• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 382
  • 116
  • Tagged with
  • 498
  • 498
  • 498
  • 498
  • 498
  • 471
  • 27
  • 10
  • 10
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Software Contracting and Agile Development in the Norwegian ICT Industry : A Qualitative Survey

Ganes, Anders, Nævdal, Snorre January 2008 (has links)
<p>This thesis takes a closer look at how various contract models affect the ability to use agile software development, and the work being done to help improve contracts so they better facilitate agile principles. Agile development methods are becoming increasingly popular, while most contractual standards are meant for plan-based development methods. There are done little research regarding the subject, but it is a growing concern in the industry. Work is also currently done on Norwegian contractual frameworks that aim to update two commonly used contracts. The research done consist of several interviews with industry practitioners representing Norwegian consultancy companies experienced in agile development methods. It also includes interviews of contract experts in addition to a search and study of the literature on the subject. These interviews have been analyzed and compared to literature on the subject. The results of the research revealed a number of challenges with today's contract models. Several discoveries showed difficulties with bureaucracy and customer involvement. Using traditional contracts could also easily require more upfront work than what is sensible when using agile methods. It is possible to bypass these challenges by either adapting the development method, or putting the contract aside.</p>
222

Profile based Intrusion Detection for Internet Banking Systems

Karlsen, Kåre Nordvik, Killingberg, Tarje January 2008 (has links)
<p>A review of publications treating security in Internet banking systems has uncovered a practice that finds security by obscurity just as important as actual security measures. The key reason for this is that security measures do not provide a sufficient return on investment by fraud and misuse detection. Hence, the banks have so far taken the risk of providing poor security in their systems, and instead compensated the compromised users. This introduces the need for a cost-efficient, non-intrusive and customizable novel fraud and misuse detection system. This report describes the work done in researching such a system, based on audit data from a highly customized system, and using machine learning methods to provide functionality. By choosing to use audit data as the primary source of information, data can be gathered from the system in close to real-time, without interfering with the existing functionality. Audit mechanisms are commonly present in any system, thus they are the primary source from which a non-intrusive solution can be obtained. This report proposes the use of profiles to learn a baseline of the normal interaction between a user and the system. Each profile looks at the available data at different levels of abstraction so that different properties in the behavior can be learned. By using these profiles, each profile can be refined to learn its level of abstraction, while still providing a complete picture of a user's behavior. Machine learning methods can be used to automatically learn a baseline for normal behavior based on a set of historical data. The learned behavior can then be used to compare new instances against the baseline in order to classify them as normal or abnormal. Abnormal behavior would then be an indication that a user is conducting illegitimate activity. The results of our proposed solution are satisfactory. We are able to detect anomalies by different profiles and data sources. However, there are issues when it comes to evaluating the solution. Since we are trying to detect novel fraud and misuse behavior, there is no apparent test set to compare against. Some options for evaluation of anomaly detection exist. However, we found none of these to be satisfactory. Further research needs to be conducted in this area before a functional solution can be created. This report uses results and experiences to create a foundation for such further research.</p>
223

Global Software Development: A Case Study of Knowledge Management Challenges and Industry Approaches

Dharmadas, Mugunthan January 2008 (has links)
<p>Recent years, Global Software Development has been pervasive in the field of software development. Research literature describes empirically observed benefits and challenges, but it is descriptive and pragmatic, and offers little theoretic grounding of the findings. The literature recognizes communication and transfer of knowledge as one of the main issues haunting software development, causing poor implementation of projects and poor software quality. This report presents a case study of globally distributed software development, the communicational and knowledge managerial challenges observed, and theoretic reasoning of these. Mitos’ Desert projects have been ongoing for several years with teams in India and Norway. The observed challenges are inadequate information quality when using a middleman in communication; difficulties due to people’s preferences on written and oral language use; unbalanced knowledge distribution causing dependencies across sites; lack of informal talks across sites causing coordination issues. Mitos’ approaches to cope with these challenges includes extensive visiting; a kit to promote rapid learning for new joiners; intermediaries with cross-cultural experience; quarterly feedback; written summary of meetings to confirm correct interpretation. Overall, Mitos shows maturity in conducting global software development, causing relatively smooth implementation of such projects. Through the discussion of challenges and solutions, this report shows that a theoretic grounding can contribute to describe why challenges occur and solutions work, rather than only describing what happens. Also, the study shows the vital role of theories for a better understanding of knowledge managerial aspects of global software development.</p>
224

A Study of Development and Maintenance in Norway

Davidsen, Magne Kristoffer January 2009 (has links)
<p>Do a survey investigation of software maintenance and development in Norway. Extend with case studies.</p>
225

CAPTCHA Solution with Support for Universal Design

Kristianslund, André Hennie January 2009 (has links)
<p>CAPTCHAs are widely used to tell humans and computers apart on the Internet, but user experience shows that many of these are inaccessible to users with disabilities. The Norwegian Government has proposed a Plan of Action for Universal Design to raise awareness on the matter of accessibility and this thesis demonstrates how one can achieve the measures specified in this plan when designing a CAPTCHA. By evaluating existing solutions and investigating the aspects of web accessibility and disabilities involved, I propose a requirement specification and my recommendations for future work.</p>
226

Web Service Clients on Mobile Android Devices : A Study on Architectural Alternatives and Client Performance

Knutsen, Johannes January 2009 (has links)
<p>This paper studies Android, a new open source software stack initiated by Google, and the possibilities of developing a mobile client for MPower, a service oriented architecture platform based upon SOAP messaging. The study focuses on the architectural alternatives, their impacts on the mobile client application, Android’s performance on SOAP messaging, and how Web services’ design can be optimized to give well performing Android clients. The results from this study shows how different architectures directly impacts properties, like off-line usage support, of a SOAP client application on Android. Additionally, the performance measurements shows that building Android client applications which directly invokes Web services with SOAP messaging is possible to make effective enough for typical usage situations. Further, the results indicates how Web services should be designed with care to minimize the required data transfer and processing on the device. Such careful design can be achieved by using coordinating Web services which hides complexity and provides an interface designed for the specific client applications.</p>
227

Activity Based Computing : Health workers and the principles of ABC

Ormberg, Hans Kristian Jasmin January 2009 (has links)
<p>This thesis takes a closer look at Activiy Based Computing (ABC), at health workers and how they use computers, at what aspects of ABC they find useful for their everyday work and at what should be taken into consideration when designing the next generation ABC-system. For answering these questions, doctors and nurses were asked to participate in a workshop where the theme was: "Next generation clinical infomation systems". In all seven health workers participated in two workshops. Previous work has produced the "ABC-principles" and the "Attributes of session-aware systems". The cross-section of the two sets of principles have been derrived, and yielded the list used as the base in the evaluations: Multiple patients Multiple tasks Mobility Collaboration Handover Interruption The two workshops both started with an introduction of the differet principles, before a usability evaluation (evaluating the principles), a role play and finally a focus group (containing a card ranking). In addition some of the participants were observed in their natural environment. The results of the different methods conclude that the evaluated principles all are appreciated by the health workers, but have to be implemented in a satisfactory way. They should all be taken into consideration when designing a new computer system for use within the health sector.</p>
228

Open Source Software at Telenor IS

Skarpenes, Tron André, Velle, Ketil Sandanger January 2009 (has links)
<p>Open Source Software (OSS) is becoming a real alternative to proprietary software because of the attractive characteristics it might bring (e.g. reduced costs, independence from vendors and increased innovation). Consequently, adoption of OSS is getting more attention and the industry is adopting OSS in a much larger scale than before. Telenor IS, the information system branch of Telenor Nordic, has realized that OSS adoption is increasing and noticed the advantages that OSS might bring for them. Therefore they have started a project called Open Source 2010. Among this project’s goals are finding suitable OSS products to use within the company, and to increase the overall adoption of OSS to avoid “lock-in” to commercial vendors and be able to cut costs. As part of the Open Source 2010 project, we investigated three issues. The first is what concrete experience the individual employee has with OSS. The second is to examine the employees’ attitude towards OSS, and how they assess an increased use of OSS in Telenor IS. The third is exploring which advantages and risks OSS could bring, in addition to which preparations that should be made to ease the adoption of OSS. To investigate these issues, we cooperated with Telenor IS to develop a survey consisting of both interviews and a questionnaire. To validate, supplement and disseminate the results from the survey, two workshops were conducted with Telenor employees. This thesis has three main contributions. 1. Empirical findings showing that: (i) There is no real difference in attitudes towards OSS between leaders and non-leaders. (ii) A notable amount of OSS is in use, supporting that OSS adoption is increasing. (iii) Leaders are not necessarily aware of all the OSS being used. 2. Identification of several advantages, risks and preparations which are important to consider when increasing use of OSS. Several of these are generalizable, and could be considered by other companies planning to adopt OSS. 3. Increasing the visibility of the OSS project inside the Telenor IS organization. This is important, so that the individual employee in Telenor becomes aware of the project. In addition to increased visibility, the survey involves the employees and makes their voice heard in the OSS adoption process.</p>
229

City Guide: Service Composition in an Urban Environment

Blakstad, Eirik January 2009 (has links)
<p>The aim of this thesis has been to develop and validate the user interface of a service composition tool for creating mobile tourist services in a city environment. The project has been conducted in cooperation with SINTEF and the Norwegian research project UbiCompForAll. As part of this thesis, a number of scenarios were created initially, showing what kind of functionalities accessed using mobile devices might be useful for tourists in the city. Based on these scenarios, the graphical user interface of a composition service tool was created and then assessed through the involvement of several users using a paper prototyping approach. The results from the paper prototyping assessment showed that the proposed interface is generally easy to understand and use, although there were a number of improvements necessary in the areas of information abstraction, module naming and letting users be able to see the final product of the composition. In addition, as part of the assessment of the proposed interface, the realizability of the services specified using this interface was evaluated. An architecture for the service derived from the specification developed by the user was defined. This enabled us to check that all the information necessary for creating the composed services can be provided when using the proposed user interface.</p>
230

Usability Challenges for Contactless Mobile Payment at a Physical Point of Sale : Central Themes and Trade-offs

Gilje, Eivind Laugerud January 2009 (has links)
<p>This thesis was written in cooperation with Telenor as part of the project ``Tap2Pay''. The goal was to investigate usablity challenges for contactless mobile payment at a physical point of sale and identify central themes and trade-offs. To acheive this a two iterations of a prototype was developed, based on an analysis of the payment situation. These iterations were used in one workshop each. After analyzing the results from the workshop, a strong card metaphor was identified as a central theme. The card metaphor had a great influence on the users' preferred solutions. Card selection routines was also a central theme. There is also a genuine trade-off between efficiency and confidence. The users are likely to lack confidence in the security of efficent solutions, but in order to increase confidence, efficiency must be sacrificed.</p>

Page generated in 0.1387 seconds