- Distributed and Parallel Computing Systems
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Software Engineering Research
- Software Engineering Techniques and Practices
- Real-Time Systems Scheduling
- Distributed systems and fault tolerance
- Software Reliability and Analysis Research
- Interconnection Networks and Systems
- Advanced Software Engineering Methodologies
- Embedded Systems Design Techniques
- Global trade and economics
- IoT and Edge/Fog Computing
- Software System Performance and Reliability
- Advanced Data Storage Technologies
- Service-Oriented Architecture and Web Services
- Scheduling and Optimization Algorithms
- Image and Video Quality Assessment
- Global Trade and Competitiveness
- Video Coding and Compression Technologies
- Human Mobility and Location-Based Analysis
- Economic Growth and Productivity
- Advanced Data Compression Techniques
- Software Testing and Debugging Techniques
- Simulation Techniques and Applications
Blekinge Institute of Technology
2016-2025
Linnaeus University
2021
Lund University
1989-2005
Umeå University
1996-1999
Union Institute & University
1992
Automatic classification of environmental sounds, such as dog barking and glass breaking, is becoming increasingly interesting, especially for mobile devices. Most devices contain both cameras microphones, companies that develop would like to provide functionality classifying videos/images sounds. In order reduce the development costs one use same technology these tasks. One way achieving this represent sounds images, an image neural network when images well paper we consider accuracy...
To sustain the qualities of a software system during evolution, and to adapt quality attributes as requirements evolve, it is necessary have clear architecture that understood by all developers which changes adheres. This can be created beforehand, but must also updated domain software, hence on evolve. Creating for or part so fulfils desired often hard. In this paper we propose decision-support method aid in understanding different candidates system. We adaptable with respect both set...
Web Services is a new concept that promises flexibility and interconnection between different systems. The communication in uses SOAP $Simple Object Access Protocol, which based on XML. We have together with an industrial partner made experiments Service environment to find out the response time using compared CORBA. It turns direct naive use of would result degradation factor 400 identified major reasons for poor performance evaluated some improvement techniques. After applying these...
Abstract In market‐driven development where time‐to‐market is of crucial importance, software companies seek improvements that can decrease the lead‐time and improve delivery precision. One way to achieve this by analyzing test process since rework commonly accounts for more than half time. A large reason high costs fault slippages from earlier phases they are cheaper find remove. As an input improvements, article introduces a measure quantify relationship. That is, called...
Code reviews with static analysis tools are today recommended by several security development processes. Developers expected to use the tools' output detect threats they themselves have introduced in source code. This approach assumes that all developers can correctly identify a warning from tool (SAT) as threat needs be corrected. We conducted an industry experiment state of art and real vulnerabilities. found average do not warnings only specific experiences better than chance detecting...
SUMMARY Software security can be improved by identifying and correcting vulnerabilities. In order to reduce the cost of rework, vulnerabilities should detected as early efficiently possible. Static automated code analysis is an approach for detection. So far, only few empirical studies have been conducted in industrial context evaluate static analysis. A case study was industry focusing on defect detection capability, deployment, usage with a focus software security. We identified that tool...
Abstract In this paper a program and methodology for bibliometric mining of research trends directions is presented. The method applied to the area Big Data time period 2012 2022, using Scopus database. It turns out that 10 most important in are Machine learning, Deep learning neural networks, Internet things, mining, Cloud computing, Artificial intelligence, Healthcare, Security privacy, Review, Manufacturing. role different fields science technology also analysed. For four geographic...
We present a method, including tool support, for bibliometric mining of trends in large and dynamic research areas. The method is applied to the machine learning area years 2013 2022. A total number 398,782 documents from Scopus were analyzed. taxonomy containing 26 directions within was defined by four experts with help Python program existing taxonomies. terms productivity, growth rate, citations analyzed taxonomy. Our results show that two directions, Applications Algorithms, are largest,...
To sustain the qualities of a software system during evolution, and to adapt quality attributes as requirements evolve, it is necessary have clear architecture that understood by all developers which changes adheres. This can be created beforehand, but must also updated domain software, hence on evolves. Creating an architectural structure for or part so fulfils desired often hard. In this paper we propose decision support method aid in understanding different candidates system. We adaptable...
Automated static code analysis is an efficient technique to increase the quality of software during early development. This paper presents a case study in which mature with known vulnerabilities subjected tool. The value tool estimated based on reported failures from customers. An average 17% cost savings would have been possible if was used. also had 30% success rate detecting and at same time found 59 new three examined products.
Today, scalable and high-available NoSQL distributed databases are largely used as Big Data platforms. Such typically run on a virtualized infrastructure that could be implemented using Hypervisor-based virtualization or Container-based virtualization. is mature technology but imposes overhead CPU, memory, networking, disk. Recently, by sharing the operating system resources simplifying deployment of applications, container-based getting more popular. lightweight in resource consumption...
One of the crucial factors in achieving a high punctuality railway traffic systems, is ability to effectively reschedule trains when disturbances occur. The rescheduling problem complex task solve both from practical and computational perspective. Problems practically relevant sizes have typically very large search space, making them time-consuming even for state-of-the-art optimization solvers. Though competitive algorithmic approaches are widespread topic research, not much research has...
We consider a multiprocessor where hard real-time tasks are scheduled globally on in processors. Each task has fixed priority and executed using preemptive scheduling. The state-of-the-art assignment scheme such cases is called RM-US[US-LIMIT], US-LIMIT parameter to the RM-US algorithm. challenge find that can guarantee schedulability for as high utilization possible. previously best known value could long below m/(3m-2), i.e. 0.33333 when m/spl rarr//spl infin/. In this paper we define new...
Summary NoSQL distributed databases are often used as Big Data platforms. To provide efficient resource sharing and cost effectiveness, such typically run concurrently on a virtualized infrastructure that could be implemented using hypervisor‐based virtualization or container‐based virtualization. Hypervisor‐based is mature technology but imposes overhead CPU, networking, disk. Recently, by the operating system resources simplifying deployment of applications, getting more popular. This...