrastructure for mobile agents, not only in the form of security services and mechanisms for agents’ runtime execution, but also as a complete set of infrastructural components, along with methodology for creation, classification, adoption, and validation of mobile agents before their deployment in real-environments. In addition, protection of mobile agents code and their baggage during execution is also needed. The lack of such concept, infrastructure and security solutions is hindrance for wider adoption of mobile agent systems at the time of this research.

    In our research, we solve these comprehensive requirements with solutions that can be classified in two groups: The first group is solutions for designing, implementation and deployment of a security infrastructure for mobile agents, along with methodology for secure deployment and execution of mobile agents. The proposed infrastructure for mobile agents is based on a methodology for creation, classification and validation of trusted mobile agents. It includes security architecture for publishing, discovery and adoption of mobile agents. Moreover, it provides integrated system for mobile agent deployment that supports launching, authorization and execution of mobile agents. Mobile agents execution is based on a protective approach, as compared to traditional detective or preventive methods, that not only provides code protection, but code execution and data privacy as well.

    The second group is solutions for use of security infrastructure and, in particular, secure and trusted mobile agents for real-life applications. The main result in this group is the design and implementation of a network intrusion detection and prevention system based on mobile agents. The system efficiently solves several problems of existing IDS/IPS. It can detect new vulnerabilities before they are exploited by hackers, it can process and filter large volumes of log entries, it reacts to intrusions in real–time, it provides protection against unknown attacks, it supports and improves commercial IDS/IPS products, and it also efficiently handles software patches. The system not only improves use of existing popular IDS/IPS, but it also eliminates several of their core problems. In addition, it is self–protected by full encryption, both of mobile agents and their execution platforms, and therefore not vulnerable to attacks against its own components and resources.

  • 282.
    Shibli, Muhammad Awais
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Building Secure Systems using Mobile Agents2006Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.

  • 283.
    Shibli, Muhammad Awais
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. NUST School of Electrical Engineering and Computer Sciences, Pakistan .
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Intrusion detection and prevention system using secure mobile agents2008In: SECRYPT - Int. Conf. Secur. Cryptography, Proc., 2008, p. 107-113Conference paper (Refereed)
    Abstract [en]

    The paper describes design and architecture of the intrusion detection and prevention system based on secure mobile agents along with the analysis of commercial products and current research efforts in the area. Once system will be operational it will be the first comprehensive real-life application using mobile agents that will not only provide security to network resources but also provide security and protection to the mobile agents system itself. The system efficiently solves several problems with the existing IDS/IPS solutions: it can detect new vulnerabilities, it can process and filter large volumes of logs, it reacts to intrusions in real-time, provides protection against unknown attacks, supports and improves IDS/IPS commercial products by different vendors, and handles software patches. The system not only improves the existing IDS/IPS solutions, but it also eliminates several of their core problems. In addition, it is self-protected by full encryption, both mobile agents and their platforms, and therefore not vulnerable to attacks against its own components and resources.

  • 284.
    Shibli, Muhammad Awais
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Magicnet: Security architecture for authorization of mobile agents2009In: Proceedings of the 3rd International Conference on Internet Technologies and Applications, ITA 09, 2009, p. 506-513Conference paper (Refereed)
    Abstract [en]

    Controlling access to resources at remote hosts by mobile agents during their execution is a challenging problem. Current solutions use mainly methodology that detects agents' incorrect access attempts to a particular resource. For that purpose agents' execution logs are checked in order to identify malicious activities or misuse of resources at a particular host. As an alternative, instead of detective approach, we focus on preventive approach for control of access by mobile agents. While detective approach may provide some protection, its primary shortcoming is that it does not provide protection of resources in advance, before access, and in fact requires post-fact manual intervention and activation of countermeasures. With our solution we provide a solution to authenticate and authorize agents at remote hosts before executing any action. The architecture of our system is based on RBAC XACML policies and SAML standards.

  • 285.
    Shibli, Muhammad Awais
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. NUST, Islamabad, Pakistan .
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    MagicNET: Security architecture for discovery and adoption of mobile agents2010In: 2009 Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009, 2010, p. 5683056-Conference paper (Refereed)
    Abstract [en]

    Current research in the area of security for mobile agents deals mainly with the runtime issues of agents' protection. Mobile agent systems do not address precisely the process of acquiring mobile agents by their owners, but they assume that the agents are somehow already available for use. This assumption is acceptable for experimental or prototyping environments, but it is inadequate for the real world scenarios where agents should be trusted and reliable, but agent creators and agent owners are separated and manage agents from mutually remote locations. Thus, the issue of agents' adoption for use in serious, sensitive and business networks is very important if agents are used in real-life applications. In this paper we describe the architecture and procedures for secure, verifiable and authenticated discovery and adoption of mobile agents. The main contribution is that in this process agent's code and its functionality can be verified, so that such agents can be deployed in serious applications and scenarios.

  • 286.
    Shibli, Muhammad Awais
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Yousaf, Imran
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Dar, Kashif
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    MagicNET: Secure communication methodology for mobile agents2010In: The 12th International Conference on Advanced Communication Technology: lCT for Green Growth and Sustainable Development, Phoenix Park, Korea, Feb. 7-10, 2010, proceedings : ICACT 2010, 2010, p. 1567-1573Conference paper (Refereed)
    Abstract [en]

    Most of the current research and development results, dealing with authentication of mobile agents, describe solutions that address only agent-to-platform authentication. These solutions assign privileges to agents so that they can be executed and then, by using the same privileges, also to communicate with other agents running on the same platform. They do not address broader agent-to-agent communication security requirements. Moreover, communication protocols are not based on any standards, what increases the possibilities of communications between benign and malicious agents. In this paper we describe agent-to-agent secure communication methodology that guarantees authenticated, authorized and confidential communication between agents. We use FIPA ACL standard for effective and interoperable communication in our agent-based system.

  • 287.
    Siddiqui, Afzal
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Fleten, Stein-Erik
    How to proceed with competing alternative energy technologies: A real options analysis2010In: Energy Economics, ISSN 0140-9883, E-ISSN 1873-6181, Vol. 32, no 4, p. 817-830Article in journal (Refereed)
    Abstract [en]

    Concerns about CO(2) emissions create incentives for the development and deployment of energy technologies that do not use fossil fuels. Indeed, such technologies would provide tangible benefits in terms of avoided fossil-fuel costs, which are likely to increase as restrictions on CO(2) emissions are imposed. However, a number of challenges need to be overcome prior to market deployment, and the commercialisation of alternative energy technologies may require a staged approach given price and technical risk. We analyse how a firm may proceed with staged commercialisation and deployment of competing alternative energy technologies. An unconventional new alternative technology is one possibility, where one could undertake cost-reducing production enhancement measures as an intermediate step prior to deployment. By contrast, the firm could choose to deploy a smaller-scale existing renewable energy technology, and, using the real options framework, we compare the two projects to provide managerial implications on how one might proceed.

  • 288.
    Skoglund, Mats
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Runeson, Per
    A case study of the class firewall regression test selection technique on a large scale distributed software system2005In: 2005 International Symposium on Empirical Software Engineering (ISESE), Proceedings, NEW YORK: IEEE , 2005, p. 74-83Conference paper (Refereed)
    Abstract [en]

    Regression testing is expensive and may consume much of organizations' software development budgets. Thus, it is of interest to reduce the total time devoted to test execution by using test selection techniques. Many techniques have been proposed but few have been evaluated on real-world, large scale systems. In this paper we report on an empirical evaluation of using the class firewall regression test selection technique, in combination with scenario testing, on a large scale industrial software system using the Java byte code in the analysis. The study was performed on a large complex distributed software system in one of Sweden's largest banks. Effects of using scenario testing together with regression test selection are reported. The results are that not all test cases were selected by the class firewall selection technique. Using scenario testing, where test cases are dependent,. affects the number of test cases selected, as do the location and number of changes in the system.

  • 289.
    Skoglund, Mats
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Runeson, Per
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Improving class firewall regression test selection by removing the class firewall2007In: International journal of software engineering and knowledge engineering, ISSN 0218-1940, Vol. 17, no 3, p. 359-378Article in journal (Refereed)
    Abstract [en]

    One regression test selection technique proposed for object-oriented programs is the Class firewall regression test selection technique. The selection technique selects test classes for regression test, which test changed classes and classes depending on changed classes. However, in empirical studies of the application of the technique, we observed that another technique found the same defects, selected fewer tests and required a simpler, less costly, analysis. The technique, which we refer to as the Change-based regression test selection technique, is basically the Class firewall technique, but with the class firewall removed. In this paper we formulate a hypothesis stating that these empirical observations are not incidental, but an inherent property of the Class firewall technique. We prove that the hypothesis holds for Java in a stable testing environment, and conclude that the effectiveness of the Class firewall regression testing technique can be improved without sacrificing the defect detection capability of the technique, by removing the class firewall.

  • 290.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Double-loop learning conversations in an online community on overweight2005In: IADIS International Conference on Cognition and Exploratory Learning in Digital Age, 2005, p. 383-386Conference paper (Refereed)
    Abstract [en]

    The members of online health-communities are growing in number. One type of health-community is the one for people who suffer from overweight, who want to change behavior to lose weight. Learning a new behavior calls for investigating patterns of events, to question the way events are presented, and to create new mental models. This paper presents the results from a study of learning conversations held in an online community on overweight. In the conversations on learning, the most frequently used type of response was the one sympathizing with the ideas and beliefs of the sender, while the least used type of response was the one that rejected the ideas presented by the sender. Furthermore, there were more examples of members who presented counter-ideas in the conversations on obstacles and incentives than in the conversations on personal setbacks.

  • 291.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Enabling Cross-Usage of Public Health Systems - A Holistic Approach to Ask the Expert Systems and Online Communities2008In: ICDS 2008: SECOND INTERNATIONAL CONFERENCE ON THE DIGITAL SOCIETY, PROCEEDINGS / [ed] Berntzen L, Smedberg A, LOS ALAMITOS: IEEE COMPUTER SOC , 2008, p. 102-106Conference paper (Refereed)
    Abstract [en]

    The number of users of health systems on the Internet has increased at a rapid pace. The systems are browsed for health information, and online interactions take place with medical experts as well as with people who have similar health problems. This paper presents a study of the usage of two different types of health systems: Ask the Expert system and online communities for people with overweight. The study focused on the different types of questions as well as information, advice and recommendations posted in the systems. Starting point of the study was the questions and answers presented in the Ask the Expert system. The results show how the systems serve as complements, and suggestions on how to enable the users to easily cross-use the systems are presented. Such development could help the users to get a fuller picture and better understanding of different health issues.

  • 292.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    How to combine the online community with ask the expert system in a health care site2007In: 1st International Conference on the Digital Society, ICDS 2007, IEEE conference proceedings, 2007Conference paper (Refereed)
    Abstract [en]

    Online communities and so-called Ask the Expert systems aim at supporting online interaction for knowledge sharing and learning. One area where these kinds of knowledge tools have become widely used is the health care sector. Through online interaction, medical trained experts can help people with concerns about diseases and other health-related problems, and those who suffer from a certain health issue can come together to share experiences and advice. During recent years, studies have been done of the usage of different knowledge tools. However, holistic studies of the use of the two tools for online interaction have not been done. This paper presents results from a study of an online health-community and an Ask the Expert system for people who suffer from overweight. Differences and similarities in regards to knowledge sharing are presented.

  • 293.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Learning conversations for people with established bad habits: A study of four health communities2008In: International Journal of Healthcare Technology and Management, ISSN 1368-2156, E-ISSN 1741-5144, Vol. 9, no 2, p. 143-154Article in journal (Refereed)
    Abstract [en]

    During recent years, online communities on the internet have grown in number. One area where these communities have become widely used is the healthcare sector. Besides the online communities for people who suffer from diseases, there are also communities for people who want to get rid of bad habits and learn how to develop a new behaviour. The question is how these communities manage to trigger learning. In this article, a study of the patterns of conversations in four online health-communities on bad habits is presented. The study focused on the usage of counter acts for learning purposes. The communities showed a relatively low frequency of responses that included opposition and counter-ideas. However, most of the time when these occurred, the community members managed to stay neutral or even balance opposition with empathy.

  • 294.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Online Health-Communities on Bad Habits for Preventive Care2008In: 4th Kuala Lumpur International Conference On Biomedical Engineering 2008, Vols 1 And 2 / [ed] AbuOsman, NA; Ibrahim, F; WanAbas, WAB; AbdulRahman, HS; Ting, HN, 2008, Vol. 21, no 1-2, p. 291-294Conference paper (Refereed)
    Abstract [en]

    This paper presents the results from a study of people with established bad habits and their conversations together in online health-communities. Target groups of the study have been overweight people, smokers, and alcohol and drug abusers who want to change life-style. The conversation issues raised in the communities were categorized based on the type of content. Frequency of the different types of issues was stated, and differences as well as similarities between the communities were investigated. Finally, suggestions on how to help community members to further develop conversations for learning purposes were proposed. Such a new design could also help active members as well as lurkers to more easily browse the communities for a certain type of conversation.

  • 295.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Web Communities for Preventive Health Care - Experienced Usability and Health Impact among Smokers and Overweight People2010In: SECOND INTERNATIONAL CONFERENCE ON EHEALTH, TELEMEDICINE, AND SOCIAL MEDICINE: ETELEMED 2010, PROCEEDINGS / [ed] Finkelstein J; Ossebaard HC; VanGemertPijnen, LOS ALAMITOS: IEEE COMPUTER SOC , 2010, p. 153-158Conference paper (Refereed)
    Abstract [en]

    The number of web based health communities has increased during the latest years, and so has also the number of users. Among these, we find the health communities for people who suffer from lifestyle problems. These communities aim at helping people change their habits, and thereby preventing them from getting severe illnesses later. The communities are used for conversations about everyday struggles for a healthier lifestyle, and they contain issues concerning treatments, exercises, motivation, setbacks, etc. The question is in what ways and to what extent these communities support self-management among the members. This paper presents the results from a survey to members of a web community on overweight and another one on smoking. The results showed the members' appreciation for existing conversational topics on facts and motivation. They also thought that answers in which the senders offer new perspectives were valuable and could increase.

  • 296.
    Smedberg, Åsa
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Weight control and conversations in an online health-community on overweight2007In: 3rd Kuala Lumpur International Conference on Biomedical Engineering 2006 / [ed] Ibrahim, F; Osman, NAA; Usman, J; Kadri, NA, 2007, Vol. 15, p. 668-671Conference paper (Refereed)
    Abstract [en]

    This paper presents the results from a two month-long study of a group of people participating in an online health-community on overweight. The relation between their contributions in the community and their experienced weight change was investigated. The results show a tendency towards that the greater weight loss the community members experienced the more active they were in the conversations. When focusing on the online discussions more specifically concerned with learning problems, this relation was even more evident.

  • 297.
    Sneiders, Eriks
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Automated FAQ Answering with Question-Specific Knowledge Representation for Web Self-Service2009In: Proceedings - 2009 2nd Conference on Human System Interactions, HSI '09, New York: IEEE , 2009, p. 298-302Conference paper (Refereed)
    Abstract [en]

    Automated FAQ answering is a valuable complement to web self-service: while the vast majority of site searches fail, our FAQ answering solution for restricted domains answers two thirds of the queries with accuracy over 90%. The paper is shaped as a best practice summary. The reader will rind out how the shortcomings of site search are overcome by FAQ answering, what kind of techniques for FAQ retrieval are available, why question-specific knowledge representation is arguably most appropriate for restricted domains, and what peculiarities of running an FAQ answering service for a customer service may be expected.

  • 298. Stadler, Michael
    et al.
    Siddiqui, Afzal
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Marnay, Chris
    Aki, Hirohisa
    Lai, Judy
    Control of greenhouse gas emissions by optimal DER technology investment and energy management in zero-net-energy buildings2011In: European transactions on electrical power, ISSN 1430-144X, E-ISSN 1546-3109, Vol. 21, no 2, p. 1291-1309Article in journal (Refereed)
    Abstract [en]

    The U.S. Department of Energy has launched the commercial building initiative (CBI) in pursuit of its research goal of achieving zero-net-energy commercial buildings (ZNEB), i.e., ones that produce as much energy as they use. Its objective is to make these buildings marketable by 2025 such that they minimize their energy use through cutting-edge, energy-efficiency technologies and meet their remaining energy needs through on-site renewable energy generation. This paper examines how such buildings may be implemented within the context of a cost-or CO2-minimizing microgrid that is able to adopt and operate various technologies: photovoltaic (PV) modules and other on-site generation, heat exchangers, solar thermal collectors, absorption chillers, and passive/demand-response technologies. A mixed-integer linear program (MILP) that has a multi-criteria objective function is used. The objective is minimization of a weighted average of the building's annual energy costs and CO2 emissions. The MILP's constraints ensure energy balance and capacity limits. In addition, constraining the building's energy consumed to equal its energy exports enables us to explore how energy sales and demand-response measures may enable compliance with the ZNEB objective. Using a commercial test site in northern California with existing tariff rates and technology data, we find that a ZNEB requires ample PV capacity installed to ensure electricity sales during the day. This is complemented by investment in energy-efficient combined heat and power (CHP) equipment, while occasional demand response saves energy consumption. A large amount of storage is also adopted, which may be impractical. Nevertheless, it shows the nature of the solutions and costs necessary to achieve a ZNEB. Additionally, the ZNEB approach does not necessary lead to zero-carbon (ZC) buildings as is frequently argued. We also show a multi-objective frontier for the CA example, which allows us to estimate the needed technologies and costs for achieving a ZC building or microgrid.

  • 299.
    Stirna, Janis
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Persson, A.
    The practice of enterprise modeling:First IFIP WG 8.1 working conference, poem 2008 stockholm, sweden, november 12-13, 2008 proceedings2008In: 1st IFIP WG 8.1 Working Conference on Practice of Enterprise Modeling, PoEM 2008, 2008Conference paper (Refereed)
  • 300.
    Stirna, Janis
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Persson, A.
    Aggestam, L.
    Building knowledge repositories with enterprise modelling and patterns: From theory to practice2006In: Proceedings of the 14th European Conference on Information Systems, 2006Conference paper (Refereed)
    Abstract [en]

    An approach to building knowledge repositories, Enterprise Knowledge Patterns (EKP), has been developed and applied throughout a number of research projects, most recently in the ELEKTRA, HyperKnowledge1 and EKLär projects. The EKP approach combines Enterprise Modelling with organisational patterns. Systematic evaluations of applying the approach have been carried out in two of the projects, while the third project is currently running. The aim of this paper is to provide an overview of the evaluation results and to share practical experiences from building knowledge repositories with Enterprise Modelling and organisational patterns. We discuss issues concerning the knowledge content of pattern based knowledge repositories, the language used to express knowledge in organisational patterns and technology support for storing and retrieving knowledge components. .

34567 251 - 300 of 348
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf