SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Svenson Pontus) "

Search: WFRF:(Svenson Pontus)

  • Result 1-27 of 27
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Ahlberg, Simon, et al. (author)
  • An information fusion demonstrator for tactical intelligence processing in network-based defense
  • 2007
  • In: Information Fusion. - : Elsevier BV. - 1566-2535 .- 1872-6305. ; 8:1, s. 84-107
  • Journal article (peer-reviewed)abstract
    • The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodology suitable for a future Network Based Defense (NBD) C4ISR system. The focus of the demonstrator is on real-time tactical intelligence processing at the division level in a ground warfare scenario. The demonstrator integrates novel force aggregation, particle filtering, and sensor allocation methods to create, dynamically update, and maintain components of a tactical situation picture. This is achieved by fusing physically modelled and numerically simulated sensor reports from several different sensor types with realistic a priori information sampled from both a high-resolution terrain model and an enemy organizational and behavioral model. This represents a key step toward the goal of creating in real time a dynamic, high fidelity representation of a moving battalion-sized organization, based on sensor data as well as a priori intelligence and terrain information, employing fusion, tracking, aggregation, and resource allocation methods all built on well-founded theories of uncertainty. The motives behind this project, the fusion methods developed for the system, as well as its scenario model and simulator architecture are described. The main services of the demonstrator are discussed and early experience from using the system is shared.
  •  
2.
  • Ahlberg, Simon, et al. (author)
  • The IFD03 information fusion demonstrator
  • 2004
  • In: Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004. - 917056115X ; , s. 936-943
  • Conference paper (peer-reviewed)abstract
    • The paper discusses a recently developed demonstrator system where new ideas in tactical information fusion may be tested and demonstrated. The main services of the demonstrator are discussed, and essential experience from the use and development of the system is shared.
  •  
3.
  • Andler, Sten F., et al. (author)
  • SMARTracIn : a concept for spoof resistant tracking of vessels and detection of adverse intentions
  • 2009
  • In: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII. - : SPIE - International Society for Optical Engineering. - 9780819475718 ; , s. 73050G-1-73050G-9
  • Conference paper (peer-reviewed)abstract
    • The aim of maritime surveillance systems is to detect threats earlyenough to take appropriate actions. We present the results ofa study on maritime domain awareness performed during the fallof 2008. We analyze an identified capability gap of worldwidesurveillance in the maritime domain, and report from a userworkshop addressing the identified gap. We describe a SMARTracIn conceptsystem that integrates information from surveillance systems with background knowledgeon normal conditions to help users detect and visualize anomaliesin vessel traffic. Land-based systems that cover the coastal watersas well as airborne, space-borne and ships covering open seaare considered. Sensor data are combined with intelligence information fromship reporting systems and databases. We describe how information fusion,anomaly detection and semantic technology can be used to helpusers achieve more detailed maritime domain awareness. Human operators area vital part of this system and should be activecomponents in the fusion process. We focus on the problemof detecting anomalous behavior in ocean-going traffic, and a roomand door segmentation concept to achieve this. This requires theability to identify vessels that enter into areas covered bysensors as well as the use of information management systemsthat allow us to quickly find all relevant information.
  •  
4.
  • Axelsson, Jakob, et al. (author)
  • On the Concepts of Capability and Constituent System Independence in Systems-of-Systems
  • 2022
  • In: 2022 17th Annual System of Systems Engineering Conference, SOSE 2022. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665496230 ; , s. 247-252
  • Conference paper (peer-reviewed)abstract
    • Systems-of-systems are designed to provide a capability that their constituent systems cannot achieve individually. A key property is that the constituent systems have some degree of operational and managerial independence. The concepts of capability and independence are thus central to the field of systems-of-systems. Yet the contemporary literature and standards only give vague definitions of these terms. This vagueness is a barrier to progress in the field, and this paper aims at contributing with a more detailed conceptualization. It describes a system capability as a state-transforming process that uses certain resources. Independence means that the system has a choice about when and how its capabilities should be activated. This requires that the system is an intelligent agent with a notion of utility, a perception of the world around it, and a decision-making capability. When given a mission, the system can complete that mission by activating appropriate combinations of capabilities. A system-of-systems can decompose its mission into parts that correspond to the capabilities of various constituent systems.
  •  
5.
  • Axelsson, Jakob, et al. (author)
  • Truck Platooning Business Case Analysis
  • 2020
  • Reports (other academic/artistic)abstract
    • In this report we describe results from the work on business case analysis of the Sweden for Platooning (S4P) project. Platooning has the potential to contribute to the on-going transformation of the transport sector by reducing environmental impact, saving fuel, as well as (to a lesser extent) by improving traffic flow and safety and in the long run reducing driver hours. In order to fulfil these promises, it must be shown that there are viable business cases for all involved actors. This report describes the analysis of truck platooning business cases performed in the S4P project.Some of the main findings are that there is a significant potential for reducing fuel consumption and hence CO2 exhaust through platooning; that waiting on the order of minutes for a platooning opportunity is reasonable but that taking another route is probably not; that it is necessary to have mediating services that help platoons to form and share the costs and benefits associated with platooning; and that there are different possible ways of implementing a system for sharing the benefits.
  •  
6.
  • Brynielsson, Joel, et al. (author)
  • A Vision of a Toolbox for Intelligence Production
  • 2008
  • In: Skövde Workshop on Information Fusion Topics (SWIFT 2008). ; , s. 77-80
  • Conference paper (peer-reviewed)abstract
    • In this paper, we describe preliminary work on a toolbox aiming to help analysts involved in the intelligence production process. Intelligence analysts are overwhelmed by information, both in the form of sensory data, text stemming from human observations and other sources. In order to make sense of this information and to produce the intelligence reports needed by decision-makers, assisting computer tools are needed. We briefly describe parts of the intelligence process and touch upon the subject of what parts can and cannot be automated. A tool for tagging information semantically that we are currently working on is described, and ideas for two other tools are briefly outlined.
  •  
7.
  • Brynielsson, Joel, 1974-, et al. (author)
  • Analysis of Weak Signals for Detecting Lone Wolf Terrorists
  • 2012
  • In: Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012). ; , s. 197-204
  • Conference paper (peer-reviewed)abstract
    • Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kind of terrorists before they commit a terror act is limited since they are very hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack. Therefore, there is a good possibility that they leave digital traces in the form of weak signals that can be gathered, fused, and analyzed.In this work we present an analysis method that can be used to analyze extremist forums to profile possible lone wolf terrorists. This method is conceptually demonstrated using the FOI Impactorium fusion platform. We also present a number of different technologies that can be used to harvest and analyze information from Internet, serving as weak digital traces that can be fused using the suggested analysis method, in order to discover possible lone wolf terrorists.
  •  
8.
  • Brynielsson, Joel, et al. (author)
  • Detecting Social Positions Using Simulation
  • 2010
  • In: Proceedings of the 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010). - : IEEE. - 9780769541389 ; , s. 48-55
  • Conference paper (peer-reviewed)abstract
    • Describing social positions and roles is an important topic within social network analysis. One approach is to compute a suitable equivalence relation on the nodes of the target network. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simulation relation. Simulation creates a partial order on the set of actors in a network and we can use this order to identify actors that have characteristic properties. The simulation relation can also be used to compute simulation equivalence which is a less restrictive equivalence relation than regular equivalence but is still computable in polynomial time. This paper primarily considers weighted directed networks and we present definitions of both weighted simulation equivalence and weighted regular equivalence. Weighted networks can be used to model a number of network domains, including information flow, trust propagation, and communication channels. Many of these domains have applications within homeland security and in the military, where one wants to survey and elicit key roles within an organization. Identifying social positions can be difficult when the target organization lacks a formal structure or is partially hidden.
  •  
9.
  • Brynielsson, Joel, 1974-, et al. (author)
  • Development of Computerized Support Tools for Intelligence Work
  • 2009
  • In: Proceedings of the 14th International Command and Control Research and Technology Symposium (14th ICCRTS). - Washington, DC.
  • Conference paper (peer-reviewed)abstract
    • In the tasks facing the armed forces today there is a need for new and improved intelligence analysis tools. The opponents no longer follow strict doctrines that determine their behavior and force-composition. Several different opposing groups must be taken into account, some of which will appear to act friendly towards us. In this paper, we describe a vision for how various information fusion tools can be used to help intelligence analysts and decision-makers achieve situation awareness. We consider intelligence work and propose an analyst-centric toolbox aiming to help analysts involved in the intelligence production process to prepare suitable reports. Intelligence analysts are overwhelmed by information, both in the form of sensory data, text stemming from human observations and other sources. We describe parts of the intelligence process and touch upon the subject of what parts can and cannot be automated. The toolbox is outlined by describing a number of possible tools, e.g., semantic information tagging, a threat model construction assistant, a situation picture construction assistant, social network visualization, a game-theoretic reasoning engine, etc. Some of the tools described have been implemented as concept prototypes whereas others are the subject of ongoing research.
  •  
10.
  • Brynielsson, Joel, et al. (author)
  • Social Positions and Simulation Relations
  • 2012
  • In: Social Network Analysis and Mining. - Wien : Springer. - 1869-5450 .- 1869-5469. ; 2:1, s. 39-52
  • Journal article (peer-reviewed)abstract
    • Describing social positions and roles is an important topic within the social network analysis. Identifying social positions can be difficult when the target organization lacks a formal structure or is partially hidden. One approach is to compute a suitable equivalence relation on the nodes of the target network. Several different equivalence relations can be used, all depending on what kind of social positions that are of interest. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simulation relation. The simulation relation creates a partial order on the set of actors in a network and we can use this order to identify actors that have characteristic properties. The simulation relation can also be used to compute simulation equivalence which is a related but less restrictive equivalence relation than regular equivalence that is still computable in polynomial time. We tentatively term the equivalence classes determined by simulation equivalence social positions. Which equivalence relation that is interesting to consider depends on the problem at hand. We argue that it is necessary to consider several different equivalence relations for a given network, in order to understand it completely. This paper primarily considers weighted directed networks and we present definitions of both weighted simulation equivalence and weighted regular equivalence. Weighted networks can be used to model a number of network domains, including information flow, trust propagation, and communication channels. Many of these domains have applications within homeland security and in the military, where one wants to survey and elicit key roles within an organization. After social positions have been calculated, they can be used to produce abstractions of the network—smaller versions that retain some of the most important characteristics.
  •  
11.
  • Brynolfsson, Joel, et al. (author)
  • Abstraction techniques for social networks
  • 2010
  • In: Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining. - : IEEE. - 9780769541389
  • Conference paper (peer-reviewed)
  •  
12.
  • Dahlin, Johan, et al. (author)
  • Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards
  • 2012
  • In: Advances in Social Networks Analysis and Mining (ASONAM), 2012. - : IEEE. - 9781467324977 - 9780769547992 ; , s. 850-857
  • Conference paper (peer-reviewed)abstract
    • Many extremist groups and terrorists use the Web for various purposes such as exchanging and reinforcing their beliefs, making monitoring and analysis of discussion boards an important task for intelligence analysts in order to detect individuals that might pose a threat towards society. In this work we focus on how to automatically analyze discussion boards in an effective manner. More specifically, we propose a method for fusing several alias (entity) matching techniques, that can be used to identify authors with multiple aliases. This is one part of a larger system, where the aim is to provide the analyst with a list of potential extremist worth investigating further.
  •  
13.
  • Holmberg, Martin, et al. (author)
  • Information Fusion for Collaborating Commanders at Different Levels
  • 2011
  • In: 16th International Command and Control Research and Technology Symposium, Quebec City, Canada, June 21-23, 2011..
  • Conference paper (peer-reviewed)abstract
    • This is a position paper discussing the authors’ views on the role of automated information fusion in the interaction between different command levels. The purpose of the paper is to initiate a discussion on the relationship between automated fusion and the flexibility in a mission. The sharing of data/information/knowledge between commanders at different levels is a difficult task in many respects. We focus on the role of automated information fusion techniques in this frame. The paper asks two major questions: (1) Does automated fusion generate the unwanted side-effect of less flexibility? (2) How should a situational picture be represented at different command levels to promote cooperation? We also discuss some disadvantages of using traditional information fusion methods developed to handle either high or low level information. The conclusion is that information fusion techniques have to be chosen with care when making information systems that should be jointly used by commanders at different levels.
  •  
14.
  • Holmberg, Martin, 1969-, et al. (author)
  • Lessons identified from the use of automated information fusion in collaborative environments
  • 2012
  • In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA). - 9781467303439 ; , s. 202-205
  • Conference paper (peer-reviewed)abstract
    • We present some lessons identified from FOI experiments on combining sensor data fusion and information fusion. Some ideas for future work are also presented.
  •  
15.
  • Laxhammar, Rikard (author)
  • Conformal anomaly detection : Detecting abnormal trajectories in surveillance applications
  • 2014
  • Doctoral thesis (other academic/artistic)abstract
    • Human operators of modern surveillance systems are confronted with an increasing amount of trajectory data from moving objects, such as people, vehicles, vessels, and aircraft. A large majority of these trajectories reflect routine traffic and are uninteresting. Nevertheless, some objects are engaged in dangerous, illegal or otherwise interesting activities, which may manifest themselves as unusual and abnormal trajectories. These anomalous trajectories can be difficult to detect by human operators due to cognitive limitations.In this thesis, we study algorithms for the automated detection of anomalous trajectories in surveillance applications. The main results and contributions of the thesis are two-fold. Firstly, we propose and discuss a novel approach for anomaly detection, called conformal anomaly detection, which is based on conformal prediction (Vovk et al.). In particular, we propose two general algorithms for anomaly detection: the conformal anomaly detector (CAD) and the computationally more efficient inductive conformal anomaly detector (ICAD). A key property of conformal anomaly detection, in contrast to previous methods, is that it provides a well-founded approach for the tuning of the anomaly threshold that can be directly related to the expected or desired alarm rate. Secondly, we propose and analyse two parameter-light algorithms for unsupervised online learning and sequential detection of anomalous trajectories based on CAD and ICAD: the sequential Hausdorff nearest neighbours conformal anomaly detector (SHNN-CAD) and the sequential sub-trajectory local outlier inductive conformal anomaly detector (SSTLO-ICAD), which is more sensitive to local anomalous sub-trajectories.We implement the proposed algorithms and investigate their classification performance on a number of real and synthetic datasets from the video and maritime surveillance domains. The results show that SHNN-CAD achieves competitive classification performance with minimum parameter tuning on video trajectories. Moreover, we demonstrate that SSTLO-ICAD is able to accurately discriminate realistic anomalous vessel trajectories from normal background traffic.
  •  
16.
  • Pettersson, Marjorie, et al. (author)
  • Towards a Risk Analysis Method for Systems of Systems : A Case Study on Wildfire Rescue Operations
  • 2023
  • In: Proc. Int. ISCRAM Conf.. - : Information Systems for Crisis Response and Management, ISCRAM. - 9798218217495 ; , s. 530-545, s. 530-545
  • Conference paper (peer-reviewed)abstract
    • Crisis management (CM) is facing new challenges due to the increasing complexity of contemporary society. To mitigate a crisis, it is often necessary for a collection of independent systems, people, and organizations to cooperate. These collaborating entities constitute an interconnected socio-technical system of systems (SoS). An important question is how a CM SoS should be constructed to minimize the risk of failure and accurately handle a crisis. SoS pose new challenges in analysing risk during interactions. This paper investigates whether the risk analysis method STAMP (System-Theoretic Accident Model and Processes) is suitable for SoS, using a forest fire rescue operation case study. Results show characteristics of various risk sources and identify some SoS characteristics, such as dynamic structure and latent risks, that are not sufficiently handled in STAMP. The study further contributes to the body of knowledge by presenting potential directions for research on SoS risk assessment methods.
  •  
17.
  •  
18.
  • Sidenbladh, Hedvig, et al. (author)
  • Comparing future situation pictures
  • 2005
  • In: 2005 7th International Conference on Information Fusion (FUSION), Vols 1 and 2. ; , s. 963-968
  • Conference paper (peer-reviewed)
  •  
19.
  •  
20.
  • Svenson, Pontus, et al. (author)
  • A design method for collaborative systems of systems applied to Metropolitan Multi-Mode Transport System
  • 2021
  • In: 2021 16th International Conference of System of Systems Engineering (SoSE). - 9781665444545 ; , s. 13-18
  • Conference paper (peer-reviewed)abstract
    • Systems of systems arise when independently owned, operated and developed systems can achieve mutual benefits by working together. In collaborative systems of systems, there is no directing entity that instructs others how and when to collaborate. Instead, the collaboration relies on independent decisions by the constituent systems to form collaborating constellations, and the benefits are emergent properties of this. In this paper, we describe a design method for engineering collaborative systems of systems. We apply the method to the design of a collaborative system of systems for mobility in a rural setting close to an urban area and to truck platooning.
  •  
21.
  • Svenson, Pontus, et al. (author)
  • Constituent Systems Quality Requirements Engineering in Co-opetitive Systems of Systems
  • 2022
  • In: 2022 17th Annual System of Systems Engineering Conference, SOSE 2022. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665496230 ; , s. 347-352
  • Conference paper (peer-reviewed)abstract
    • Systems of systems consist of independently owned, operated, and developed constituent systems that work together for mutual benefit. Co-opetitive systems of systems consist of constituent systems that in addition also compete. In this paper, we focus on quality requirement engineering for a constituent systems developer in such SoS. We discuss the needs and requirements of a structured quality requirements engineering process, with examples taken from the transportation domain, and find that there is a need for mediators and agreements between constituent systems developers to enable quality data exchange. 
  •  
22.
  •  
23.
  • Svenson, Pontus, et al. (author)
  • Initiation and Formation of Constellations in Systems of Systems
  • 2022
  • In: 2022 17th Annual System of Systems Engineering Conference, SOSE 2022. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665496230 ; , s. 340-345
  • Conference paper (peer-reviewed)abstract
    • Systems of systems engineering is aimed at developing solutions that provide the capability to fulfil a need that cannot be met by an integrated system. In many SoS, there is a need to solve several tasks at the same time. Each set of constituent systems that collaborate to solve such a task is a constellation. In this paper, we discuss the process of forming such constellations. We focus on collaborative systems of systems and describe conceptual models for the formation of constellations. 
  •  
24.
  •  
25.
  • Svenson, Pontus, et al. (author)
  • Resilience in systems of systems : electrified transport systems
  • 2021
  • In: 2021 16th International Conference of System of Systems Engineering (SoSE). ; , s. 162-167
  • Conference paper (peer-reviewed)abstract
    • The transport system is a large system of systems which currently faces challenges because of the climate-change-induced need to decrease the use of fossil fuels. The aim of mitigating climate change is realized in many parts of the transport system, concurrently and at high pace, which brings with it many challenges for the resilience of the system. By resilience, we mean the ability of a system to adapt due to disruptions and surprises. There are numerous links between the different systems that form the transport system and the actors responsible for available choices in the system of systems need to be identified. The aim of this paper is to identify requirements for developing a method for increasing resilience in the transport system. In this study a description of the electrified goods transport system as a system of systems is developed through a combination of researchers from different areas and discussions with experts mainly in the field of transport and governance. The resulting system of systems is presented in the paper together with a list of measures that will aid the development of a resilient electrified goods transport system. The measures are divided into technology, organisation and behaviour.
  •  
26.
  • Svenson, Pontus, et al. (author)
  • Should I Stay or Should I Go? : How Constituent Systems Decide to Join or Leave Constellations in Collaborative SoS
  • 2021
  • In: 2021 16th International Conference of System of Systems Engineering (SoSE). - 9781665444545 ; , s. 179-184
  • Conference paper (peer-reviewed)abstract
    • A collaborative system of systems (SoS) is formed when independent organizations decide to cooperate to achieve mutual benefits, while retaining independence of their respective systems. Each constituent system (CS) of the SoS has a set of capabilities, some of which they agree to potentially use in active collaboration with others. Such an active collaboration is called a constellation and can be seen as an instantiation of the SoS which is created to provide a joint capability. Constellations are thus the working-horses of the SoS, but due to the operational independence of the CS, they have a choice whether to join a certain constellation or not. This paper discusses the reasoning and world model that is necessary for a CS to make well-informed decisions to join and leave constellations. We argue that it is necessary for the CS to understand not only the surrounding environment, but also to have models of other CS’ world models as well as of their probable future actions. It must be possible to predict whether other participants will uphold their parts of the collaboration or may defect from it to join another more rewarding constellation despite the agreements made when joining the SoS. The reasoning in the paper is illustrated using examples from two different collaborative SoS in the transportation domain.
  •  
27.
  • Svenson, Pontus, et al. (author)
  • Situation Awareness and Decision Making for Constituent Systems
  • 2020
  • In: 2020 IEEE 15th International Conference of System of Systems Engineering (SoSE). - 9781728180502 ; , s. 361-366
  • Conference paper (peer-reviewed)abstract
    • The constituent systems (CS) that together form a system of systems (SoS) have a continuous need to assess situations and make decisions. In addition to operating in the environment, they also need to decide upon their status in the system of systems and be aware of their relations to constellations in the system of systems. To be able to make the best possible decisions, the constituent systems need to have an accurate situation awareness, i. e., an understanding of the environment they are in, what other elements are present therein and how this will develop in the future. In this paper we present an analysis of the situation awareness needs of a constituent system in different stages of its life-cycle: ignorant of the SoS; prepared forjoining the SoS; a passive CS; an active CS. A conclusion is that CS need to have world models that include information about other objects. Examples from the truck platooning application are given.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-27 of 27
Type of publication
conference paper (22)
journal article (2)
reports (1)
doctoral thesis (1)
licentiate thesis (1)
Type of content
peer-reviewed (24)
other academic/artistic (3)
Author/Editor
Svenson, Pontus (25)
Axelsson, Jakob (8)
Kaati, Lisa (6)
Schubert, Johan (5)
Mårtenson, Christian (5)
Sidenbladh, Hedvig (5)
show more...
Walter, Johan (3)
Brynielsson, Joel (3)
Ahlberg, Simon (2)
Martenson, Christian (2)
Svensson, Per (2)
Brynielsson, Joel, 1 ... (2)
Horndahl, Andreas (2)
Olsson, Thomas (1)
Johansson, Fredrik (1)
Högberg, Johanna (1)
Eriksson, Kerstin (1)
Nilsson, Maria (1)
van Laere, Joeri (1)
Horling, Pontus (1)
Johansson, Katarina (1)
Jored, Karsten (1)
Kjellström, Hedvig (1)
Neider, Gbran (1)
Hörling, Pontus (1)
Jöred, Karsten (1)
Lindström, Björn (1)
Neider, Göran (1)
Unden, Katarina (1)
Holmberg, Martin (1)
Gustavsson, Per M. (1)
Andler, Sten F. (1)
Dahlin, Johan (1)
Fredin, Mikael (1)
Reichenberg, Frida (1)
Janhäll, Sara, 1965- (1)
Bergh, Torsten (1)
Johansson, Alexander (1)
Mårdberg, Björn (1)
Åkesson, Viktor (1)
Kaati, Lisa, 1975- (1)
Högberg, Johanna, 19 ... (1)
Laxhammar, Rikard (1)
Horndahl, Andreas, 1 ... (1)
Johansson, Fredrik, ... (1)
Mårtenson, Christian ... (1)
Svenson, Pontus, 197 ... (1)
Brynolfsson, Joel (1)
Mårtensson, Christia ... (1)
Falkman, Göran, Dr. (1)
show less...
University
Royal Institute of Technology (11)
RISE (9)
Mälardalen University (7)
Umeå University (2)
University of Skövde (2)
Swedish National Defence College (2)
show more...
Linköping University (1)
Chalmers University of Technology (1)
show less...
Language
English (27)
Research subject (UKÄ/SCB)
Engineering and Technology (10)
Natural sciences (9)
Social Sciences (5)
Medical and Health Sciences (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view