mdh.sePublications
Change search
Refine search result
1234567 1 - 50 of 714
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Abbaspour Asadollah, Sara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bugs and Debugging of Concurrent and Multicore Software2016Licentiate thesis, comprehensive summary (Other academic)
  • 2.
    Abbaspour Asadollah, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sundmark, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Eldh, Sigrid
    Ericsson AB, Kista, Sweden.
    Towards Classification of Concurrency Bugs Based on Observable Properties2015In: Proceedings - 1st International Workshop on Complex Faults and Failures in Large Software Systems, COUFLESS 2015, 2015, 41-47 p.Conference paper (Refereed)
    Abstract [en]

    In software engineering, classification is a way to find an organized structure of knowledge about objects. Classification serves to investigate the relationship between the items to be classified, and can be used to identify the current gaps in the field. In many cases users are able to order and relate objects by fitting them in a category. This paper presents initial work on a taxonomy for classification of errors (bugs) related to concurrent execution of application level software threads. By classifying concurrency bugs based on their corresponding observable properties, this research aims to examine and structure the state of the art in this field, as well as to provide practitioner support for testing and debugging of concurrent software. We also show how the proposed classification, and the different classes of bugs, relates to the state of the art in the field by providing a mapping of the classification to a number of recently published papers in the software engineering field.

  • 3.
    Abbaspour Asadollah, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Saadatmand, Mehrdad
    SICS Swedish ICT, Västerås, Sweden.
    Eldh, Sigrid
    Ericsson AB, Kista, Sweden.
    Sundmark, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Model for Systematic Monitoring and Debugging of Starvation Bugs in Multicore Software2016In: 2016 ASE Workshop on Specification, Comprehension, Testing and Debugging of Concurrent Programs SCTDCP2016, 2016Conference paper (Refereed)
    Abstract [en]

    With the development of multicore hardware, concurrent, parallel and multicore software are becoming increasingly popular. Software companies are spending a huge amount of time and resources to nd and debug the bugs. Among all types of software bugs, concurrency bugs are also important and troublesome. This type of bugs is increasingly becoming an issue particularly due to the growing prevalence of multicore hardware. In this position paper, we propose a model for monitoring and debugging Starvation bugs as a type of concurrency bugs in multicore software. The model is composed into three phases: monitoring, detecting and debugging. The monitoring phase can support detecting phase by storing collected data from the system execution. The detecting phase can support debugging phase by comparing the stored data with starvation bug's properties, and the debugging phase can help in reproducing and removing the Starvation bug from multicore software. Our intention is that our model is the basis for developing tool(s) to enable solving Starvation bugs in software for multicore platforms.

  • 4.
    Abbaspour Asadollah, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sundmark, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Eldh, Sigrid
    Ericsson AB, Kista, Sweden .
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Afza, Wasif
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    10 Years of research on debugging concurrent and multicore software: a systematic mapping studyIn: Software quality journal, ISSN 0963-9314, E-ISSN 1573-1367Article in journal (Refereed)
    Abstract [en]

    Debugging – the process of identifying, localizing and fixing bugs – is a key activity in software development. Due to issues such as non-determinism and difficulties of reproducing failures, debugging concurrent software is significantly more challenging than debugging sequential software. A number of methods, models and tools for debugging concurrent and multicore software have been proposed, but the body of work partially lacks a common terminology and a more recent view of the problems to solve. This suggests the need for a classification, and an up-to-date comprehensive overview of the area. 

    This paper presents the results of a systematic mapping study in the field of debugging of concurrent and multicore software in the last decade (2005– 2014). The study is guided by two objectives: (1) to summarize the recent publication trends and (2) to clarify current research gaps in the field.

    Through a multi-stage selection process, we identified 145 relevant papers. Based on these, we summarize the publication trend in the field by showing distribution of publications with respect to year , publication venues , representation of academia and industry , and active research institutes . We also identify research gaps in the field based on attributes such as types of concurrency bugs, types of debugging processes , types of research  and research contributions.

    The main observations from the study are that during the years 2005–2014: (1) there is no focal conference or venue to publish papers in this area, hence a large variety of conferences and journal venues (90) are used to publish relevant papers in this area; (2) in terms of publication contribution, academia was more active in this area than industry; (3) most publications in the field address the data race bug; (4) bug identification is the most common stage of debugging addressed by articles in the period; (5) there are six types of research approaches found, with solution proposals being the most common one; and (6) the published papers essentially focus on four different types of contributions, with ”methods” being the type most common one.

    We can further conclude that there is still quite a number of aspects that are not sufficiently covered in the field, most notably including (1) exploring correction  and fixing bugs  in terms of debugging process; (2) order violation, suspension  and starvation  in terms of concurrency bugs; (3) validation and evaluation research  in the matter of research type; (4) metric  in terms of research contribution. It is clear that the concurrent, parallel and multicore software community needs broader studies in debugging.This systematic mapping study can help direct such efforts.

  • 5.
    Abbaspour Asadollah, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sundmark, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Eldh, Sigrid
    Ericsson AB, Kista, Sweden.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Paul Enoiu, Eduard
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Study on Concurrency Bugs in an Open Source Software2016In: IFIP Advances in Information and Communication Technology, vol. 472, 2016, Vol. 472, 16-31 p.Conference paper (Refereed)
    Abstract [en]

    Concurrent programming puts demands on software debugging and testing, as concurrent software may exhibit problems not present in sequential software, e.g., deadlocks and race conditions. In aiming to increase efficiency and effectiveness of debugging and bug-fixing for concurrent software, a deep understanding of concurrency bugs, their frequency and fixingtimes would be helpful. Similarly, to design effective tools and techniques for testing and debugging concurrent software understanding the differences between non-concurrency and concurrency bugs in real-word software would be useful.

  • 6.
    Abbaspour, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Daniel, Sundmark
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Runtime Verification for Detecting Suspension Bugs in Multicore and Parallel Software2017In: Proceedings - 10th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2017, 2017, 77-80 p.Conference paper (Refereed)
    Abstract [en]

    Multicore hardware development increases the popularity of parallel and multicore software, while testing and debugging the software become more difficult, frustrating and costly. Among all types of software bugs, concurrency bugs are both important and troublesome. This type of bugs is increasingly becoming an issue, particularly due to the growing prevalence of multicore hardware. Suspension-based-locking bug is one type of concurrency bugs. This position paper proposes a model based on runtime verification and reflection technique in the context of multicore and parallel software to monitor and detect suspension-based-locking bugs. The model is not only able to detect faults, but also diagnose and even repair them. The model is composed of four layers: Logging, Monitoring, Suspension Bug Diagnosis and Mitigation. The logging layer will observe the events and save them into a file system. The monitoring layer will detect the presents of bugs in the software. The suspension bug diagnosis will identify Suspension bugs by comparing the captured data with the suspension bug properties. Finally, the mitigation layer will reconfigure the software to mitigate the suspension bugs. A functional architecture of a runtime verification tool is also proposed in this paper. This architecture is based on the proposed model and is comprised of different modules. 

  • 7. Abdul-Ahad, Amir Stefan
    et al.
    Lindén, Maria
    Mälardalen University, School of Innovation, Design and Engineering.
    Larsson, Thomas
    Mälardalen University, School of Innovation, Design and Engineering.
    Mahmoud, Waleed A.
    Robust Distance-Based Watermarking for Digital Video2008In: Proceedings of The Annual SIGRAD Conference, Stockholm, 2008Conference paper (Refereed)
  • 8.
    Abrahamsson, Henrik
    et al.
    Swedish Inst of Computer Science, Kista, Sweden .
    Ahlgren, Bengt
    Swedish Inst of Computer Science, Kista, Sweden .
    Using Empirical Distributions to Characterize Web Client Traffic and to Generate Synthetic Traffic2000In: Conference Record / IEEE Global Telecommunications ConferenceVolume 1, 2000, 2000, 428-433 p.Conference paper (Refereed)
    Abstract [en]

    We model a web client using empirical probability distributions for user clicks and transferred data sizes. By using a heuristic threshold value to distinguish user clicks in a packet trace we get a simple method for analyzing large packet traces in order to get information about user OFF times and amount of data transferred due to a user click. We derive the empirical probability distributions from the analysis of the packet trace. The heuristic is not perfect, but we believe it is good enough to produce a useful web client model. We use the empirical model to implement a web client traffic generator. The characteristics of the generated traffic is very close to the original packet trace, including self-similar properties.

  • 9.
    Abrahamsson, Henrik
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    Robust Traffic Engineering using L-balanced Weight-Settings in OSPF/IS-IS2008Other (Other academic)
  • 10.
    Abrahamsson, Henrik
    et al.
    SICS AB, Kista, Sweden .
    Hagsand, Olof
    Dynarc AB, Kista, Sweden .
    Marsh, Ian
    SICS AB, Kista, Sweden .
    TCP over High Speed Variable Capacity Links: A Simulation Study for Bandwidth Allocation2002In: Protocols for High Speed Networks Workshop, 2002, 117-129 p.Conference paper (Refereed)
  • 11.
    Addazi, Lorenzo
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Langer, Philip
    EclipsSource, Austria.
    Posse, Ernesto
    Zeligsoft, Canada.
    Towards Seamless Hybrid Graphical-Textual Modelling for UML and Profiles2017In: Lecture Notes in Computer Science, vol. 10376, Springer, 2017, 20-33 p.Chapter in book (Refereed)
    Abstract [en]

    Domain-specific modelling languages, in particular those described in terms of UML profiles, use graphical notations to maximise human understanding and facilitate communication among stakeholders. Nevertheless, textual notations are preferred for specific purposes, due to the nature of a specific domain, or for personal preference. The mutually exclusive use of graphical or textual modelling is not sufficient for the development of complex systems developed by large heterogeneous teams. We envision a modern modelling framework supporting seamless hybrid graphical and textual modelling. Such a framework would provide several benefits, among which: flexible separation of concerns, multi-view modelling based on multiple notations, convenient text-based editing operations, and text-based model editing outside the modelling environment, and faster modelling activities. In this paper we describe our work towards such a framework for UML and profiles. The uniqueness is that both graphical and textual modelling are done on a common persistent model resource, thus dramatically reducing the need for synchronisation among the two notations.

  • 12.
    Afshar, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Khalilzad, Nima
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bril, Reinder J.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Universiteit Eindhoven, Eindhoven, Netherlands.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Intra-component Resource Sharing on a Virtual Multiprocessor Platform2016In: ACM SIGBED Review: Special Issue on 8th International Workshop on Compositional Theory and Technology for Real-Time Embedded Systems, 2016, 31-32 p.Conference paper (Refereed)
    Abstract [en]

    Component-based software development facilitates the development process of large and complex software systems. By the advent of multiprocessors, the independently developed components can be integrated on a multi-core platform to achieve an efficient use of system hardware and a decrease in system power consumption and costs. In this paper, we consider a virtual multiprocessor platform where each component can be dynamically allocated to any set of processors of the platform with a maximum concurrency level. Global-EDF is used for intra-component scheduling. The existing analysis for such systems have assumed that tasks are independent. In this paper, we enable intra-component resource sharing for this platform. We investigate using a spin-based resource sharing protocol with the accompanying analysis that extends the existing analysis for independent tasks. We briefly illustrate and evaluate our initial results with an example.

  • 13.
    Afshar, Sara
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Moghaddami Khalilzad, Nima
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nemati, Farhang
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. 0000-0001-6132-7945.
    Resource Sharing among Prioritized Real-Time Applications on Multiprocessors2015In: ACM SIGBED Review - Special Issue on the 6th International Workshop on Compositional Theory and Technology for Real-Time Embedded Systems Homepage archiveVolume 12 Issue 1, 2015, 46-55 p.Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose a new protocol for handling resource sharing among prioritized real-time applications composed on a multiprocessor platform. We propose an optimal priority assignment algorithm which assigns unique priorities to the applications based on information in their interfaces. We have performed experimental evaluations to compare the proposed protocol (called MSOS-Priority) to the current state of the art locking protocols under multiprocessor partitioned scheduling, i.e., MPCP, MSRP, FMLP, MSOS, and OMLP. The valuations show that MSOS-Priority mostly performs significantly better than alternative approaches.

  • 14.
    Afshar, Sara Zargari
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    J. Bril, Reinder
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Technische Universiteit Eindhoven, Eindhoven, Netherlands.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An optimal spin-lock priority assignment algorithm for real-time multi-core systems2017In: The 23th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications RTCSA'17, 2017, 8046310Conference paper (Refereed)
    Abstract [en]

    Support for exclusive access to shared (global) resources is instrumental in the context of embedded real-time multi-core systems, and mechanisms for achieving such access must be deterministic and efficient. There exist two traditional approaches for multiprocessors when a task requests a global resource that is locked by a task on a remote core: a spin-based approach, i.e. non-preemptive busy waiting for the resource to become available, and a suspension-based approach, i.e. the task relinquishes the processor. A suspension-based approach can be viewed as a spin-based approach where the lowest priority on a core is used during spinning, similar to a non-preemptive spin-based approach where the highest priority on a core is used. By taking such a view, we previously provided a general model for spinning, where any arbitrary priority can be used for spinning, i.e. from the lowest to the highest priority on a core. Targeting partitioned fixed-priority preemptive scheduled multiprocessors and spin-based approaches that use a fixed priority for spinning per core for all tasks, we aim at increasing the schedulability of multiprocessor systems by using the spin-lock priority per core as parameter. In this paper, we present (i) a generalization of the traditional worst-case response-time analysis for non-preemptive spin-based approaches addressing an arbitrary but fixed spin-lock priority per core, (ii) an optimal spin-lock priority assignment (OSPA) algorithm per core, i.e. an algorithm that will find a fixed spin-lock priority per core that will make the system schedulable, whenever such an assignment exists and, (iii) comparative evaluations of the OSPA algorithm with the spin-based and suspension-based approaches where OSPA showed up to 38% improvement compared to both approaches.

  • 15.
    Afzal, Wasif
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Bahria University, Islamabad, Pakistan.
    Alone, Snehal
    Chalmers University of Technology, Sweden.
    Glocksien, Kerstin
    Chalmers University of Technology, Sweden.
    Torkar, Richard
    Chalmers University of Technology, Sweden.
    Software Test Process Improvement Approaches: A Systematic Literature Review and an Industrial Case Study2016In: Journal of Systems and Software JSS, ISSN 0164-1212, Vol. 111, 1-33 p.Article in journal (Refereed)
    Abstract [en]

    Software test process improvement (STPI) approaches are frameworks that guide software development organizations to improve their software testing process. We have identified existing STPI approaches and their characteristics (such as completeness of development, availability of information and assessment instruments, and domain limitations of the approaches) using a systematic literature review (SLR). Furthermore, two selected approaches (TPI NEXT and TMMi) are evaluated with respect to their content and assessment results in industry. As a result of this study, we have identified 18 STPI approaches and their characteristics. A detailed comparison of the content of TPI NEXT and TMMi is done. We found that many of the STPI approaches do not provide sufficient information or the approaches do not include assessment instruments. This makes it difficult to apply many approaches in industry. Greater similarities were found between TPI NEXT and TMMi and fewer differences. We conclude that numerous STPI approaches are available but not all are generally applicable for industry. One major difference between available approaches is their model representation. Even though the applied approaches generally show strong similarities, differences in the assessment results arise due to their different model representations.

  • 16.
    Afzal, Wasif
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bruneliere, Hugo
    AtlanMod Team, Inria, France.
    Di Ruscio, Davide
    Univ. of L'Aquila, L'Aquila, Italy.
    Sadovykh, Andrey
    Softeam, France.
    Mazzini, Silvia
    Intecs, Italy.
    Cariou, Eric
    Univ. de Pau et des Pays de l'Adour, Pau, France.
    Truscan, Dragos
    Åbo Akademi Univ., Turku, Finland.
    Cabot, Jordi
    Jordi Cabot ICREA, Barcelona, Spain.
    Field, Daniel
    ATOS, Madrid, Spain.
    Pomante, Luigi
    Univ. of L'Aquila, L'Aquila, Italy.
    Smrz, Pavel
    Brno Univ. of Technol., Brno, Czech Republic.
    The MegaM@Rt2 ECSEL Project: MegaModelling at Runtime — Scalable Model-Based Framework for Continuous Development and Runtime Validation of Complex Systems2017In: The 2017 Euromicro Conference on Digital System Design DSD'17, 2017Conference paper (Refereed)
    Abstract [en]

    A major challenge for the European electronic industry is to enhance productivity while reducing costs and ensuring quality in development, integration and maintenance. Model-Driven Engineering (MDE) principles and techniques have already shown promising capabilities but still need to scale to support real-world scenarios implied by the full deployment and use of complex electronic components and systems. Moreover, maintaining efficient traceability, integration and communication between two fundamental system life-time phases (design time and runtime) is another challenge facing scalability of MDE. This paper presents an overview of the ECSEL project entitled "MegaModelling at runtime -- Scalable model-based framework for continuous development and runtime validation of complex systems" (MegaM@Rt2), whose aim is to address the above mentioned challenges facing MDE. Driven by both large and small industrial enterprises, with the support of research partners and technology providers, MegaM@Rt2 aims to deliver a framework of tools and methods for: 1) system engineering/design & continuous development, 2) related runtime analysis and 3) global model & traceability management, respectively. The diverse industrial use cases (covering domains such as aeronautics, railway, construction and telecommunications) will integrate and apply such a framework that shall demonstrate the validation of the MegaM@Rt2 solution.

  • 17.
    Afzal, Wasif
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Bahria University, Islamabad, Pakistan .
    Torkar, Richard
    Blekinge Institute of Technology, Karlskrona, Sweden; Chalmers University of Technology, Sweden.
    Towards benchmarking feature subset selection methods for software fault prediction2016In: Computational Intelligence and Quantitative Software Engineering / [ed] Witold Pedrycz, Giancarlo Succi and Alberto Sillitti, Springer-Verlag , 2016, 33-58 p.Chapter in book (Other academic)
    Abstract [en]

    Despite the general acceptance that software engineering datasets often contain noisy, irrele- vant or redundant variables, very few benchmark studies of feature subset selection (FSS) methods on real-life data from software projects have been conducted. This paper provides an empirical comparison of state-of-the-art FSS methods: information gain attribute ranking (IG); Relief (RLF); principal com- ponent analysis (PCA); correlation-based feature selection (CFS); consistency-based subset evaluation (CNS); wrapper subset evaluation (WRP); and an evolutionary computation method, genetic program- ming (GP), on five fault prediction datasets from the PROMISE data repository. For all the datasets, the area under the receiver operating characteristic curve—the AUC value averaged over 10-fold cross- validation runs—was calculated for each FSS method-dataset combination before and after FSS. Two diverse learning algorithms, C4.5 and na ??ve Bayes (NB) are used to test the attribute sets given by each FSS method. The results show that although there are no statistically significant differences between the AUC values for the different FSS methods for both C4.5 and NB, a smaller set of FSS methods (IG, RLF, GP) consistently select fewer attributes without degrading classification accuracy. We conclude that in general, FSS is beneficial as it helps improve classification accuracy of NB and C4.5. There is no single best FSS method for all datasets but IG, RLF and GP consistently select fewer attributes without degrading classification accuracy within statistically significant boundaries.

  • 18.
    Ahlén, Richard
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Grönholm, Robin
    Mälardalen University, School of Innovation, Design and Engineering.
    En analys av ljudlatens i Windows 10 på tillgängliga enheter2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report is written during a project done by two students at Mälardalen University during the course DVA331. The purpose of this project was to determine if it was possible to reduce the latency on devices with Windows 10 to what is possible on an iOS device. The reason behind this research is that Windows 10 has come with an API that supports low latency sounds. This study was made on an iPhone 4S, iPhone 6, Nokia Lumia 720 and a Nokia Lumia 920 with a contact microphone that was put on the device. The latency was measured 50 times per version of an application implemented for both operating systems. The latency could be measured between the point where the surface is touched and and the point where sound is audible, using the microphone and the audio processing software Audacity. The readings proved that iOS is still a lot faster than Windows 10 and that Windows 10 is way above the accepted audio processing limit. Further research showed that the Windows 10 reading results were caused by the Lumia devices long input latency. User tests were made on 10 individuals with the response that the latency on the Windows 10 devices was a lot longer than the iOS devices. The conclusion was that the Lumia devices used in this study were not suitable for responsive sound applications but that Windows 10 devices with lower input latency that are better suited and that new readings should be done to determine if this is the case.

  • 19.
    Ahmed, Bestoun
    et al.
    Istituto Dalle Molle di Studi sullIntelligenza Artificiale (IDSIA), Switzerland.
    Gambardella, Luca
    Istituto Dalle Molle di Studi sullIntelligenza Artificiale (IDSIA), Switzerland.
    Afzal, Wasif
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Zamli, Kamal
    University Malaysia Pahang, Gambang, Malaysia.
    Handling Constraints in Combinatorial Interaction Testing in the Presence of Multi Objective Particle Swarm and Multithreading2017In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 86, no 01, 20-36 p.Article in journal (Refereed)
    Abstract [en]

    Combinatorial strategies have received a lot of attention lately as a result of their diverse applications in areas of research, particularly in software engineering. In its simple form, a combinatorial strategy can reduce several input parameters (configurations) of a system into a small set of these parameters based on their interaction (combination). However, in practice, the input configurations of software systems are subjected to constraints, especially highly configurable systems. To implement this feature within a strategy, many difficulties arise for construction. While there are many combinatorial interaction testing strategies nowadays, few of them support constraints. This paper presents a new strategy, called Octopus to construct a combinatorial interaction test suites with the presence of constraints. The design and algorithms are provided in the paper in detail. The strategy is inspired by the behaviour of octopus to search for the optimal solution using multi-threading mechanism. To overcome the multi judgement criteria for an optimal solution, the multi-objective particle swarm optimisation is used. The strategy and its algorithms are evaluated extensively using different benchmarks and comparisons. The evaluation results showed the efficiency of each algorithm in the strategy. The benchmarking results also showed that Octopus can generate test suites efficiently as compared to state-of-the-art strategies.

  • 20.
    Ahmed, Bestoun
    et al.
    Czech Technical University, Czech Republic.
    Zamli, Kamal
    University Malaysia Pahang, Gambang, Malaysia..
    Afzal, Wasif
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bures, Miroslav
    Czech Technical University, Czech Republic.
    Constrained Interaction Testing: A Systematic Literature Study2017In: IEEE Access, E-ISSN 2169-3536, IEEE Access, ISSN 2169-3536, Vol. PP, no 99Article, book review (Other academic)
    Abstract [en]

    Interaction testing can be used to effectively detect faults that are otherwise difficult to find by other testing techniques. However, in practice, the input configurations of software systems are subjected to constraints, especially in the case of highly configurable systems. Handling constraints effectively and efficiently in combinatorial interaction testing is a challenging problem. Nevertheless, researchers have attacked this challenge through different techniques, and much progress has been achieved in the past decade. Thus, it is useful to reflect on the current achievements and shortcomings and to identify potential areas of improvements. This paper presents the first comprehensive and systematic literature study to structure and categorize the research contributions for constrained interaction testing. Following the guidelines of conducting a literature study, the relevant data is extracted from a set of 103 research papers belonging to constrained interaction testing. The topics addressed in constrained interaction testing research are classified into four categories of constraint test generation, application, generation & application and model validation studies. The papers within each of these categories are extensively reviewed. Apart from answering several other research questions, this study also discusses the applications of constrained interaction testing in several domains such as software product lines, fault detection & characterization, test selection, security and GUI testing. The study ends with a discussion of limitations, challenges and future work in the area.

  • 21.
    Ahmed, Mobyen Uddin
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Intelligent Healthcare Service to Monitor Vital Signs in Daily Life – A Case Study on Health-IoT2017In: International Journal of Engineering Research and Applications, ISSN 2248-9622, E-ISSN 2248-9622, Vol. 7, no 3, 43-55 p.Article in journal (Refereed)
    Abstract [en]

    Vital signs monitoring for elderly in daily life environment is a promising concept that efficiently can provide medical services to people at home. However, make the system self-served and functioning as personalized provision makes the challenge even larger. This paper presents a case study on a Health-IoT system where an intelligent healthcare service is developed to monitor vital signs in daily life. Here, a generic Health-IoT framework with a Clinical Decision Support System (CDSS) is presented. The generic framework is mainly focused on the supporting sensors, communication media, secure and safe data communication, cloud-based storage, and remote accesses of the data. The CDSS is used to provide a personalized report on persons’ health condition based on daily basis observation on vital signs. Six participants, from Spain (n=3) and Slovenia (n=3) have been using the proposed healthcare system for eight weeks (e.g. 300+ health measurements) in their home environments to monitor their health. The sensitivity, specificity and overall accuracy of the DSS’s classification are achieved as 90%, 97% and 96% respectively while k=2 i.e., top 2 most similar retrieved cases are considered. The initial user evaluation result demonstrates the feasibility and performance of the implemented system through the proposed framework.

  • 22.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Catalina, Carlos Alberto
    2ITCL Polígono Industrial Villalonquéjar c/López Bravo, 70. 09001 BURGOS, Spain.
    Limonad, Lior
    Smart Wearable and IoT Solutions, IBM Research, Haifa, Israil.
    Hök, Bertil
    Hök Instrument AB, Sweden.
    Flumeri, Gianluca Di
    Cognitive States in Operative Environment, BrainSigns, Italy.
    Cloud-based Data Analytics on Human Factor Measurement to Improve Safer Transport2017In: 4th EAI International Conference on IoT Technologies for HealthCare HealthyIOT'17, 2017Conference paper (Refereed)
    Abstract [en]

    Improving safer transport includes individual and collective behavioural aspects and their interaction. A system that can monitor and evaluate the human cognitive and physical capacities based on human factor measurement is often beneficial to improve safety in driving condition. However, analysis and evaluation of human factor measurement i.e. Demographics, Behavioural and Physiological in real-time is challenging. This paper presents a methodology for cloud-based data analysis, categorization and metrics correlation in real-time through a H2020 project called SimuSafe. Initial implementation of this methodology shows a step-by-step approach which can handle huge amount of data with variation and verity in the cloud.

  • 23.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering.
    Funk, Peter
    Mälardalen University, School of Innovation, Design and Engineering.
    Xiong, Ning
    Mälardalen University, School of Innovation, Design and Engineering.
    von Schéele, Bo
    Mälardalen University, School of Innovation, Design and Engineering.
    A Three Phase Computer Assisted Biofeedback Training System Using Case-Based Reasoning2008In: Proc. 9th European Conference on Case-based Reasoning, 2008, 57-68 p.Conference paper (Refereed)
    Abstract [en]

    Biofeedback is a method gaining increased interest and showing good results for a number of physical and psychological problems. Biofeedback training is mostly guided by an experienced clinician and the results largely rely on the clinician's competence. In this paper we propose a three phase computer assisted sensor-based biofeedback decision support system assisting less experienced clinicians, acting as second opinion for experienced clinicians. The three phase CBR framework is deployed to classify a patient, estimate initial parameters and to make recommendations for biofeedback training by retrieving and comparing with previous similar cases in terms of features extracted. The three phases work independently from each other. Moreover, fuzzy techniques are incorporated into our CBR system to better accommodate uncertainty in clinicians reasoning as well as decision analysis. All parts in the proposed framework have been implemented and primarily validated in a prototypical system. The initial result shows how the three phases functioned with CBR technique to assist biofeedback training. Eventually the system enables the clinicians to allow a patient to train himself/herself unsupervised.

  • 24.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering.
    Funk, Peter
    Mälardalen University, School of Innovation, Design and Engineering.
    Xiong, Ning
    Mälardalen University, School of Innovation, Design and Engineering.
    von Schéele, Bo
    Mälardalen University, School of Innovation, Design and Engineering.
    Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity2008In: Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity, ISSN 1867-366X, Vol. 1, 3-19 p.Article in journal (Refereed)
    Abstract [en]

    Intelligent analysis of heterogeneous data and information sources for efficient decision support presents an interesting yet challenging task in clinical envi-ronments. This is particularly the case in stress medicine where digital patient re-cords are becoming popular which contain not only lengthy time series measurements but also unstructured textual documents expressed in form of natural languages. This paper develops a hybrid case-based reasoning system for stress di-agnosis which is capable of coping with both numerical signals and textual data at the same time. The total case index consists of two sub-parts corresponding to signal and textual data respectively. For matching of cases on the signal aspect we present a fuzzy similarity matching metric to accommodate and tackle the imprecision and uncertainty in sensor measurements. Preliminary evaluations have revealed that this fuzzy matching algorithm leads to more accurate similarity estimates for improved case ranking and retrieval compared with traditional distance-based matching crite-ria. For evaluation of similarity on the textual dimension we propose an enhanced cosine matching function augmented with related domain knowledge. This is im-plemented by incorporating Wordnet and domain specific ontology into the textual case-based reasoning process for refining weights of terms according to available knowledge encoded therein. Such knowledge-based reasoning for matching of tex-tual cases has empirically shown its merit in improving both precision and recall of retrieved cases with our initial medical databases. Experts in the domain are very positive to our system and they deem that it will be a valuable tool to foster wide-spread experience reuse and transfer in the area of stress diagnosis and treatment.

  • 25.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lindén, Maria
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Generic System-level Framework for Self-Serve Health Monitoring System through Internet of Things(IoT)2015In: Studies in Health Technology and Informatics, Volume 211: Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2–4 June 2015, Västerås, Sweden, 2015, Vol. 211, 305-307 p.Conference paper (Refereed)
    Abstract [en]

    Sensor data are traveling from sensors to a remote server, data is analysed remotely in a distributed manner, and health status of a user is presented in real-time. This paper presents a generic system-level framework for a self-served health monitoring system through the Internet of Things (IoT) to facilities an efficient sensor data management.

  • 26.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Olsson, Erik
    Mälardalen University, Department of Computer Science and Electronics.
    Funk, Peter
    Mälardalen University, Department of Computer Science and Electronics.
    Xiong, Ning
    Mälardalen University, Department of Computer Science and Electronics.
    A Case-Based Reasoning System for Knowledge and Experience Reuse2007In: Proceedings of the 24th annual workshop of the Swedish Artificial Intelligence Society, 2007, 70-80 p.Conference paper (Refereed)
    Abstract [en]

    Experience is one of the most valuable assets technicians and engineer have and may have been collected during many years and both from successful solutions as well as from very costly mistakes. Unfortunately industry rarely uses a systematic approach for experience reuse. This may be caused by the lack of efficient tools facilitating experience distribution and reuse. We propose a case-based approach and tool to facilitate experience reuse more systematically in industry. It is important that such a tool allows the technicians to give the problem case in a flexible way to increase acceptance and use. The proposed tool enables more structured handling of experience and is flexible and can be adapted to different situations and problems. The user is able to input text in a structured way and possibly in combination with other numeric or symbolic features. The system is able to identify and retrieve relevant similar experiences for reuse.

  • 27.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Olsson, Erik
    Mälardalen University, Department of Computer Science and Electronics.
    Funk, Peter
    Mälardalen University, Department of Computer Science and Electronics.
    Xiong, Ning
    Mälardalen University, Department of Computer Science and Electronics.
    Efficient Condition Monitoring and Diagnosis Using a Case-Based Experience Sharing System2007In: The 20th International Congress and Exhibition on Condition Monitoring and Diagnostics Engineering Management, COMADEM 2007, Faro, Portugal, 2007, 305-314 p.Conference paper (Refereed)
    Abstract [en]

    Industry has to adjust quickly to changes in their surroundings, for example reducing staff during recession and increasing staff when the market demands it. These factors may cause rapid loss of experience, collected during many years, or require experienced staff to spend considerable resources in training new staff, instead of focusing on production. This is recognised as very costly for companies and organisations today and also reduces competitiveness and productivity. Condition Monitoring, diagnostics and selection of efficient preventive or corrective actions is a task that often requires a high degree of expertise. This expertise is often gained through sometimes very expensive mistakes and can take many years to acquire leading to a few skilled experts. When they are not available due to changes in staff or retirements the company often faces serious problems that may be very expensive, e.g. leading to a reduced productivity.

    If some deviation occurs in a machine, a fault report is often written; an engineer makes a diagnosis and may order spare parts to repair the machine. Fault report, spare parts, required time and statistics on performance after repair are often stored in different databases but so far not systematically reused. In this paper we present a Case-Based experience sharing system that enables reuse of experience in a more efficient way compared with what is mostly practiced in industry today. The system uses Case-Based-Reasoning (CBR) and limited Natural Language Processing. An important aspect of the experience management tool is that it is user-friendly and web-based to promote efficient experience sharing. The system should be able to handle both experiences that are only in house as well as sharing experience with other industries when there is no conflicting interest. Such a CBR based tool enables efficient experience gathering, management and reuse in production industries. The tool will facilitate the users with an interactive environment to communicate with each other for sharing their experiences. Depend on the user; the security level of the system will be varied to share knowledge among the collaborating companies.

    The system identifies the most relevant experiences to assess and resolve the current situation. The experience is stored and retrieved as a case in the collaborative space where experience from various companies may have been stored under many years. Reusing experience and avoiding expensive mistakes will increase the participating companies' competitiveness and also transfer valuable experience to their employees. One of the benefits is also the opportunity and facility to identify people with similar tasks and problems at different companies and enable them to share their experience, e.g. if a technician has solved a similar problem recently and is in the near, the most efficient solution may be to call the expert and ask for assistance. In future, one may access this tool through his/her mobile device via wireless or mobile communications using Global Positioning System, GPS, enables the system to suggest experts nearby, willing and able to share the knowledge and quickly assist in resolve the problem.

  • 28.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Westin, Jerker
    Nyholm, Dag
    Dougherty, Mark
    Groth, Torgny
    A fuzzy rule-based decision support system for Duodopa treatment in Parkinson2006Conference paper (Refereed)
    Abstract [en]

    A decision support system (DSS) was implemented based on a fuzzy logic inference system (FIS) to provide assistance in dose alteration of Duodopa infusion in patients with advanced Parkinson's disease, using data from motor state assessments and dosage. Three-tier architecture with an object oriented approach was used. The DSS has a web enabled graphical user interface that presents alerts indicating non optimal dosage and states, new recommendations, namely typical advice with typical dose and statistical measurements. One data set was used for design and tuning of the FIS and another data set was used for evaluating performance compared with actual given dose. Overall goodness-of-fit for the new patients (design data) was 0.65 and for the ongoing patients (evaluation data) 0.98. User evaluation is now ongoing. The system could work as an assistant to clinical staff for Duodopa treatment in advanced Parkinson's disease.

  • 29.
    Aisa, J.
    et al.
    Universidad de Zaragoza, Zaragoza, Spain .
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Villarroel, J. L.
    Universidad de Zaragoza, Zaragoza, Spain .
    Almeida, L.
    University of Porto, Porto, Portugal.
    Soft real-time traffic communication in loaded Wireless Mesh Networks2016In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, 2016, Article number 7496503Conference paper (Refereed)
    Abstract [en]

    Industrial applications have been shifting towards wireless multi-hop networks in recent years due to their lower cost of deployment and reconfiguration compared with their wired counterparts. These wireless networks usually must support real-time communication to meet the application requirements. For this reason, Wireless Mesh Networks (WMNs) are potential candidates for industrial applications as they support a fixed infrastructure of static nodes for relaying packets. To meet the application demands, we modify the wireless chain network protocol (WICKPro) to support soft real-time traffic in WMNs with chain topologies over IEEE 802.11. We employ tele-operation of mobile robots as our case study, and perform extensive simulation and laboratory experiments. We show that the data delivery ratio is increased up to 42% in a scenario with 7 nodes, when the maximum end-to-end delay tolerated by the application is doubled. This is particularly suited to soft real-time applications that can trade longer delays by higher reliability. Moreover, when compared with a distributed priority-based token-passing protocol (RT-WMP), the lower overhead of WICKPro allows, in an error-free scenario, obtaining a throughput improvement of 33.42% on average.

  • 30.
    Aisa, Jesus
    et al.
    Universidad de Zaragoza, Zaragoza, Spain.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Almeida, Luis
    University of Porto, Portugal.
    Villarroel, José Luis
    Universidad de Zaragoza, Zaragoza, Spain.
    DoTHa - A Double-threshold Hand-off Algorithm for Managing Mobility in Wireless Mesh Networks2016In: 21st IEEE Conference on Emerging Technologies and Factory Automation ETFA'16, 2016, 7733511Conference paper (Refereed)
    Abstract [en]

    Wireless communication will play an increasingly important role in future factory automation and process control, where the presence of mobile autonomous devices is expected to grow. However, wireless links are prone to errors due to shadowing and multi-path fading, which is even more severe in dynamic environments. These problems can be attenuated by using a mesh backbone to which mobile node connect to, using a hand-off algorithm. This solution is particularly important under real-time requirements typically found in factory automation. In this paper, we devise the Double-Threshold Hand-off (DoTHa) algorithm, a novel hand-off mechanism that triggers a hand-off in various environmental conditions. As a case study, we carry out the tele-operation of a mobile robot through a wireless mesh network in an indoor setting, using a wireless chain network protocol (WICKPro-SRT) that supports soft real-time traffic. We empirically compared DoTHa with two existing hand-off algorithms based on single and double hysteresis margin. The results revealed that DoTHa achieves Data Delivery Ratio (DDR) close to 100% whereas the single hysteresis-based hand-off suffers from frequent disconnections, dropping DDR to 88%. The double hysteresis-based hand-off shows higher ping-pong effect than DoTHa, doubling the number of hand-offs in some scenarios.

  • 31.
    Alajrami, S.
    et al.
    Newcastle University, Newcastle-upon-Tyne, United Kingdom.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Romanovsky, A.
    Newcastle University, Newcastle-upon-Tyne, United Kingdom.
    EXE-SPEM: Towards cloud-based executable software process models2016In: MODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development, 2016, 517-526 p.Conference paper (Refereed)
    Abstract [en]

    Executing software processes in the cloud can bring several benefits to software development. In this paper, we discuss the benefits and considerations of cloud-based software processes. EXE-SPEM is our extension of the Software and Systems Process Engineering (SPEM2.0) Meta-model to support creating cloud-based executable software process models. Since SPEM2.0 is a visual modelling language, we introduce an XML notation meta-model and mapping rules from EXE-SPEM to this notation which can be executed in a workflow engine. We demonstrate our approach by modelling an example software process using EXE-SPEM and mapping it to the XML notation. 

  • 32.
    Alajrami, S.
    et al.
    Newcastle University, Newcastle upon Tyne, United Kingdom .
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sljivo, Irfan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Romanovsky, A.
    Newcastle University, Newcastle upon Tyne, United Kingdom .
    Isberg, Petter
    Mälardalen University.
    Towards cloud-based enactment of safety-related processes2016In: Lecture Notes in Computer Science, vol. 9922, 2016, 309-321 p.Conference paper (Refereed)
    Abstract [en]

    Engineering safety-critical systems is a complex task which involves multiple stakeholders. It requires shared and scalable computation to systematically involve geographically distributed teams. The paper proposes a model-driven cloud-based enactment architecture automating safety-critical processes. This work adapts our previous work on cloud-based software engineering by enriching the architecture with an automatic support for generation of both, product-based safety arguments from failure logic analysis results and process-based arguments from the process model and the enactment data. The approach is demonstrated using a fragment of a process adapted from the aerospace domain. 

  • 33.
    Alajrami, Sami
    et al.
    Newcastle University, Newcastle upon Tyne, UK.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. IS (Embedded Systems).
    Romanovsky, Alexander
    Newcastle University, Newcastle upon Tyne, UK.
    Enabling GSD Task Allocation via Cloud-based Software Processes2017In: Software Engineering Research, Management and Applications SERA-2017, Springer, 2017, 179-192 p.Conference paper (Refereed)
    Abstract [en]

    Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experi- ence of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites. Decision sup- port can help make the task allocation a more informed and systematic process. The challenges in allocating tasks to distributed sites exist because of three dis- tance dimensions between sites (geographical, temporal and cultural). An informed task allocation decision needs to consider these distances. Therefore, in this paper, we propose to integrate and semi-automate the calculation of an existing Global Distance Metric (GDM) into an architecture that supports executing cloud-based software processes. We analyze the potential of integrating the GDM into this archi- tecture and identify the needed extensions to the architecture.

  • 34.
    Alajrami, Sami
    et al.
    Newcasle University, UK.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. IS (Embedded Systems).
    Romanovsky, Alexander
    Newcasle University, UK.
    Enabling GSD Task Allocation via Cloud-based Software Processes2017In: International Journal of Networked and Distributed Computing, E-ISSN 2211-7946, Vol. 5, no 4, 221-232 p.Article in journal (Refereed)
    Abstract [en]

    Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experience of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites. Decision support can help make the task allocation a more informed and systematic process. The challenges in allocating tasks to distributed sites exist because of three distance dimensions between sites (geographical, temporal and cultural). An informed task allocation decision needs to consider these distances. Therefore, in this paper, we propose to integrate and semi-automate the calculation of an existing Global Distance Metric (GDM) into an architecture that supports executing cloud-based software processes. We analyze the potential of integrating the GDM into this architecture and identify the needed extensions to the architecture.

  • 35.
    Almér, Alexander
    et al.
    Chalmers University of Technology and Gothenburg University, Sweden.
    von Hautwitz, Rickard
    Chalmers University of Technology and Gothenburg University, Sweden.
    Dodig-Crnkovic, Gordana
    Chalmers University of Technology and Gothenburg University, Sweden.
    Collective Cognition and Distributed Information Processing from Bacteria to Humans: Proc. AISB Conference Kent 2015.2015In: 41st Annual Convention of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour: (AISB 2015), 2015, 119-124 p.Conference paper (Refereed)
    Abstract [en]

    The aim of this paper is to propose a general infocomputational model of cognition that can be applied to living organisms from the level of a single cell´s cognition to the level of groups of increasingly complex organisms with social, distributed cognition. We defend the project of new cognitivism, which unlike the old one acknowledges the central role of embodiment for cognition. Information processing going on in a cognising agent range from transduction of chemical signals and “quorum sensing” in bacteria, via simple local rules of behaviour that insects follow and that manifest themselves as “swarm intelligence”, to human level cognition with full richness of human languages and other systems of communication.

  • 36.
    Altenbernd, Peter
    et al.
    University of Applied Sciences Darmstadt, Germany.
    Ermedahl, Andreas
    Mälardalen University, School of Innovation, Design and Engineering.
    Lisper, Björn
    Mälardalen University, School of Innovation, Design and Engineering.
    Gustafsson, Jan
    Mälardalen University, School of Innovation, Design and Engineering.
    Automatic Generation of Timing Models for Timing Analysis of High-Level Code2011In: 19th International Conference on Real-Time and Network Systems (RTNS2011), 2011Conference paper (Refereed)
    Abstract [en]

    Traditional timing analysis is applied only in the late stages of embedded system software development, when the hardware is available and the code is compiled and linked. However, preliminary timing estimates are often needed already in early stages of system development, both for hard and soft real-time systems. If the hardware is not yet fully accessible, or the code is not yet ready to compile or link, then the timing estimation must be done for the source code rather than for the binary. This paper describes how source-level timing models can be derived automatically for given combinations of hardware architecture and compiler. The models are identified from measured execution times for a set of synthetic "training programs" compiled for the hardware platform in question. The models can be used to derive source-level WCET estimates, as well as for estimating the execution times for single program runs. Our experiments indicate that the models can predict the execution times of the final, compiled code with a deviation up to 20%.

  • 37.
    Altenbernd, Peter
    et al.
    University of Applied Sciences, Germany.
    Gustafsson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lisper, Björn
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Stappert, Friedhelm
    Siemens VDO Automotive AG, Germany.
    Early execution time-estimation through automatically generated timing models2016In: Real-time systems, ISSN 0922-6443, E-ISSN 1573-1383, Vol. 52, no 6, 731-760 p.Article in journal (Refereed)
    Abstract [en]

    Traditional timing analysis, such as worst-case execution time analysis, is normally applied only in the late stages of embedded system software development, when the hardware is available and the code is compiled and linked. However, preliminary timing estimates are often needed in early stages of system development as an essential prerequisite for the configuration of the hardware setup and dimensioning of the system. During this phase the hardware is often not available, and the code might not be ready to link. This article describes an approach to predict the execution time of software through an early, source-level timing analysis. A timing model for source code is automatically derived from a given combination of hardware architecture and compiler. The model is identified from measured execution times for a set of synthetic training programs, compiled for the hardware platform in question. It can be used to estimate the execution time for code running on the platform: the estimation is then done directly from the source code, without compiling and running it. Our experiments show that, using this model, we can predict the execution times of the final, compiled code surprisingly well. For instance, we achieve an average deviation of 8 % for a set of benchmark programs for the ARM7 architecture.

  • 38.
    Alvaro, Alexandre
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Land, Rikard
    Mälardalen University, Department of Computer Science and Electronics.
    Crnkovic, Ivica
    Mälardalen University, Department of Computer Science and Electronics.
    Software Component Evaluation: A Theoretical Study on Component Selection and Certification2007Report (Other academic)
    Abstract [en]

    Software components need to be evaluated at several points during their life cycle, by different actors and for different purposes. Besides the quality assurance performed by component developers, there are two main activities which include evaluation of components: component selection (i.e. evaluation performed by the system developer in order to select the best fit component to use in a system) and an envisioned component certification (i.e. evaluation made by an independent actor in order to increase the trust in the component). This paper examines the fundamental similarities and differences between these two types of component evaluations and elaborates how these fit in the overall process views of component-based development for both COTS-based development and software product line development.

  • 39.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Huselius, Joel
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics. ABB Corporate Research, Västerås, Sweden.
    Extracting Simulation Models from Complex Embedded Real-Time Systems2006In: Proceedings of the 2006 International Conference on Software Engineering Advances, ICSEA'06, Tahiti, French Polynesia, 2006, Article number 4031792- p.Conference paper (Refereed)
    Abstract [en]

    A modeling process is presented for extracting timingaccurate simulation models from complex embedded real-time systems. The process is supported by two complementary methods for tool-supported model extraction, Model Synthesis and Hybrid Model Extraction. The generated models enable impact analysis for complex real-time systems with respect to dynamic system properties, such as timing and resource usage. This can make software maintenance more predictable with respect to time-to-market and development costs, since timing errors can be identified early and avoided. The contribution of the paper is the modeling process, the Hybrid Model Extraction method and an interactive modeling tool, MASS, designed to support Hybrid Model Extraction of large implementations in C.

  • 40.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    A Framework for Analysis of Timing and Resource Utilization targeting Complex Embedded Systems2006In: ARTES - A network for Real-Time research and graduate Education in Sweden 1997 - 2006, Uppsala: Department of Information Technology , 2006, 297-329 p.Chapter in book (Other academic)
    Abstract [en]

    A problem in common of many complex software systems embedded in industrial

    products is the absence of analyzability as formal models of the system

    behavior does not exist. When performing maintenance of such systems it is

    hard to predict how changes will impact specific system properties related to

    timing and resource utilization and there is therefore a significant risk of running

    into problems with unexpected side-effects of the changes made, which

    increases development time required and costs.

    In this paper we present the ART Framework, a set of methods and tools

    that enable behavior impact analysis for existing industrial real-time systems.

    The ART Framework enables developers of complex software systems to identify

    problematic side-effects of a proposed design before vast resources have

    been invested in implementation and testing. This reduces the risk of expensive

    and time-consuming problems discovered late in a development project

    and also reduces the risk releasing software containing latent critical errors.

  • 41.
    Aravind, Meera
    et al.
    Mälardalen University.
    Wiklander, G.
    Uppsala University, Uppsala, Sweden.
    Palmheden, J.
    Scania AB, Södertälje, Sweden.
    Dobrin, Radu
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms2017In: Communications in Computer and Information Science, vol. 778, Springer Verlag , 2017, 37-46 p.Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) has revolutionized transportation systems by connecting vehicles consequently enabling their tracking, as well as monitoring of driver activities. Such an IoT platform requires a significant amount of data to be send from the on-board vehicle to the off-board servers, contributing to high network usage. The data can be send at regular intervals or in an event-based manner whenever relevant events occur. In interval-based approach, the data is send even if it is not relevant for reporting leading to a wastage of network resources, e.g., when the data does not change considerably compared to the previously sent value. In this paper, we investigate the possibility of using an event-based architecture to send data from the on-board system to the off-board system. The results show that our event-based architecture improves the accuracy of data available at the off-board system, by a careful selection of events. Moreover, we found that our event based architecture significantly decreases the frequency of sending messages, particularly during highway driving, leading to reduced average data transfer rates. Our results enable a customer to perform trade-offs between accuracy and data transfer rates. 

  • 42. Argunsah, Ali Özgur
    et al.
    Çürüklü, Baran
    Mälardalen University, School of Innovation, Design and Engineering.
    Cetin, Mujdat
    Detection of Eye Blinks from EEG using Hidden Markov Models2009Conference paper (Refereed)
  • 43.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Almeida, Luis
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. University of Porto, Porto, Portugal .
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    MTU Configuration for Real-Time Switched Ethernet Networks2016In: Journal of systems architecture, ISSN 1383-7621, E-ISSN 1873-6165, Vol. 70, 15-25 p.Article in journal (Refereed)
    Abstract [en]

    In this paper, we show that in real-time switched Ethernet networks reducing the Maximum Transmission Unit (MTU) size may cause an increase or decrease in the response time of messages. This contradicting behavior arises an optimization problem for configuring the MTU size. We formulate the optimization problem in the context of the multi-hop HaRTES architecture, which is a hard real-time Ethernet protocol. As part of the solution, we propose a search-based algorithm to achieve optimum solutions. We modify the algorithm by presenting two techniques to reduce the search space. Then, we propose a heuristic algorithm with a pseudo-polynomial time complexity based on the search-based algorithm. We perform several experiments, and we show that the proposed heuristic results in an improvement regarding messages response times, compared with configuring the MTU to the maximum or minimum values. Moreover, we show in small network configurations that the heuristic performs as good as the search-based algorithm in many cases.

  • 44.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Du, Yong
    Almeida, L.
    University of Porto, Porto, Portugal .
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Dynamic reconfiguration in HaRTES switched ethernet networks2016In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, 2016, Article number 7496510Conference paper (Refereed)
    Abstract [en]

    The ability of reconfiguring a system during runtime is essential for dynamic real-time applications in which resource usage is traded online for quality of service. The HaRTES switch, which is a modified Ethernet switch, holds this ability for the network resource, and at the same time it provides hard real-time support for both periodic and sporadic traffic. Although the HaRTES switch technologically caters this ability, a protocol to actually perform the dynamic reconfiguration is missing in multi-hop HaRTES networks. In this paper we introduce such a protocol that is compatible with the traffic scheduling method used in the architecture. We prove the correctness of the protocol using a model checking technique. Moreover, we conduct a set of simulation experiments to show the performance of the protocol and we also show that the reconfiguration process is terminated within a bounded time. 

  • 45.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Khalilzad, Nima
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Mubeen, Saad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. IS (Embedded Systems).
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sander, Ingo
    Royal Institute of Technology, Sweden.
    Almeida, Luis
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Designing End-to-end Resource Reservations in Predictable Distributed Embedded SystemsIn: Real-time systems, ISSN 0922-6443, E-ISSN 1573-1383Article in journal (Refereed)
  • 46.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Mubeen, Saad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Almeida, Luis
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    End-to-end Resource Reservations in Distributed Embedded Systems2016In: Proceedings - 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2016, 2016, 1-11 p., 7579921Conference paper (Refereed)
    Abstract [en]

    The resource reservation techniques provide effective means to lower the software complexity, ensure predictability and allow flexibility during the development and execution of complex distributed embedded systems. In this paper we propose a new end-to-end resource reservation model for distributed embedded systems. The model is comprehensive in such a way that it supports end-to-end resource reservations on distributed transactions with various activation patterns that are commonly used in industrial control systems. The model allows resource reservations on processors and real-time network protocols. We also present timing analysis for the distributed embedded systems that are developed using the proposed model. The timing analysis computes the end-to-end response times as well as delays such as data age and reaction delays. The presented analysis also supports real-time networks that can autonomously initiate transmissions. Such networks are not supported by the existing analyses. We also include a case study to show the usability of the model and end-to-end timing analysis with resource reservations.

  • 47.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Patti, Gaetano
    University of Catania, Italy.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Alderisi, Giuliana
    University of Catania, Italy.
    Lo Bello, Lucia
    University of Catania, Italy.
    Schedulability Analysis of Ethernet Audio Video Bridging Networks with Scheduled Traffic Support2017In: Real-time systems, ISSN 0922-6443, E-ISSN 1573-1383, Vol. 53, no 4, 526-577 p.Article in journal (Refereed)
    Abstract [en]

    The IEEE Audio Video Bridging (AVB) technology is nowadays under consideration in several automation domains, such as, automotive, avionics, and industrial communications. AVB offers several benefits, such as open specifications, the existence of multiple providers of electronic components, and the real-time support, as AVB provides bounded latency to real-time traffic classes. In addition to the above mentioned properties, in the automotive domain, comparing with the existing in-vehicle networks, AVB offers significant advantages in terms of high bandwidth, significant reduction of cabling costs, thickness and weight, while meeting the challenging EMC/EMI requirements. Recently, an improvement of the AVB protocol, called the AVB ST, was proposed in the literature, which allows for supporting scheduled traffic, i.e., a class of time-sensitive traffic that requires time-driven transmission and low latency. In this paper, we present a schedulability analysis for the real-time traffic crossing through the AVB ST network. In addition, we formally prove that, if the bandwidth in the network is allocated according to the AVB standard, the schedulability test based on response time analysis will fail for most cases even if, in reality, these cases are schedulable. In order to provide guarantees based on analysis test a bandwidth over-reservation is required. In this paper, we propose a solution to obtain a minimized bandwidth over-reservation. To the best of our knowledge, this is the first attempt to formally spot the limitation and to propose a solution for overcoming it. The proposed analysis is applied to both the AVB standard and the AVB ST. The analysis results are compared with the results of several simulative assessments, obtained using OMNeT++, on both automotive and industrial case studies. The comparison between the results of the analysis and the simulation ones shows the effectiveness of the analysis proposed in this work.

  • 48.
    Ashjaei, Seyed Mohammad Hossein
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Mubeen, Saad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundbäck, John
    Arcticus Systems AB, Sweden.
    Gålnander, Mattias
    Arcticus Systems AB, Sweden.
    Lundbäck, Kurt-Lennart
    Arcticus Systems AB, Sweden.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Modeling and Timing Analysis of Vehicle Functions Distributed over Switched Ethernet2017In: 43rd Annual Conference of the IEEE Industrial Electronics Society IECON 2017, 2017Conference paper (Refereed)
    Abstract [en]

    This paper proposes an approach to model switched Ethernet communication within a model- and component-based software development framework for vehicular distributed embedded systems. The paper also presents a method to extract the network timing model from the systems that use switched Ethernet networks. In order to provide a proof of concept, an existing industrial component model and its tool suite, namely RCM and Rubus-ICE respectively, are extended by implementing the modeling technique, the timing model extraction method and response-time analysis of the Ethernet AVB protocol. The extensions to RCM are backward compatible with the modeling and end-to-end timing analysis of traditional in-vehicle networks and legacy (previously developed) vehicular distributed embedded systems. Furthermore, the paper discusses the implementation and test strategy used in this work. Finally, the usability of the modeling approach and implemented timing analysis is demonstrated by modeling and time analyzing a vehicular application case study with the extended component model and tool suite.

  • 49.
    Aslam, Mudassar
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. In fact, the characteristics of cloud computing become basis of new problems, for example, support of third party hosting introduces loss of user control on the hardware; similarly, on-demand availability requires reliance on complex and possibly insecure API interfaces; seamless scalability relies on the use of sub-providers; global access over public Internet exposes to broader attack surface; and use of shared resources for better resource utilization introduces isolation problems in a multi-tenant environment. These new security issues in addition to existing security challenges (that exist in today's classic IT environments) become major reasons for the lack of user trust in cloud based services categorized in Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS).

    The focus of this thesis is on IaaS model which allows users to lease IT resources (e.g. computing power, memory, storage, etc.) from a public cloud to create Virtual Machine (VM) instances. The public cloud deployment model considered in this thesis exhibits most elasticity (i.e. degree of freedom to lease/release IT resources according to user demand) but is least secure as compared to private or hybrid models. As a result, public clouds are not trusted for many use cases which involve processing of security critical data such as health records, financial data, government data, etc. However, public IaaS clouds can also be made trustworthy and viable for these use cases by providing better transparency and security assurance services for the user. In this thesis, we consider such assurance services and identify security aspects which are important for making public clouds trustworthy. Based upon our findings, we propose solutions which promise to improve cloud transparency thereby realizing trustworthy clouds.

    The solutions presented in this thesis mainly deal with the secure life cycle management of the user VM which include protocols and their implementation for secure VM launch and migration. The VM launch and migration solutions ensure that the user VM is always hosted on correct cloud platforms which are setup according to a profile that fulfills the use case relevant security requirements. This is done by using an automated platform security audit and certification mechanism which uses trusted computing and security automation techniques in an integrated solution. In addition to provide the assurance about the cloud platforms, we also propose a solution which provides assurance about the placement of user data in correct and approved geographical locations which is critical from many legal aspects and usually an important requirement of the user. Finally, the assurance solutions provided in this thesis increase cloud transparency which is important for user trust and to realize trustworthy clouds.

  • 50.
    Asplund, Lars
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Safety Critical Systems Based on Formal Models2000In: ACM SIGAda Letters, ISSN 1094-3641, Vol. XX, no 4, 32-39 p.Article in journal (Refereed)
    Abstract [en]

    The Ravenscar profile for high integrity systems using Ada 95 is well defined in all real-time aspects. The complexity of the run-time system has been reduced to allow full utilization of formal methods for applications using the Ravenscar profile. In the Mana project a tool set is being developed including a formal model of a Ravenscar compliant run-time system, a gnat compatible run-time system, and an ASIS based tool to allow for the verification of a system including both COTS and code that is reused.

1234567 1 - 50 of 714
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf