Change search
Refine search result
12 1 - 50 of 86
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Altayr, Hydar
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Adis, Michael
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Utveckling och design av WiGID2003Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The Center for Genomics and Bioinformatics (CGB) is an academic department at Karolinska Institute. Generally stated, the CGB department is committed to the generation and management of genetic information by approaches aiming at elucidating the connection between genes, protein and function.

    WiGID is a genome information database that is available through WAP (Wireless Application Protocol).

    Our version of WiGID is based on WML, PHP and PostgreSQL as a database server.

    One of the changes on the old WiGID application was the creation of a relational database with seven tables and one view, instead of the file that represented the database on the old version. We also changed the script language from python to PHP.

    The search engine ability has been extended with three new search alternatives for a user to choose from. Each choice leads to other, sometimes multiple choices.

    A GUI has been created for the administrator, to be able to insert information into the database.

    The structure of the search engine is primarily for narrowing down the search result on the phone display, thereby making the search efficient.

  • 2. Amon, B.
    et al.
    Ekenberg, L.
    Johannesson, Paul
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Munguanaze, M.
    Njabili, U.
    Tesha, R. M.
    From first-order logic to automated word generation for Lyee2003In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 16, no 07-8, p. 413-429Article in journal (Refereed)
    Abstract [en]

    A conceptual schema can be viewed as a language to describe the phenomena in a system to be modelled, i.e. a set of derivation rules and integrity constraints as well as a set of event-rules describing the behaviour of an object system. In this paper, we investigate the relationship between the Lyee software requirements concepts with various constructs in conceptual modelling. Within our work we choose the Unified Modelling Language (UML) as a modelling notation for explaining conceptual models. The result obtained models a fully expressive set of UML and First Order Logic constructs mapped into Lyee concepts.

  • 3.
    Andersson, Mats
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Person Plus Web: Samples From Everyday Life2003In: Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2003, 2003, p. 1479-1482Conference paper (Refereed)
    Abstract [en]

    In everyday life it is often the result of knowledge that counts, not the actual knowledge itself. There are a lot of theories of how artefacts in one way or another can support human thinking and knowing. Intelligent tools can work as a supporting environment in a similar way that Vygotsky puts forward the Zone of proximal development. This study tries to find some empirical signs of how students use the web with consideration to such theories. Ten students put notes about their web use in a diary and were finally interviewed. The web is a natural part of their life. The result shows that the students use the web 1) as an external memory 2) as a reference and "thought prop" and 3) as a source of inspiration and guidance. A conclusion is that educational systems with traditional views of knowledge should look for opportunities many students already know.

  • 4.
    Andersson, Mats
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Why Do Students Use the Web: What Affordances Are Experienced?2003In: Advances in Technology-based Education: Towards a Knowledge-based Society, 2003, p. 288-292Conference paper (Refereed)
  • 5.
    Bergholtz, Maria
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Jayaweera, Prasad
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Wohed, Petia
    A pattern and dependency based approach to the design of process models2004In: CONCEPTUAL MODELING: ER 2004, PROCEEDINGS, BERLIN: SPRINGER , 2004, Vol. 3288, p. 724-739Conference paper (Refereed)
    Abstract [en]

    In this paper an approach for building process models for e-commerce is proposed. It is based on the assumption that the process modeling task can be methodologically supported by a designers assistant. Such a foundation provides justifications, expressible in business terms, for design decisions made in process modeling, thereby facilitating communication between systems designers and business users. Two techniques are utilized in the designers assistant, namely process patterns and action dependencies. A process pattern is a generic template for a set of interrelated activities between two agents, while an action dependency expresses a sequential relationship between two activities.

  • 6.
    Bider, Ilia
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    State-Oriented Business Process Modeling: Principles, Theory and Practice2002Doctoral thesis, comprehensive summary (Other scientific)
    Abstract [en]

    In the last 50 years, a considerable amount of research workhas been completed in the mathematical system theory and theoryof control. Implementation of the results from this researchinto practice has drastically decreased the production costs.Most production processes are highly automated, and the use ofrobots in industry is growing. As far as office, or businessprocesses are concerned, the situation is quite different.Though the office workers and sales personnel have obtainedmuch help from the modern computers, the office and salesprocesses are far behind the production processes on the levelof automation. The computers are used in the office mainly tohelp in performing various activities, e.g., to write a letter,to print an invoice, to complete a transaction, etc. Thecontrol of the business processes in the office remains, to alarge extent, manual. There is a lot to gain if the controlover business processes could be automated, at leastpartially.

    The material presented in this thesis is aimed to supportthe following hypothesis: "The ideas worked out in the Mathematical system theory formodeling and controlling physical processes can be successfullyused for modeling and controlling business processes." Oneof the main ideas of mathematical system theory is to considera process as a set of valid trajectories in a state space, andthis idea is the keystone for the thesis. The thesis startswith reformulating the state-oriented approach for the domainof business processes to show what kind of sate space can beused in this domain. First, the approach is introducedinformally by means of an example. Next, a possibleformalization adjusted to the properties of business processesis discussed. Then, experimental evidences that the methodsuggested in the thesis can be used in practice are presented.The suggested method is also compared with other methods ofbusiness process modeling to find out the areas where it hasadvantages over the other methods. In the conclusion, theresults are summarized, and plansfor the future are drawn.

    Most of the material included in the thesis has beenpublished and presented at international conferences. Thecontribution of this thesis consists in organizing the materialin support of the main hypothesis.

  • 7.
    Björck, Fredrik
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Institutional theory: A new perspective for research into IS/IT security in organisations2004Conference paper (Refereed)
    Abstract [en]

    The aim of this position paper is to argue for the suitability of an institutional perspective in IS/IT (Information Systems/Information Technology) security research. Institutional theory, including some of its central concepts, is presented, along with examples of how it has been used in information systems research. A discussion of how the theory could benefit managerial IS/IT research concludes the paper.

  • 8. Boeva, V
    et al.
    Ekenberg, Love
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    A transition logic for schemata conflicts2004In: Data & Knowledge Engineering, ISSN 0169-023X, E-ISSN 1872-6933, Vol. 51, no 3, p. 277-294Article in journal (Refereed)
    Abstract [en]

    Conflict detection and analysis are of high importance, e.g., when integrating conceptual schemata, such as UML-Specifications, or analysing goal-fulfilment of sets of autonomous agents. In general, models for this introduce unnecessarily complicated frameworks with several disadvantages regarding semantics as well as complexity. This paper demonstrates that an important set of static and dynamic conflicts between specifications can be diagnosed using ordinary first-order modal logic. Furthermore, we show how the framework can be extended for handling situations when there are convex sets of probability measures over a state-space. Thus, representing specifications as conceptual schemata and using standard Kripke models of modal logic, augmented with an interval-valued probability measure, we propose instrumental definitions and procedures for conflict detection.

  • 9.
    Boström, Gustav
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Database Encryption as an Aspect2004In: AOSD'04 International Conference on Aspect-Oriented Software Development  : Papers, 2004Conference paper (Refereed)
    Abstract [en]

    Encryption is an important method for implementing confidentiality in information systems. Unfortunately applying encryption effectively can be quite complicated. Encryption, as well as other security concerns, is also often spread out in an application making implementation difficult. This crosscutting nature of encryption makes it a potentially ideal candidate for implementation using AOP. In this article we provide an example of how database encryption was applied using AOP with AspectJ on a real-life healthcare database application. Although the attempt was promising with regards to modularity, amount of effort and security engineering, it also revealed problems related to substring queries that need to be solved to make the approach really useful.

  • 10.
    Boström, Henrik
    KTH, Superseded Departments (pre-2005), Computer and Systems Sciences, DSV. Stockholms universitet, Institutionen för data- och systemvetenskap.
    Maximizing the Area under the ROC Curve using Incremental Reduced Error Pruning2005In: Proceedings of the ICML 2005 Workshop on ROC Analysis in Machine Learning, Bonn: AMC Press , 2005Conference paper (Refereed)
  • 11.
    Boström, Henrik
    KTH, Superseded Departments (pre-2005), Computer and Systems Sciences, DSV. Stockholms universitet, Institutionen för data- och systemvetenskap.
    Pruning and Exclusion Criteria for Unordered Incremental Reduced Error Pruning2004In: Proceedings of the Workshop on Advances in Rule Learning at 15th European Conference on Machine Learning, 2004Conference paper (Refereed)
  • 12.
    Brouwers, Lisa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Ekenberg, Love
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Hansson, Karin
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Danielson, Mats
    Multi-criteria decision-making of policy strategies with public-private re-insurance systems2004In: Risk, Decision, and Policy, ISSN 1357-5309, E-ISSN 1466-4534, Vol. 9, no 1, p. 23-45Article in journal (Refereed)
    Abstract [en]

    This article describes an integrated flood catastrophe model as well as some results of a case study made in the Upper Tisza region in north-eastern Hungary: the Palad-Csecsei basin. The background data was provided through the Hungarian Academy of Sciences and complemented by interviews with different stakeholders in the region. Based on these data, for which a large degree of uncertainty is prevailing, we demonstrate how an implementation of a simulation and decision analytical model can provide insights into the effects of imposing different policy options for a flood risk management program in the region. We focus herein primarily on general options for designing a public-private insurance and reinsurance system for Hungary. Obviously, this is a multi-criteria and multi-stakeholder problem and cannot be solved using standard approaches. It should, however, be emphasised that the main purpose of this article is not to provide any definite recommendations, but rather to explore a set of policy packages that could gain a consensus among the stakeholders.

  • 13.
    Brouwers, Lisa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS. KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Hansson, Karin
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    MicroWorlds as a Tool for Policy Making2001In: Proceedings of Cognitive Research with Microworlds / [ed] J J Canada, 2001Conference paper (Refereed)
  • 14.
    Brouwers, Lisa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Verhagen, Harko
    DSV, Stockholm University.
    Applying the Consumat Model to Flood Management Policies2003In: Proceedings of Agent-based Simulations 4 / [ed] SCS-Europe, 2003Conference paper (Refereed)
  • 15.
    Cheng, Yi
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Acomprehensive security infrastructure for mobile agents1997Licentiate thesis, monograph (Other scientific)
  • 16.
    Ciobanu Morogan, Matei
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Generic security objects2000Licentiate thesis, monograph (Other scientific)
  • 17.
    Croné, Maria
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Eliasson, Erik
    KTH, Superseded Departments, Microelectronics and Information Technology, IMIT.
    Mattsson, Johan
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Wiatr, Pawel
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    The Magic Bowl: a Tangible User Interface for Configuration of Interactive Environments2004In: Proceedings of the 6th International Conference on the Design of Cooperative system (COOP04), 2004Conference paper (Refereed)
    Abstract [en]

    This paper describes our work with the design and deployment of a tangible user interface for controlling an interactive workspace. Our intention was to design a user interface that makes it possible to use the room without focusing on the technology behind. We found that the problems are especially at the beginning of a work session when a group enters a totally shut-down workspace and have to spend valuable time starting and configuring every device before they are able to start working. The Magic Bowl makes it possible to quickly start the interactive workspace with a personalized configuration.

  • 18.
    Dahlberg, Leif
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Kvinnoperspektiv: Intervju med Linda Nochlin1992In: Kvinnovetenskaplig tidskrift, ISSN 0348-8365, no 1, p. 54-57Article in journal (Refereed)
  • 19.
    Danielson, Mats
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Computational decision analysis1997Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    This thesis presents a new framework and a tool for decisionmaking using uncertan information. It is called DELTA after itsprimary decision rule. The objective is to present a method forevaluating choices under uncertainty. The nature of mostinformation available to decision makers is vague andimprecise, be it information for human managers inorganisations or for process agents in a distributed computerenvironment. In spite of this, many traditional models fordecisions disregard this state of affairs. Some more modernapproaches address the problem of vagueness, but many of themconcentrate more on representation and less on evaluation. Theemphasis in this thesis is more on evaluation, and therepresentation used is that of standard probability theory.

    The approach is interdisciplinary and draws on ideas fromthe areas of operational research and artificial intelligenceas well as from statistical decision theory. It allows thedecision maker to be as deliberately imprecise as he feels isnecessary as well as providing him with the means forexpressing varying degrees of imprecision in the inputstatements. This leads to a more natural relationship betweenthe decision maker and the support tool. The purpose of themethod is not to replace decision makers with machines. On thecontrary, an objective is to increase the decision maker'sability to make sound decisions.

    A longer summary and updated versions of the core chaptersof the thesis are available athttp://www.dsv.su.se/~mad/thesis.htm1

    KEYWORDS:Decision Analysis, Decision Support,Multi-Agent Systems, Uncertain Reasoning

  • 20.
    Eineborg, Martin
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Inductive logic programming for part-of-speech tagging2002Doctoral thesis, monograph (Other scientific)
  • 21.
    Ekenberg, Love
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    A framework for determining design correctness2004In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 17, no 07-8, p. 249-262Article in journal (Refereed)
    Abstract [en]

    Quality is one of the main concerns in today's systems and software development and use. One important instrument in verification is the use of formal methods, which means that requirements and designs are analyzed formally to determine their relationships. Furthermore, since professional software design is to an increasing extent a distributed process, the issue of integrating different systems to an entity is of great importance in modem system development and design. Various candidates for formalizing system development and integration have prevailed, but very often, particularly for dynamic conflict detection, these introduce non-standard objects and formalisms, leading to severe confusion, both regarding the semantics and the computability. In contrast to such, we introduce a framework for defining requirement fulfillment by designs, detecting conflicts of various kinds as well as integration of heterogeneous schemata. The framework introduced transcends ordinary logical consequence, as it takes into account static and dynamic aspects of design consistency and, in particular, the specific features of the state space of a specification. Another feature of the approach is that it provides a unifying framework for design conflict analysis and schema integration.

  • 22.
    Enoksson, Emmi
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Image classification and optimized image reproduction2003In: TAGA 2003, 2003, p. 33-36Conference paper (Refereed)
    Abstract [en]

    New adapted color charts have been created based on technical and visual image category analysis. A number of tests have been carried out using extreme images with their key information strictly in dark and light areas. It was shown that the image categorization using the adapted color charts improves the analysis of relevant image information with regard to both the image gradation and the detail reproduction. The images with key information in hi-key areas were also test printed using the adapted color charts.

  • 23.
    Enoksson, Emmi
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Image reproduction practices2004In: TAGA 2004, 2004, p. 318-331Conference paper (Refereed)
    Abstract [en]

    Various aspects of image reproduction practices are discussed. The main aim is to simplify image reproduction by implementing a common color language and using a color matching method suitable for the reproduction. To achieve optimized reproduction certain requirements are to be fulfilled mainly knowledge in basic color theory and training in the color reproduction process. Moreover, it is important to have better access to applicable research results in an understandable language and better understanding of available ICC profiling tools and systems on the market.

  • 24.
    Enoksson, Emmi
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Aviander, Per
    The characterization of input devices by luminance and chrominance2003In: Polygraficky seminar, 2003, 2003, p. 10-Conference paper (Refereed)
  • 25.
    Ericsson, Karin
    et al.
    Stockholm University.
    Szalkai, Zsofia
    Kajko-Mattsson, Miroslawa E J
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Mapping CM3: Upfront Maintenance on CGE &Y’s Process Model2004In: Mapping CM3: Upfront Maintenance on CGE&Y’s Process  Model, Knowledge Systems Institute, 2004Conference paper (Refereed)
  • 26.
    Fagerberg, Petra
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Ståhl, Anna
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Höök, Kristina
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    eMoto: emotionally engaging interaction2004In: Personal and Ubiquitous Computing, ISSN 1617-4909, E-ISSN 1617-4917, Vol. 8, no 5, p. 377-381Article in journal (Other academic)
  • 27.
    Fernaeus, Ylva
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Aderklou, Christina
    Tholander, Jakob
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Computational Literacy at Work: Children’s interaction with computational media2004In: Proceedings of the IADIS International Conference on Cognition and Exploratory Learning in Digital Age / [ed] Kinshuk, Demetrios G. Sampson, Pedro Isaías, 2004, p. 181-188Conference paper (Refereed)
    Abstract [en]

    We explore the characteristics of children’s construction of dynamic systems in a school context. This is done through

    analyzing children’s activities when working hands on with a modelling task, and also through informal interviews and

    exhibitions where children described their work to peers and teachers who had not taken part in the activities. Our results

    suggest that handling the technology, relating to others, and negotiating ideas, are prominent aspects in these activities.

    Based on these results, we discuss the different activities involved in learning to create digital constructions and how

    these relate to several important topics that are emphasized in educational research that draws on socio-cultural

    perspectives on action and learning. These include the social context, the role of artefacts and technology, and the ability

    to articulate, express, and discuss.

  • 28.
    Fåhraeus, Eva R
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Distance education students moving towards collaborative learning - A field study of Australian distance education students and systems2004In: EDUC TECHNOL SOC, ISSN 1436-4522, Vol. 7, no 2, p. 129-140Article in journal (Refereed)
    Abstract [en]

    Distance education has been offered to young students in Australia for about 100 years. Recently, information and communication technology has been introduced as a means to improve communication, but not all remote students have access to this new technology. This has made it difficult to arrange collaborative learning for distance-education students. In this student-focused study, more than 40 students as well as teachers and other important persons have been interviewed and observed in schools and on remote farms. Using Activity Theory for the analysis, different contradictions were identified. Lack of technology and access were not the only obstacles. The education was built on a tradition of individual learning, and the technology at hand was not supporting collaboration. However, contradictions may result in 'expansive learning' among students and teachers, leading to more of a development towards collaborative learning.

  • 29.
    Gambäck, Björn
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Processing Swedish sentences: a unification-based grammar and some applications1997Doctoral thesis, monograph (Other scientific)
  • 30. Giambiagi, P.
    et al.
    Dam, Mads
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    On the secure implementation of security protocols2004In: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 50, no 3-Jan, p. 73-99Article in journal (Refereed)
    Abstract [en]

    We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow property based on the idea of invariance under perturbation, relating observable changes in output to corresponding changes in input. Besides the information flow condition itself, the main contributions of the paper are results relating the admissibility property to a direct flow property in the special case of programs which branch on secrets only in cases permitted by the dependency rules. These results are used to derive an unwinding theorem, reducing a behavioural correctness check (strong bisimulation) to an invariant.

  • 31.
    Hansson, Karin
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    The importance of pre mitigation strategies in development planning2004In: RISK ANALYSIS IV / [ed] Brebbia, CA, 2004, Vol. 9, p. 713-723Conference paper (Refereed)
    Abstract [en]

    Natural hazards destroy vital rural infrastructure. In Asia, which accounts for approximately half the number of the natural catastrophes in the world, and 70% of all floods, the average annual cost of floods over the past decade is approximately 15 billion USD [1]. Recovery from disasters is hard to cope with, especially for developing countries. To reduce rural poverty, effective infrastructure projects related to agriculture have proven to be an essential policy tool. In particular, infrastructure development for transportation, irrigation, and electricity plays an important role. Rural infrastructure loss in the developing world has severely affected the activities of the world's international lending institutions. For instance, the World Bank loan to developing countries in the last 20 years, for damages from natural disasters, has been estimated to be 14 billion USD [2]. It is assumed to be financially beneficial for a poor region to be provided with aid as a risk reduction measure instead of post disaster relief. That is, as a pre mitigation strategy in order to reduce the impact of a hazard and reduce risk. However, evaluations of preparedness actions are seldom performed and hard to find. In this article we present a framework for evaluating the possible benefits of a pre mitigation strategy. The framework is based on an earlier performed flood mitigation project in Hungary [3], and extensive literature studies. It must be emphasised that we do not suggest that no aid should be provided after a hazardous event. Instead, hopefully, less aid should be needed since precautions should have been taken before the event.

  • 32.
    Henkel, Martin
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    A framework for understanding the vision, goals, instruments and uses of software services2004In: Journal of Integrated Design & Process Science, ISSN 1092-0617, E-ISSN 1875-8959, Vol. 8, no 1, p. 129-141Article, review/survey (Refereed)
    Abstract [en]

    Software services have been suggested for use in several areas such as business-to-business communication, system integration and as an enabler for virtual enterprises. However, it has not been clear if the use of services in these different areas is guided by a common vision, and if they share goals and technical background. By introducing a framework that relates the vision and goals of software services to different categories of service use, this work presents an overview of the instruments needed for the development of software services. The framework spans across four interrelated parts; the vision, goals, instruments and categories of service use. Firstly a single vision for software services is proposed. This vision is then divided into the three goals of modularity, integration and discovery. Furthermore, the high-level instruments needed to achieve each goal are presented. The use of services is classified into four categories depending on reach and extent i.e.: point wise-internal, point wise-external, infrastructure-internal and infrastructure-external use. The framework presented in this paper shows how these categories of service utilise the defined instruments. As an example of framework use, the instruments needed to create a process-centric service infrastructure for infra-enterprise use is proposed.

  • 33.
    Henkel, Martin
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Architectures for Service-oriented Processes2004In: Procedings of the Nordic Conference on Web Services (NCWS'04): Växsjö, Sweden, November 22-23, 2004, 2004Conference paper (Refereed)
    Abstract [en]

    By the use of Web Service technologies and the Internet it is possible to lay the foundation for virtual value chains that cross enterprise boundaries. As the number of services and their interaction grow, it is evident that the flow of message exchange between services needs to be coordinated in a structured way. Executable process languages such as BPEL are proposed as an instrument for the coordination of services. Executable processes must be designed such that they solve technical coordination problems as well as provide a fundament for organizations to manage and monitor the progress of the business. In this paper we examine how the design of executable processes is affected by both technical and business issues. Furthermore, we examine a set of architectures that enable the use of executable processes to cater to both business and technical needs. We provide fundamental guidelines on how to apply the architectures.

  • 34.
    Henkel, Martin
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Service-Based Processes: Design for Business and Technology2004In: ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing: New York City, NY; 15 November 2004 through 19 November 2004 / [ed] Aiello M., Aoyama M., Curbera F., Papazoglou M.P., 2004, p. 21-29Conference paper (Refereed)
    Abstract [en]

    Composition of software services is a fundamental part in supporting enterprise business processes. Designed properly, executable processes can be used to closely support business processes by the integration of existing software services. In order to support business processes the design of the executable process must closely follow the business events and activities, as perceived by business actors. However, the design must also consider technical issues such as limitations in existing technology and systems. In this paper we examine how technical system constraints influence the realization of business processes. Based on this examination we present a set of realization types that describes the transformation from a business process into its realization as an executable process. We also propose design criteria that need to be adhered to in order to cater to both business and technical needs.

  • 35.
    Johannesson, Paul
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    NLDB20022004In: Data and Knowledge Engineering, ISSN 0169-023X, Vol. 48, no 2, p. 153-154Article in journal (Refereed)
  • 36.
    Johannesson, Paul
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Fujita, Hamido
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Special issue on 'legacy systems and software change'2004In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 17, no 7-8, p. 237-238Article in journal (Refereed)
  • 37.
    Johannesson, Paul
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Perjons, E.
    Design principles for process modelling in enterprise application integration2001In: Information Systems, ISSN 0306-4379, E-ISSN 1873-6076, Vol. 26, no 3, p. 165-184Article in journal (Refereed)
    Abstract [en]

    There is a growing need for Enterprise Application Integration (EAI) technologies, which align the applications of an organisation to its business processes. Such technologies require an adequate methodological support so that well-structured and easily understandable models can be constructed. In this paper, such a methodological support is proposed by introducing principles for the design, validation and presentation of process models and associated data models. By applying these principles, we obtain different views of the models, and thereby facilitate the use of common models for different stakeholders, e.g. business managers, designers and operators.

  • 38.
    Kabilan, Vandana
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Using multi tier contract ontology to model contract workflow models2003Licentiate thesis, monograph (Other scientific)
    Abstract [en]

    Legal Business Contracts govern the business relationshipbetween trading business partners. Business contracts are likeblueprints of expected business behaviour from all thecontracting parties involved. Business contracts bind theparties to obligations that must be fulfilled by expectedperformance events. Contractual violations can lead to bothlegal and business consequences. Thus it is in the bestinterests of all parties concerned to organise their businessprocess flows to be compliant to the stipulated businesscontracts terms and conditions.

    However, Contract Management and Business Process Managementin the current information systems domain are not closelyintegrated. Also it is not easy for business domain experts orinformation systems experts to understand and interpret thelegal terms and conditions into their respective domain needsand requirements. This thesis addresses the above two issues inan attempt to build a semantic bridge across the differentdomains of a legal business contract. This thesis focuses onthe contract execution phase of typical business contracts andas such views contract obligations as processes that need to beexecuted and monitored. Business workflows need to be as closeas possible to the stated contract obligation executionworkflow.

    In the first phase, a framework for modelling andrepresenting contractual knowledge in the form of Multi TierContract Ontology (MTCO) is proposed. The MTCO uses conceptualmodels as knowledge representation methodology. It proposes astructured and layered collection of individual ontologiesmoving from the top generic level progressively down tospecific template ontologies. The MTCO is visualised as areusable, flexible, extendable and shared knowledge base.

    In the second phase, a methodology for deducing the ContractWorkflow Model (CWM) is proposed. The CWM is deduced from theMTCO and a contract instance document in a stepwise userguideline. The CWM outlines the preferred choreography ofbusiness performance that successfully fulfils the execution ofcontract obligations. The deduced CWM is visualised as an aidto monitor the contract, as a starting point for businessprocess integration and business process workflow design.

  • 39.
    Kajko-Mattsson, Mira
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Evolution and maintenance of web service applications2004In: 20th IEEE International Conference on Software Maintenance,  proceedings, 2004, p. 492-493Conference paper (Refereed)
    Abstract [en]

    In this paper, we suggest a panel debate on evolution and maintenance of web services. The panel will discuss the evolution and maintenance of web service applications.

  • 40.
    Kajko-Mattsson, Mira Miroslawa
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Problem management maturity within corrective maintenance2002In: Journal of Software Maintenance and Evolution: Research and Practice, ISSN 1532-060X, E-ISSN 1532-0618, Vol. 14, no 3, p. 197-227Article in journal (Refereed)
    Abstract [en]

    CM3: Problem Management is a first detailed descriptive problem management process model to be utilized within corrective maintenance. It is the result of a long-term empirical study of industrial corrective maintenance processes. It has been developed at ABB and evaluated for its industrial relevance within 17 non-ABB organizations. Playing the role of a descriptive model, CM3: Problem Management specifies what a problem management process should look like. It also structures it into three maturity levels, Initial, Defined, and Optimal, where each level offers a different grainedness of process visibility. In this paper, we present the CM3 levels of problem management process maturity within corrective maintenance and match them against the industrial state of practice. Our goal is to establish the current status of problem management maturity using CM3: Problem Management as an evaluation model. Our evaluation results show that the industrial processes today suffice to attend to software problems within corrective maintenance. Very few of them, however, do learn from the past in order to prevent future problems and to improve development or maintenance processes.

  • 41.
    Kajko-Mattsson, Mira Miroslawa
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Problems within front-end support2004In: Journal of Software Maintenance and Evolution: Research and Practice, ISSN 1532-060X, E-ISSN 1532-0618, Vol. 16, no 04-5, p. 309-329Article in journal (Refereed)
    Abstract [en]

    Within corrective maintenance, the front-end support mainly assists the customer- and back-end maintenance organizations in the communication of corrective maintenance demands. This implies receiving problem reports from customers, transferring them on to the back-end maintenance organization/vendor, and delivering problem solutions from the back-end maintenance organization/vendor to the customers. In this paper, we identify problems as experienced within 37 front-end support organizations in Sweden. Our results show a great variety of problems within the organizations studied. The dominating problems are the complexity of applications, customer knowledge, and complexity of support organizations.

  • 42.
    Kajko-Mattsson, Mira Miroslawa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Ahnlund, Cecilia
    Lundberg, Elisabeth
    CM(3): Service Level Agreement2004In: 20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2004, p. 432-436Conference paper (Refereed)
    Abstract [en]

    To be able to provide support to the customers in their daily operation, one must not only have an efficient support process, but also an agreement on the types and quality of the services to be provided Such an agreement is usually called Service Level Agreement (SLA). In this paper, we suggest an SLA model and show how it is realised within four organisations in Sweden. Our model is called CM(3) : SLA, and is part of a major model called CM(3) : SLA/OLA.

  • 43.
    Kajko-Mattsson, Mira Miroslawa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Chapin, N.
    Data mining for validation in software engineering: An example2004In: International journal of software engineering and knowledge engineering, ISSN 0218-1940, Vol. 14, no 4, p. 407-427Article in journal (Refereed)
    Abstract [en]

    Consider two independently done software engineering studies that used different approaches to cover some of the same subject area, such as software maintenance. Although done differently and for different purposes, to what extent can each study serve as a validation of the other? Within the scope of the subject area overlap, data mining can be applied to provide a quantitative assessment. This paper reports on the data mining that attempted to cross validate two independently done and published software engineering studies of software maintenance, one on a corrective maintenance maturity model, and the other on an objective classification of software maintenance activities. The data mining established that each of the two independently done studies effectively and very strongly validates the other.

  • 44.
    Kajko-Mattsson, Mira Miroslawa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Forssander, S.
    Andersson, G.
    Software problem reporting and resolution process at ABB Robotics AB: state of practice2000In: Journal of Software Maintenance: Research and Practice, ISSN 1040-550X, E-ISSN 1096-908X, Vol. 12, no 5, p. 255-285Article in journal (Refereed)
    Abstract [en]

    A well-functioning process for reporting, analysing and resolving software problems is an important vehicle for establishing and I retaining control over the development and maintenance of software products, In this paper we present such a process. its state of practice and its role within corrective software maintenance. This process is utilized at ABB Robotics AB and is called the System Progress Report process (SPR), The SPR process is the result of our 20 years of work and experience. This paper concludes with our lessons learned and plans for future improvements.

  • 45.
    Kajko-Mattsson, Mira Miroslawa
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Jonson, Marcus
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Koroorian, Saam
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Westin, F
    Lesson learned from attempts to implement daily build2004In: CSMR 2004: EIGHTH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, LOS ALAMITOS: IEEE COMPUTER SOC , 2004, p. 137-146Conference paper (Other academic)
    Abstract [en]

    We were commissioned to establish one organisation's possibility to implement a daily build process. For this purpose, we have developed a model aiding us in evaluating, the organisation's readiness to implement the process. In this paper, we present our evaluation model and the lesson learned from using it when attempting to determine the organisation's readiness to fully integrate a daily build process with their already extant software development and evolution processes.

  • 46.
    Kajko-Mattsson, Miroslawa E J
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Taxonomy of Front-End Support Activities2004In: Journal of Integrated Design & Process Science, ISSN 1092-0617, E-ISSN 1875-8959, Vol. 8, no 1, p. 19-29Article in journal (Refereed)
    Abstract [en]

    High diversity and complexity of front-end support processes in combination with their poor process visibility renders measurement and improvement of development, evolution and maintenance processes less reliable. Today, we have very little knowledge and insight into the front-end support processes and their activities, despite the fact that they are the dominating cost within evolution and maintenance. The area of front-end support is under-researched. The standard process models barely touch on this subject. Most of the extant models advocate the improvement of mainly back-end processes. Very few of them however, propose the improvement of their supporting front-end processes - the processes that extensively mediate or eliminate the need for changes. In this paper, we have identified 15 classes of front-end support activities within 37 support organisations in Sweden. These classes constitute a basis for building future front-end support process models, and process improvement- and measurement models. They are also useful for optimal integration with other organisational processes, such as development, evolution and maintenance.

  • 47.
    Kajko-Mattsson, Miroslawa E J
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Upfront Corrective Maintenance at the Front-End Support Level2004In: Managing Corporate Information Systems Evolution and Maintenance, Khaled Khan , 2004Chapter in book (Other academic)
  • 48.
    Kapidzic Cicovic, Nada
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Extended certificate management system: design and protocols1997Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    This thesis presents an Extended Certificate ManagementSystem (ECMS), a possible solution for a global certificationinfrastructure. The system is based on a combined trust modelthat interconnects different types of security domains, fromindividual users, small organisations to arbitrarily complexorganisations. All entities within one security domainestablish their trust in a single trust point. The securitydomains are interconnected through cross certificationrelationships between their trust points.

    The thesis identifies a number of ECMS entities anddescribes in detail each of their roles. It also specifiesdifferent functions that each of the system entities mayperform during their lifetime. Each of these functions isperformed through an exchange of a number of special ECMSmessages, as specified by ECMS protocols. The protocols betweensystem entities, and the messages exchanged as part of theprotocols are specified at the level of formal definition.

    ECMS provides users of the system with certificationservices, which can be accessed through ECMS Clients. Thestructure and functionsof the ECMS Client, as well asapplication programming interfaces, through which differentsecurity applications can access the services of ECMS, are alsodefined in this thesis.

  • 49.
    Karlgren, Jussi
    KTH, Superseded Departments, Computer and Systems Sciences, DSV. Stockholm University.
    An algebra for recommendations: Using reader data as a basis for measuring document proximity1990Report (Other academic)
    Abstract [en]

    A measure for proximity between documents is defined, based on data from readers. This proximity measure can be further investigated as a tool document retrieval, and as to provide data for concept formation experiments.

  • 50.
    Karlgren, Jussi
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS. KTH, Superseded Departments (pre-2005), Computer and Systems Sciences, DSV.
    Regulation of Unpredictable Effects of Decision Making Systems is Non-trivial2018In: 50 Years of Law and IT: The Swedish Law and Informatics Research Institute 1968-2018 / [ed] Peter Wahlgren, Stockholm: The Stockholm University Law Faculty , 2018, p. 127-132Chapter in book (Other academic)
    Abstract [en]

    Technical advances are rapidly delegating decision making in newarenas of human activity to information systems through theapplication of new classification mechanisms from machine learningresearch. How to manage technology-induced change and its effectsthrough legislative systems in order to encourage and supportbehaviour and activities which is desirable and beneficial to thepublic good and dissuade from such which is not is non-trivial. Ingeneral, legislation to cover new technical advances will be based onexisting technology and existing practice. This may seen reasonablebasis to build from and adds legitimacy to regulation and itsapplication, but regulation of technology too often stumbles at thebalancing line between under- standing and promoting future changeproductively and protecting past practice. This paper argues that morethought must be put into the aims of regulatory activities.

12 1 - 50 of 86
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf