• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 628
  • 171
  • Tagged with
  • 799
  • 799
  • 799
  • 557
  • 471
  • 471
  • 136
  • 136
  • 94
  • 94
  • 88
  • 88
  • 6
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
481

Context-Aware Goods : Combining RFID Tracking and Environment Sensing

Albretsen, Sigve, Larsen, Mikael André January 2008 (has links)
<p>Technology is becoming increasingly important in the effort to ensure safe food and good food quality, especially in the fresh food industry. Examples of such technology are systems for tracking and tracing food products, and the use of sensors to obtain context information about the environment. This technology is becoming more mature, and various standards are starting to emerge, but little work has been done combining these technologies or respective standards. This thesis presents an example software architecture combining an RFID tracking system with context information retrieved from sensors. The sensors can be located both on the RFID tag itself and in locations where the items are, or have been, located. Two frameworks are combined in this architecture; EPC Architecture Framework for item tracking and Sensor Web Enablement for sensor and context information. A set of scenarios describing potential uses of this technology is also presented. They are grouped by topics, with categories such as quality deterioration, temperature profiles, sensor collaboration and intelligent goods, hierarchy of goods with sensors, and proximity control. Each scenario is independent of the technical solution used, and does not require our architecture. The focus is on what can be achieved when a context-enabled tracking solution is implemented. These scenarios form the basis for the requirements specification of the architecture. The thesis shows that the integration of the two standard frameworks can be achieved with relatively small modifications, and that the technology needed to achieve what is presented in the scenarios is already available. It is, however, necessary to perform pilot implementations and testing in order to find how best to utilize the technology.</p>
482

Software Contracting and Agile Development in the Norwegian ICT Industry : A Qualitative Survey

Ganes, Anders, Nævdal, Snorre January 2008 (has links)
<p>This thesis takes a closer look at how various contract models affect the ability to use agile software development, and the work being done to help improve contracts so they better facilitate agile principles. Agile development methods are becoming increasingly popular, while most contractual standards are meant for plan-based development methods. There are done little research regarding the subject, but it is a growing concern in the industry. Work is also currently done on Norwegian contractual frameworks that aim to update two commonly used contracts. The research done consist of several interviews with industry practitioners representing Norwegian consultancy companies experienced in agile development methods. It also includes interviews of contract experts in addition to a search and study of the literature on the subject. These interviews have been analyzed and compared to literature on the subject. The results of the research revealed a number of challenges with today's contract models. Several discoveries showed difficulties with bureaucracy and customer involvement. Using traditional contracts could also easily require more upfront work than what is sensible when using agile methods. It is possible to bypass these challenges by either adapting the development method, or putting the contract aside.</p>
483

Profile based Intrusion Detection for Internet Banking Systems

Karlsen, Kåre Nordvik, Killingberg, Tarje January 2008 (has links)
<p>A review of publications treating security in Internet banking systems has uncovered a practice that finds security by obscurity just as important as actual security measures. The key reason for this is that security measures do not provide a sufficient return on investment by fraud and misuse detection. Hence, the banks have so far taken the risk of providing poor security in their systems, and instead compensated the compromised users. This introduces the need for a cost-efficient, non-intrusive and customizable novel fraud and misuse detection system. This report describes the work done in researching such a system, based on audit data from a highly customized system, and using machine learning methods to provide functionality. By choosing to use audit data as the primary source of information, data can be gathered from the system in close to real-time, without interfering with the existing functionality. Audit mechanisms are commonly present in any system, thus they are the primary source from which a non-intrusive solution can be obtained. This report proposes the use of profiles to learn a baseline of the normal interaction between a user and the system. Each profile looks at the available data at different levels of abstraction so that different properties in the behavior can be learned. By using these profiles, each profile can be refined to learn its level of abstraction, while still providing a complete picture of a user's behavior. Machine learning methods can be used to automatically learn a baseline for normal behavior based on a set of historical data. The learned behavior can then be used to compare new instances against the baseline in order to classify them as normal or abnormal. Abnormal behavior would then be an indication that a user is conducting illegitimate activity. The results of our proposed solution are satisfactory. We are able to detect anomalies by different profiles and data sources. However, there are issues when it comes to evaluating the solution. Since we are trying to detect novel fraud and misuse behavior, there is no apparent test set to compare against. Some options for evaluation of anomaly detection exist. However, we found none of these to be satisfactory. Further research needs to be conducted in this area before a functional solution can be created. This report uses results and experiences to create a foundation for such further research.</p>
484

Global Software Development: A Case Study of Knowledge Management Challenges and Industry Approaches

Dharmadas, Mugunthan January 2008 (has links)
<p>Recent years, Global Software Development has been pervasive in the field of software development. Research literature describes empirically observed benefits and challenges, but it is descriptive and pragmatic, and offers little theoretic grounding of the findings. The literature recognizes communication and transfer of knowledge as one of the main issues haunting software development, causing poor implementation of projects and poor software quality. This report presents a case study of globally distributed software development, the communicational and knowledge managerial challenges observed, and theoretic reasoning of these. Mitos’ Desert projects have been ongoing for several years with teams in India and Norway. The observed challenges are inadequate information quality when using a middleman in communication; difficulties due to people’s preferences on written and oral language use; unbalanced knowledge distribution causing dependencies across sites; lack of informal talks across sites causing coordination issues. Mitos’ approaches to cope with these challenges includes extensive visiting; a kit to promote rapid learning for new joiners; intermediaries with cross-cultural experience; quarterly feedback; written summary of meetings to confirm correct interpretation. Overall, Mitos shows maturity in conducting global software development, causing relatively smooth implementation of such projects. Through the discussion of challenges and solutions, this report shows that a theoretic grounding can contribute to describe why challenges occur and solutions work, rather than only describing what happens. Also, the study shows the vital role of theories for a better understanding of knowledge managerial aspects of global software development.</p>
485

Using the Geographical Location of Photos in Mobile Phones

Amundsen, Jon Anders January 2008 (has links)
<p>Digital cameras in mobile phones have become very popular in the recent years, and it is common to have large photo collections stored in the phone. Organizing these photos on the phone is still a big problem though. This study explores different ways of utilizing the location of where the photos were taken to make it easier to manage a large photo collection. Several different positioning technologies that can be used to obtain the location of where a photo was taken are presented. Three of the application suggestions for using location information of photos were implemented as prototypes on the Android platform. Android is a new platform for mobile phones developed by Google and the Open Handset Alliance, which has been made available as a preview release for developers. A part of this study was to investigate how suitable this platform is for developing location-based software. It was found that it is very suitable, although there still are some bugs and missing features that are expected to be fixed before the final release. The three application prototypes that were implemented were called “From Photo to Map”, “From Map to Photos” and “Who Lives Here?” The “From Photo to Map” application lets the user see a map where the location of a selected photo is visualized with a marker. The “From Map to Photos” application shows a map with markers at all of the locations where the user has taken photos. When one of the markers is selected, the photos taken at that location is shown. The “Who Lives Here?” application lets the user know which of the persons in his contact list that lives where the photo was taken. A small user survey showed that the participants thought all of the applications could be useful, but they were not so sure if they would use them themselves. The survey also showed that most of the users were able to find photos faster when using map-based browsing in the “From Map to Photos” application than when browsing through a photo collection linearly, but several concerns about the implementation details and the use of an emulator make the exact efficiency gain very uncertain.</p>
486

Construction of Object-Oriented Queries Towards Relational Data : In View of Industrial Practices

Jodal, Stein Magnus January 2009 (has links)
<p>The focus of this work is querying relational data through an object-relational mapper (ORM). In Java projects, it is common to use the Hibernate ORM and write the queries using HQL and Criteria. These approaches have limitations in regard to readability and static analysis. The limitations are identified and explained in this thesis. Several possible solutions are discussed. One of the solutions is looked at in depth and implemented in a real world project. The described solution eases the construction of queries and provides a way to fully utilize the development support tools.</p>
487

A Study of Development and Maintenance in Norway

Davidsen, Magne Kristoffer January 2009 (has links)
<p>Do a survey investigation of software maintenance and development in Norway. Extend with case studies.</p>
488

CAPTCHA Solution with Support for Universal Design

Kristianslund, André Hennie January 2009 (has links)
<p>CAPTCHAs are widely used to tell humans and computers apart on the Internet, but user experience shows that many of these are inaccessible to users with disabilities. The Norwegian Government has proposed a Plan of Action for Universal Design to raise awareness on the matter of accessibility and this thesis demonstrates how one can achieve the measures specified in this plan when designing a CAPTCHA. By evaluating existing solutions and investigating the aspects of web accessibility and disabilities involved, I propose a requirement specification and my recommendations for future work.</p>
489

Web Service Clients on Mobile Android Devices : A Study on Architectural Alternatives and Client Performance

Knutsen, Johannes January 2009 (has links)
<p>This paper studies Android, a new open source software stack initiated by Google, and the possibilities of developing a mobile client for MPower, a service oriented architecture platform based upon SOAP messaging. The study focuses on the architectural alternatives, their impacts on the mobile client application, Android’s performance on SOAP messaging, and how Web services’ design can be optimized to give well performing Android clients. The results from this study shows how different architectures directly impacts properties, like off-line usage support, of a SOAP client application on Android. Additionally, the performance measurements shows that building Android client applications which directly invokes Web services with SOAP messaging is possible to make effective enough for typical usage situations. Further, the results indicates how Web services should be designed with care to minimize the required data transfer and processing on the device. Such careful design can be achieved by using coordinating Web services which hides complexity and provides an interface designed for the specific client applications.</p>
490

Activity Based Computing : Health workers and the principles of ABC

Ormberg, Hans Kristian Jasmin January 2009 (has links)
<p>This thesis takes a closer look at Activiy Based Computing (ABC), at health workers and how they use computers, at what aspects of ABC they find useful for their everyday work and at what should be taken into consideration when designing the next generation ABC-system. For answering these questions, doctors and nurses were asked to participate in a workshop where the theme was: "Next generation clinical infomation systems". In all seven health workers participated in two workshops. Previous work has produced the "ABC-principles" and the "Attributes of session-aware systems". The cross-section of the two sets of principles have been derrived, and yielded the list used as the base in the evaluations: Multiple patients Multiple tasks Mobility Collaboration Handover Interruption The two workshops both started with an introduction of the differet principles, before a usability evaluation (evaluating the principles), a role play and finally a focus group (containing a card ranking). In addition some of the participants were observed in their natural environment. The results of the different methods conclude that the evaluated principles all are appreciated by the health workers, but have to be implemented in a satisfactory way. They should all be taken into consideration when designing a new computer system for use within the health sector.</p>

Page generated in 0.0572 seconds