• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 382
  • 116
  • Tagged with
  • 498
  • 498
  • 498
  • 498
  • 498
  • 471
  • 27
  • 10
  • 10
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

A Case Study of a Norwegian Scrum Project

Lervåg, Alf Børge Bjørdal January 2006 (has links)
<p>In this paper I present a case study of a Norwegian development project where the development team adopted practices from Scrum in the middle of the development effort. My study shows that the developers were happy with this new development method, and among other things thought it gave them a better focus and structure for their work. Since the team only adopted practices from the Scrum method, I look at the differences between their method and Scrum and suggest a few improvements to their method based on my knowledge of Scrum and development methods in general.</p>
202

Information Security in Distribued Health Information Systems in Scandinavia : A Comparative Study of External Conditions and Solutions for Exchange and Sharing of Sensitive Health Information in Denmark, Norway and Sweden

Brox, Elin Anette January 2006 (has links)
<p>Exchange and sharing of sensitive health information have to happen according to prevailing external conditions established by laws, regulations and liable authorities. These external conditions create various limitations, making requests for adaptative health information systems. Especially, when developing new solutions, defining the balance between protection of personal privacy and availability of information, is a great challenge. Several projects are working on possible solutions to the problem of sharing health information in a distributed way. Based on two different pilot projects in each of the countries Denmark, Norway and Sweden, and seen from an information security perspective, this thesis does a comparison of external conditions and various approaches to these conditions. Main focus is on the Scandinavian health legislation, but organisation of health services will also be considered briefly. The objective is to acquire new knowledge about and to contribute to the debate concerning exchange and sharing of health information. The results of this project are founded on an inductive multiple case study, and empirical data have been collected through semi-structured interviews. Through this thesis, it has become evident that health care in the Scandinavian countries is upon the whole equally organised and struggles with many of the same technological challenges. All three countries' health legislation promotes personal integrity, with Sweden as the most expressive. Nevertheless, there is a tendency towards enhancement of the patient's autonomy and a request for more united health care processes, leading to needs for new types of technological tools to ensure information security. In order to meet these requests, common national technological standards, concepts and infrastructure have become more important. In addition, the systems made have to be in accordance with Acts and regulations. Parts of the prevailing legislation are to a hindrance for exchange and sharing of information across organisational borders. The technological solutions chosen within the scope of the limiting external conditions are generally well-defined, high quality systems which have information security in focus. Still, there has become evident that some weak points exist, and there is room for improvements. In order to make health care of higher quality and ensure information security to an even larger degree, legal amendments and a more extensive national co-operation will arrange for the possibility of developing better information security solutions.</p>
203

Clinical Portal : A Case Study of User Support in Integrated Hospital Information Systems

Horn, Marianne, Steen, Thea Christine January 2006 (has links)
<p>The complexity of medical work, the amount of heterogenous user groups, and the large amount of both paper-based and computer-based information systems existing at hospitals, indicate the difficulty of implementing computer-based hospital information systems. Our work is a case study of a system that handles this challenge by integrating a set of source systems in a service oriented architecture. The services and data implemented by its source systems and its architectural service layer is presented through one single portal application system. We have investigated the impact the chosen approach may have on the system's ability to provide efficient user support. Our results pointed to two main challenges; an excessive information load in the user interface, and a general scepticism to paperless information systems among the users. On the basis of our case and literature study we have tried to assess how customization of user interface components and system services, possibly could improve the user support. Our analysis suggests that extended customization should be postponed until the users are accustomed to, and have accepted the usage of, computer-based information systems in relation to the relevant activities.</p>
204

Evaluating Security in Open Source Consumer Applications

Ballester Lafuente, Carlos January 2007 (has links)
<p>Introduction The aim of this Master Thesis is to develop a software security guideline that will be used for evaluating methods and measuring security in open source projects with a high security implication such as healthcare applications for example, where the privacy and security is a crucial factor. Background Theory First section of thesis is focused on presenting the appropriate background theory that will be needed for a good understanding of the rest of the thesis, like vulnerabilities, common security attacks, definition of the client-server technology, risk analysis and specific theory about Indivo and the healthcare field. Methods The method chosen to develop the guideline was the waterfall model as time was quite limited and only one iteration could be done. That’s why no other methods like the spiral model were used, as they require several iterations until achieving functionality. Results After applying the guideline, several vulnerabilities were found, like session hijacking or capturing login information on real time. The guideline proved to be useful in revealing serious security issues that should be fixed, and into describing the purpose and the logic of decisions made in early stages like organizational or design stage. Conclusion Both the development of the Security Guideline and the posterior testing of the guideline were considered successful, as a working methodology was established and several security issues were revealed in Indivo.</p>
205

Ontology-driven and rules-based system for management and pricing of family of product.

Dedeban, Vincent January 2007 (has links)
<p>This report presents an approach to product family management using semantic technologies. There is a need for more flexible configuration management and pricing, explicitly representing domain knowledge and configuration rules. The thesis investigates requirements, needs and current issues to support product family in order to figure out the best candidate technologies. Ontology and rules are chosen to carry out the project. Our approach is applied to a case study provided by Det Norske Veritas Software, a company offering solutions for maritime, offshore and process industries. The contacts with the company have strengthened our work as the client helped us to clarify the problem and validate the suggested method. The report discusses pros and cons of semantic technologies applied in this context. Semantic technologies and rules help to create highly flexible system that allows supporting product family engineering. Our work highlights consistency improvements and redundancy diminution in features models.</p>
206

Open Source Software: critical review of scientific literature and other sources

Querol del Amo, Marc January 2007 (has links)
<p>This thesis presents the results of a survey of Open Source Licensing literature. It aims to assist the reader in choosing the best license for his/her business. For this reason, the content of this thesis can be divided into: (i) an open source licensing overview, (ii) the explication of the main features of the most popular open source licenses, (iii) the consequences of using one or another and (iv) the critical or controversial issues related to Open Source Licensing. Furthermore, at the end of the thesis, the reader can ¯nd the method we followed to collect, classify and analyze the relevant information for the purpose of the survey.</p>
207

Selection of Open Source Components - A Qualitative Survey in Norwegian IT Industry

Gerea, Marina Marinela January 2007 (has links)
<p>Empirical research is performed to verify theories, develop new theories, or extend the existing ones, and improve practice. This study is mainly used to gain understanding about the selection of OSS components with the ultimate goal to improve the software development practice in industry, particularly to improve the practice of selection of OSS components. This study does can not be used directly to improve the practice of selection and evaluation of OSS components, because further and larger studies needs to be performed in the future to support our results. It is anyway a good step toward the final goal. We have used the role: integrator of open source, because this is the most appropriate for the research we have performed. More and more companies integrate open source components in their products because the benefits are large. Therefore, improving the practice about the selection of OSS components may help software companies to decrease the time spent. If the time spent is too large, this can offset the advantages of integrating OSS components. The results of the interview are presented, 16 descriptive findings are formulated based on this. The literature study was very useful to gain understanding about the state-off-the-art but also to define the research questions.</p>
208

Use Cases in Practice: : A Study in the Norwegian Software Industry

Kjeøy, Margrethe Adde, Stalheim, Gerd Melteig January 2007 (has links)
<p>This Master's thesis investigates how project teams apply Use Cases and what problems they encounter with the employment of Use Cases by interviewing and surveying a number of Norwegian software companies. The thesis examines what developers and clients think is difficult and easy about Use Cases, how well the technique worked in a specific project, and how well the technique works in discussions with clients. A list of improvement suggestions for the Use Case technique is made based on the interviews, survey and literature study. The key findings in this thesis are summarized as eight improvement suggestions. The three most important are: (1) that Use Cases should be supplied with user interface prototypes when used in discussions with clients, (2) that companies should make use of a tool that makes it easier to get the overview of related Use Cases, and (3) that one should avoid to write details about the user interface in Use Cases. Other findings are that Use Cases are most commonly used for requirements specification, estimation, programming and constructing test cases, and that it is difficult to find the right level of detail when writing Use Cases.</p>
209

MOOSES Game Concepts : Game Concepts for the Multiplayer on One Screen Entertainment System

Kvasbø, Audun January 2007 (has links)
<p>Today, video games are mostly played at home while alone or together with friends. Multiplayer games are played by sharing a single screen or meeting up online to play against others. Within the MOOSES (Multiplayer On One Screen Entertainment System) project we seek to create a set of games for the new gaming paradigm that allows large numbers of players to share the fun of playing together on a single, large screen. To create games that are playable within the MOOSES context, one has to consider a series of special factors. These include elements of both user interface design, hardware and software architecture. In this study we describe these factors and how they can be handled with respect to making fun games for a large number of players on a single screen. Then, in the final and most important part of the study we describe five games that are suited for the special demands of the MOOSES framework - a war game, a football game, a music game, a survival based game and a quiz game.</p>
210

Social Tagging of Services to Support End User Development in Ubiquitous Collaborative Environments

Laverton, Christian January 2007 (has links)
<p>Tailorability in ubiquitous computing systems is needed at different levels, depending on the targeted end users. For inexperienced end users lacking computer competency, high level mechanisms for tailoring are needed. Systems such as ASTRA, which use a service oriented architecture, can provide such high level tailorability through service composition. With service composition, services can be combined and configured to form applications. However, using service composition introduces new challenges for end users. To find appropriate services, users need mechanisms for searching and browsing services. Equally important is it that users are able to understand how services work and what functionality they offer. Service descriptions can ease this task, but the problem with existing approaches to service descriptions is that they are not intended for end users and are hard to understand. This work looks at social tagging, which is a collaborative process where users attach labels or tags to items. This leads to user created metadata, as opposed to metadata created by experts. By introducing social tagging in ASTRA to describe services, users are provided with a framework for sharing their understanding of services with fellow users. To create a solution for social tagging for service descriptions, a thorough problem analysis was performed. The analysis considered the design space of tagging systems to find appropriate design choices in the problem context. Providing several tag visibility levels was identified as important, especially community tagging. The quality of tags as seen from the community members' perspective is likely to increase, as members of communities often share similar opinions and understandings. An important difference identified between existing tagging systems and tagging of services is that services can be embedded in physical devices. Thus, services can be discovered and accessed physically, which means that physical access to the services' tags should be supported. A requirements specification for a tagging system was specified, focusing on the platform requirements for basic tagging mechanisms, tag based navigation, and searching. The requirements lead to a design of platform architecture, aiming at extending the UbiCollab platform with social tagging functionality. The architecture uses a client/server solution, where the server service is shared among a network of users and handles public and community level tags. The client service is a local service which handles private tags, and acts as an intermediary between end user tools and the server service. A prototype of the platform services and an end user tool was implemented. The implementation is demonstrated through scenarios, showing possible uses of the tagging system.</p>

Page generated in 0.0816 seconds