Lars Lundberg

ORCID: 0000-0002-5031-8215
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Software Engineering Techniques and Practices
  • Real-Time Systems Scheduling
  • Distributed systems and fault tolerance
  • Software Reliability and Analysis Research
  • Interconnection Networks and Systems
  • Advanced Software Engineering Methodologies
  • Embedded Systems Design Techniques
  • Global trade and economics
  • IoT and Edge/Fog Computing
  • Software System Performance and Reliability
  • Advanced Data Storage Technologies
  • Service-Oriented Architecture and Web Services
  • Scheduling and Optimization Algorithms
  • Image and Video Quality Assessment
  • Global Trade and Competitiveness
  • Video Coding and Compression Technologies
  • Human Mobility and Location-Based Analysis
  • Economic Growth and Productivity
  • Advanced Data Compression Techniques
  • Software Testing and Debugging Techniques
  • Simulation Techniques and Applications

Blekinge Institute of Technology
2016-2025

Linnaeus University
2021

Lund University
1989-2005

Umeå University
1996-1999

Union Institute & University
1992

Automatic classification of environmental sounds, such as dog barking and glass breaking, is becoming increasingly interesting, especially for mobile devices. Most devices contain both cameras microphones, companies that develop would like to provide functionality classifying videos/images sounds. In order reduce the development costs one use same technology these tasks. One way achieving this represent sounds images, an image neural network when images well paper we consider accuracy...

10.1016/j.procs.2017.08.250 article EN Procedia Computer Science 2017-01-01

To sustain the qualities of a software system during evolution, and to adapt quality attributes as requirements evolve, it is necessary have clear architecture that understood by all developers which changes adheres. This can be created beforehand, but must also updated domain software, hence on evolve. Creating for or part so fulfils desired often hard. In this paper we propose decision-support method aid in understanding different candidates system. We adaptable with respect both set...

10.1142/s0218194003001421 article EN International Journal of Software Engineering and Knowledge Engineering 2003-10-01

Web Services is a new concept that promises flexibility and interconnection between different systems. The communication in uses SOAP $Simple Object Access Protocol, which based on XML. We have together with an industrial partner made experiments Service environment to find out the response time using compared CORBA. It turns direct naive use of would result degradation factor 400 identified major reasons for poor performance evaluated some improvement techniques. After applying these...

10.1109/apsec.2002.1182978 article EN 2003-06-26

Abstract In market‐driven development where time‐to‐market is of crucial importance, software companies seek improvements that can decrease the lead‐time and improve delivery precision. One way to achieve this by analyzing test process since rework commonly accounts for more than half time. A large reason high costs fault slippages from earlier phases they are cheaper find remove. As an input improvements, article introduces a measure quantify relationship. That is, called...

10.1002/spip.253 article EN Software Process Improvement and Practice 2006-01-01

Code reviews with static analysis tools are today recommended by several security development processes. Developers expected to use the tools' output detect threats they themselves have introduced in source code. This approach assumes that all developers can correctly identify a warning from tool (SAT) as threat needs be corrected. We conducted an industry experiment state of art and real vulnerabilities. found average do not warnings only specific experiences better than chance detecting...

10.1109/ares.2009.163 article EN 2009-01-01

SUMMARY Software security can be improved by identifying and correcting vulnerabilities. In order to reduce the cost of rework, vulnerabilities should detected as early efficiently possible. Static automated code analysis is an approach for detection. So far, only few empirical studies have been conducted in industrial context evaluate static analysis. A case study was industry focusing on defect detection capability, deployment, usage with a focus software security. We identified that tool...

10.1002/spe.2109 article EN Software Practice and Experience 2012-02-20

Abstract In this paper a program and methodology for bibliometric mining of research trends directions is presented. The method applied to the area Big Data time period 2012 2022, using Scopus database. It turns out that 10 most important in are Machine learning, Deep learning neural networks, Internet things, mining, Cloud computing, Artificial intelligence, Healthcare, Security privacy, Review, Manufacturing. role different fields science technology also analysed. For four geographic...

10.1186/s40537-023-00793-6 article EN cc-by Journal Of Big Data 2023-07-01

We present a method, including tool support, for bibliometric mining of trends in large and dynamic research areas. The method is applied to the machine learning area years 2013 2022. A total number 398,782 documents from Scopus were analyzed. taxonomy containing 26 directions within was defined by four experts with help Python program existing taxonomies. terms productivity, growth rate, citations analyzed taxonomy. Our results show that two directions, Applications Algorithms, are largest,...

10.3390/ai5010012 article EN cc-by AI 2024-01-19

10.1007/bf02706188 article EN Weltwirtschaftliches Archiv 1982-06-01

To sustain the qualities of a software system during evolution, and to adapt quality attributes as requirements evolve, it is necessary have clear architecture that understood by all developers which changes adheres. This can be created beforehand, but must also updated domain software, hence on evolves. Creating an architectural structure for or part so fulfils desired often hard. In this paper we propose decision support method aid in understanding different candidates system. We adaptable...

10.1145/568760.568900 article EN 2002-07-15

Automated static code analysis is an efficient technique to increase the quality of software during early development. This paper presents a case study in which mature with known vulnerabilities subjected tool. The value tool estimated based on reported failures from customers. An average 17% cost savings would have been possible if was used. also had 30% success rate detecting and at same time found 59 new three examined products.

10.1145/1375696.1375707 article EN 2008-06-07

Today, scalable and high-available NoSQL distributed databases are largely used as Big Data platforms. Such typically run on a virtualized infrastructure that could be implemented using Hypervisor-based virtualization or Container-based virtualization. is mature technology but imposes overhead CPU, memory, networking, disk. Recently, by sharing the operating system resources simplifying deployment of applications, container-based getting more popular. lightweight in resource consumption...

10.1109/cloudtech.2017.8284700 article EN 2017-10-01

One of the crucial factors in achieving a high punctuality railway traffic systems, is ability to effectively reschedule trains when disturbances occur. The rescheduling problem complex task solve both from practical and computational perspective. Problems practically relevant sizes have typically very large search space, making them time-consuming even for state-of-the-art optimization solvers. Though competitive algorithmic approaches are widespread topic research, not much research has...

10.1016/j.trc.2018.07.003 article EN cc-by Transportation Research Part C Emerging Technologies 2018-08-14

We consider a multiprocessor where hard real-time tasks are scheduled globally on in processors. Each task has fixed priority and executed using preemptive scheduling. The state-of-the-art assignment scheme such cases is called RM-US[US-LIMIT], US-LIMIT parameter to the RM-US algorithm. challenge find that can guarantee schedulability for as high utilization possible. previously best known value could long below m/(3m-2), i.e. 0.33333 when m/spl rarr//spl infin/. In this paper we define new...

10.1109/rttas.2002.1137389 article EN 2003-06-25

10.7208/9780226036533-011 preprint EN RePEc: Research Papers in Economics 1984-01-01

Summary NoSQL distributed databases are often used as Big Data platforms. To provide efficient resource sharing and cost effectiveness, such typically run concurrently on a virtualized infrastructure that could be implemented using hypervisor‐based virtualization or container‐based virtualization. Hypervisor‐based is mature technology but imposes overhead CPU, networking, disk. Recently, by the operating system resources simplifying deployment of applications, getting more popular. This...

10.1002/cpe.5693 article EN cc-by Concurrency and Computation Practice and Experience 2020-02-13
Coming Soon ...