SwePub
Sök i SwePub databas

  Extended search

Boolean operators must be entered wtih CAPITAL LETTERS

Träfflista för sökning "AMNE:(NATURAL SCIENCES Computer and Information Sciences Information Systems) "

Search: AMNE:(NATURAL SCIENCES Computer and Information Sciences Information Systems)

  • Result 1-50 of 18211
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Nilsson, R. Henrik, 1976, et al. (author)
  • Mycobiome diversity: high-throughput sequencing and identification of fungi.
  • 2019
  • In: Nature reviews. Microbiology. - : Springer Science and Business Media LLC. - 1740-1534 .- 1740-1526. ; 17, s. 95-109
  • Research review (peer-reviewed)abstract
    • Fungi are major ecological players in both terrestrial and aquatic environments by cycling organic matter and channelling nutrients across trophic levels. High-throughput sequencing (HTS) studies of fungal communities are redrawing the map of the fungal kingdom by hinting at its enormous - and largely uncharted - taxonomic and functional diversity. However, HTS approaches come with a range of pitfalls and potential biases, cautioning against unwary application and interpretation of HTS technologies and results. In this Review, we provide an overview and practical recommendations for aspects of HTS studies ranging from sampling and laboratory practices to data processing and analysis. We also discuss upcoming trends and techniques in the field and summarize recent and noteworthy results from HTS studies targeting fungal communities and guilds. Our Review highlights the need for reproducibility and public data availability in the study of fungal communities. If the associated challenges and conceptual barriers are overcome, HTS offers immense possibilities in mycology and elsewhere.
  •  
3.
  • Rexhepi, Hanife, 1984-, et al. (author)
  • Cancer patients’ information seeking behavior related to online electronic healthcare records
  • 2021
  • In: Health Informatics Journal. - : Sage Publications. - 1460-4582 .- 1741-2811. ; 27:3, s. 1-12
  • Journal article (peer-reviewed)abstract
    • Patients’ online access to their EHR together with the rapid proliferation of medical information on the Internet has changed how patients use information to learn about their health. Patients’ tendency to turn to the Internet to find information about their health and care is well-documented. However, little is known about patients’ information seeking behavior when using online EHRs. By using information horizons as an analytical tool this paper aims to investigate the information behavior of cancer patients who have chosen to view their EHRs (readers) and to those who have not made that option (non-readers). Thirty interviews were conducted with patients. Based on information horizons, it seems that non-reading is associated with living in a narrower information world in comparison to readers. The findings do not suggest that the smallness would be a result of active avoidance of information, or that it would be counterproductive for the patients. The findings suggest, however, that EHRs would benefit from comprehensive linking to authoritative health information sources to help users to understand their contents. In parallel, healthcare professionals should be more aware of their personal role as a key source of health information to those who choose not to read their EHRs. 
  •  
4.
  • Dodig-Crnkovic, Gordana, 1955 (author)
  • Cognitive Architectures Based on Natural Info-Computation
  • 2022
  • In: Studies in Applied Philosophy, Epistemology and Rational Ethics. - Cham : Springer. - 2192-6255 .- 2192-6263. ; , s. 3-13, s. 3-13
  • Book chapter (peer-reviewed)abstract
    • At the time when the first models of cognitive architectures have been proposed, some forty years ago, understanding of cognition, embodiment and evolution was substantially different from today’s. So was the state of the art of information physics, information chemistry, bioinformatics, neuroinformatics, computational neuroscience, complexity theory, self-organization, theory of evolution, as well as the basic concepts of information and computation. Novel developments support a constructive interdisciplinary framework for cognitive architectures based on natural morphological computing, where interactions between constituents at different levels of organization of matter-energy and their corresponding time-dependent dynamics, lead to complexification of agency and increased cognitive capacities of living organisms that unfold through evolution. Proposed info-computational framework for naturalizing cognition considers present updates (generalizations) of the concepts of information, computation, cognition, and evolution in order to attain an alignment with the current state of the art in corresponding research fields. Some important open questions are suggested for future research with implications for further development of cognitive and intelligent technologies.
  •  
5.
  • Sanli, Kemal, et al. (author)
  • Metagenomic Sequencing of Marine Periphyton: Taxonomic and Functional Insights into Biofilm Communities
  • 2015
  • In: Frontiers in Microbiology. - : Frontiers Media SA. - 1664-302X. ; 6:1192
  • Journal article (peer-reviewed)abstract
    • Periphyton communities are complex phototrophic, multispecies biofilms that develop on surfaces in aquatic environments. These communities harbor a large diversity of organisms comprising viruses, bacteria, algae, fungi, protozoans and metazoans. However, thus far the total biodiversity of periphyton has not been described. In this study, we use metagenomics to characterize periphyton communities from the marine environment of the Swedish west coast. Although we found approximately ten times more eukaryotic rRNA marker gene sequences compared to prokaryotic, the whole metagenome-based similarity searches showed that bacteria constitute the most abundant phyla in these biofilms. We show that marine periphyton encompass a range of heterotrophic and phototrophic organisms. Heterotrophic bacteria, including the majority of proteobacterial clades and Bacteroidetes, and eukaryotic macro-invertebrates were found to dominate periphyton. The phototrophic groups comprise Cyanobacteria and the alpha-proteobacterial genus Roseobacter, followed by different micro- and macro-algae. We also assess the metabolic pathways that predispose these communities to an attached lifestyle. Functional indicators of the biofilm form of life in periphyton involve genes coding for enzymes that catalyze the production and degradation of extracellular polymeric substances, mainly in the form of complex sugars such as starch and glycogen-like meshes together with chitin. Genes for 278 different transporter proteins were detected in the metagenome, constituting the most abundant protein complexes. Finally, genes encoding enzymes that participate in anaerobic pathways, such as denitrification and methanogenesis, were detected suggesting the presence of anaerobic or low-oxygen micro-zones within the biofilms.
  •  
6.
  • Laaksoharju, Mikael, 1977-, et al. (author)
  • Can micro world simulations assess and stimulate ethical competence?
  • 2008
  • In: Proceedings of the Tenth International Conference ETHICOMP 2008. - Mantua, Italy : University of Pavia. - 9788890286995 ; , s. 503-510
  • Conference paper (peer-reviewed)abstract
    • Micro worlds can be constructed to assess and promote the ethical competence of users. However, the theoretical basis has to be on psychological problem solving and decision making processes. In this paper we discuss the conditions necessary for a micro world as a method to measure and train ethical competence. Two things in particular are interesting to investigate: 1) To determine which parameters to measure, that indicate autonomous decision making, and 2) to establish a model for interpreting the proceedings and the subject’s interaction with the simulation as a representation of the psychological problem solving and decision making process.
  •  
7.
  • Liu, Yuanhua, 1971, et al. (author)
  • Considering the importance of user profiles in interface design
  • 2009
  • In: User Interfaces. ; , s. 23-
  • Book chapter (other academic/artistic)abstract
    • User profile is a popular term widely employed during product design processes by industrial companies. Such a profile is normally intended to represent real users of a product. The ultimate purpose of a user profile is actually to help designers to recognize or learn about the real user by presenting them with a description of a real user’s attributes, for instance; the user’s gender, age, educational level, attitude, technical needs and skill level. The aim of this chapter is to provide information on the current knowledge and research about user profile issues, as well as to emphasize the importance of considering these issues in interface design. In this chapter, we mainly focus on how users’ difference in expertise affects their performance or activity in various interaction contexts. Considering the complex interaction situations in practice, novice and expert users’ interactions with medical user interfaces of different technical complexity will be analyzed as examples: one focuses on novice and expert users’ difference when interacting with simple medical interfaces, and the other focuses on differences when interacting with complex medical interfaces. Four issues will be analyzed and discussed: (1) how novice and expert users differ in terms of performance during the interaction; (2) how novice and expert users differ in the perspective of cognitive mental models during the interaction; (3) how novice and expert users should be defined in practice; and (4) what are the main differences between novice and expert users’ implications for interface design. Besides describing the effect of users’ expertise difference during the interface design process, we will also pinpoint some potential problems for the research on interface design, as well as some future challenges that academic researchers and industrial engineers should face in practice.
  •  
8.
  • Petersson, Jesper, 1974, et al. (author)
  • Off the record: The invisibility work of doctors in a patient-accessible electronic health record information service.
  • 2021
  • In: Sociology of health & illness. - : Wiley. - 1467-9566 .- 0141-9889. ; 43:5, s. 1270-1285
  • Journal article (peer-reviewed)abstract
    • In this article, we draw on Michael Lipsky's work on street-level bureaucrats and discretion to analyse a real case setting comprising an interview study of 30 Swedish doctors regarding their experiences of changes in clinical work following patients being given access to medical records information online. We introduce the notion of invisibility work to capture how doctors exercise discretion to preserve the invisibility of their work, in contrast to the well-established notion of invisible work, which denotes work made invisible by parties other than those performing it. We discuss three main forms of invisibility work in relation to records: omitting information, cryptic writing and parallel note writing. We argue that invisibility work is a way for doctors to resolve professional tensions arising from the political decision to provide patients with online access to record information. Although invisibility work is understood by doctors as a solution to government-initiated visibility, we highlight how it can create difficulties for doctors concerning accountability towards patients, peers and authorities.
  •  
9.
  • Dodig-Crnkovic, Gordana, 1955 (author)
  • Natural Morphological Computation as Foundation of Learning to Learn in Humans, Other Living Organisms, and Intelligent Machines
  • 2020
  • In: Philosophies. - Basel, Switzerland : MDPI AG. - 2409-9287. ; 5:3
  • Journal article (peer-reviewed)abstract
    • The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial (deep learning, robotics), natural sciences (neuroscience, cognitive science, biology), and philosophy (philosophy of computing, philosophy of mind, natural philosophy). The question is, what at this stage of the development the inspiration from nature, specifically its computational models such as info-computation through morphological computing, can contribute to machine learning and artificial intelligence, and how much on the other hand models and experiments in machine learning and robotics can motivate, justify, and inform research in computational cognitive science, neurosciences, and computing nature. We propose that one contribution can be understanding of the mechanisms of 'learning to learn', as a step towards deep learning with symbolic layer of computation/information processing in a framework linking connectionism with symbolism. As all natural systems possessing intelligence are cognitive systems, we describe the evolutionary arguments for the necessity of learning to learn for a system to reach human-level intelligence through evolution and development. The paper thus presents a contribution to the epistemology of the contemporary philosophy of nature.
  •  
10.
  • Abarenkov, Kessy, et al. (author)
  • Annotating public fungal ITS sequences from the built environment according to the MIxS-Built Environment standard – a report from a May 23-24, 2016 workshop (Gothenburg, Sweden)
  • 2016
  • In: MycoKeys. - : Pensoft Publishers. - 1314-4057 .- 1314-4049. ; 16, s. 1-15
  • Journal article (peer-reviewed)abstract
    • Recent molecular studies have identified substantial fungal diversity in indoor environments. Fungi and fungal particles have been linked to a range of potentially unwanted effects in the built environment, including asthma, decay of building materials, and food spoilage. The study of the built mycobiome is hampered by a number of constraints, one of which is the poor state of the metadata annotation of fungal DNA sequences from the built environment in public databases. In order to enable precise interrogation of such data – for example, “retrieve all fungal sequences recovered from bathrooms” – a workshop was organized at the University of Gothenburg (May 23-24, 2016) to annotate public fungal barcode (ITS) sequences according to the MIxS-Built Environment annotation standard (http://gensc.org/mixs/). The 36 participants assembled a total of 45,488 data points from the published literature, including the addition of 8,430 instances of countries of collection from a total of 83 countries, 5,801 instances of building types, and 3,876 instances of surface-air contaminants. The results were implemented in the UNITE database for molecular identification of fungi (http://unite.ut.ee) and were shared with other online resources. Data obtained from human/animal pathogenic fungi will furthermore be verified on culture based metadata for subsequent inclusion in the ISHAM-ITS database (http://its.mycologylab.org).
  •  
11.
  • Wilhelmsson, Kenneth, 1976 (author)
  • Autentiska och artificiella frågor till svensk text Automatisk frågegenerering jämfört med användares frågor för informationsåtkomst : Authentic and artificial questions to Swedish text Automatically generated questions versus user-generated questions for information access
  • 2015
  • Other publication (other academic/artistic)abstract
    • Informationssökning mot ostrukturerade datakällor som fri text är ett av de områden där användargränssnitt med fri formulering i naturligt språk har tagits fram. I ett sådant, eventuellt AI-betonat, system kan några grundläggande svårigheter från användarperspektivet märkas. En sådan svårighet är att en användare inte känner till huruvida en fråga som hon avser att ställa egentligen kan besvaras av den aktuella texten. Denna svårighet, tillsammans med andra, som de kraftiga variationsmöjligheterna för formen för ett giltigt svar på en ställd fråga, riskerar att leda till att användarintrycken av systemtypen blir negativa. De moment som behöver ingå i ett sådant frågebaserat informationssystems funktionssätt måste på något sätt inbegripa en mappning av frågeled i frågan (t.ex. när) till den form och grammatisk funktion som svaret i texten måste ha (för frågan när normalt ett tidsadverbial). Bland annat denna iakttagelse inbjuder till användning av automatisk frågegenerering (question generation, QG). Frågegenerering innebär att frågor som en naturlig text besvarar initialt utvinns av ett program som samlar in dem i explicit form. Tanken för användning i informationssökning är att en användare i gränssnittet enbart ska kunna ställa just dessa frågor, vilka faktiskt besvaras av texten. Denna studie gäller just de frågor som ett automatiskt frågegenereringssystem för svenska kan, och genom vidare utveckling, skulle kunna generera för godtycklig digital svensk text. Även om mängden automatiskt genererade frågor och frågeformuleringar kan bli mycket stor, utrymmesmässigt många gånger större än ursprungstexten, så är det tydligt att den beskrivna metoden för frågegenerering för svenska inte kan och troligen inte heller kommer att kunna förmås att skapa alla de frågor och frågeformuleringar som en vanlig användare skulle anse att en viss text besvarar. Men hur väl fungerar då automatiskt genererade frågor i detta sammanhang? Denna uppsats kretsar kring en användarundersökning där undersökningsdeltagare har ombetts att formulera frågor som texter besvarar, och som anses vara relevanta frågor. Den resulterande samlingen frågor undersöktes och kategoriserades. Resultatet av undersökningens huvudfråga visar att bara 20-25 % av användarnas frågeformuleringar skulle kunna genereras direkt automatiskt med aktuell ansats – utan vissa informationstekniska förbättringar. Uppsatsen föreslår viss ny terminologi för detta outforskade område, bl.a. för att skilja mellan de olika grader av processkrav som generering av olika frågeslag från text kräver.
  •  
12.
  • Wilhelmsson, Kenneth, 1976 (author)
  • Huvudansatser för parsningsmetoder. Om programutvecklingens förutsättningar i en svensk kontext
  • 2016
  • Reports (other academic/artistic)abstract
    • Syftet med denna text var att ge en inblick i området (syntaktisk) parsning. Tanken var att ge en bild av utvecklingen som var 1) fri från alltför tekniska detaljer, då området är programmeringstekniskt, och 2) beskriven ur ett svenskt perspektiv. Bakgrunden till valet av ämne till texten, som var tänkt att finnas med i antologin Text och kontext, var att parsning är relativt okänt för många personer verksamma inom närliggande områden, samtidigt som det är ett absolut nyckelbegrepp för den som ägnar sig åt datorlingvistik eller språkteknologi. Målet var alltså att ge en ganska allmän utifrånblick på några centrala sidor av utvecklingen, samtidigt som det tydligt är så att den som själv arbetat med utveckling kan ha starka åsikter och preferenser rörande metodval, något som i ärlighetens namn kanske inte heller denna text är lösgjord från. Hur ska det göras? Konsten att utveckla automatisk syntaxanalys av naturlig text kan läras ut från ett flertal perspektiv. Det kan t.ex. ske med fokus på användandet av en viss grammatikformalism, med fokus på beräkningssnabbhet, med fokus på entydiggörande av möjliga ambiguiteter. Tolkningsval kan göras med hjälp av antingen handskrivna regler eller inhämtad statistik. En sorts huvudtema i denna text är hur metoder för parsning på senare år uppvisar förändringar som kanske kan förklaras med att programmen har fått andra användningsområden och att metoderna har anpassats därefter (en annan tolkning är att flera senare system inte längre gör parsning i strikt mening). När detta tänkta ”kapitel” var färdigt fick det kommentaren att det inte var anpassat för antologins målgrupp. Det fick skrivas en annan kapiteltext, men det kom samtidigt ett förslag att publicera texten om parsning här som denna rapport.
  •  
13.
  • Chatterjee, Bapi, 1982 (author)
  • Lock-free Concurrent Search
  • 2017
  • Doctoral thesis (other academic/artistic)abstract
    • The contemporary computers typically consist of multiple computing cores with high compute power. Such computers make excellent concurrent asynchronous shared memory system. On the other hand, though many celebrated books on data structure and algorithm provide a comprehensive study of sequential search data structures, unfortunately, we do not have such a luxury if concurrency comes in the setting. The present dissertation aims to address this paucity. We describe novel lock-free algorithms for concurrent data structures that target a variety of search problems. (i) Point search (membership query, predecessor query, nearest neighbour query) for 1-dimensional data: Lock-free linked-list; lock-free internal and external binary search trees (BST). (ii) Range search for 1-dimensional data: A range search method for lock-free ordered set data structures - linked-list, skip-list and BST. (iii) Point search for multi-dimensional data: Lock-free kD-tree, specially, a generic method for nearest neighbour search. We prove that the presented algorithms are linearizable i.e. the concurrent data structure operations intuitively display their sequential behaviour to an observer of the concurrent system. The lock-freedom in the introduced algorithms guarantee overall progress in an asynchronous shared memory system. We present the amortized analysis of lock-free data structures to show their efficiency. Moreover, we provide sample implementations of the algorithms and test them over extensive micro-benchmarks. Our experiments demonstrate that the implementations are scalable and perform well when compared to related existing alternative implementations on common multi-core computers. Our focus is on propounding the generic methodologies for efficient lock-free concurrent search. In this direction, we present the notion of help-optimality, which captures the optimization of amortized step complexity of the operations. In addition to that, we explore the language-portable design of lock-free data structures that aims to simplify an implementation from programmer’s point of view. Finally, our techniques to implement lock-free linearizable range search and nearest neighbour search are independent of the underlying data structures and thus are adaptive to similar data structures.
  •  
14.
  • Grünloh, Christiane, 1980-, et al. (author)
  • "why do they need to check me?" patient participation through ehealth and the doctor-patient relationship : Qualitative study
  • 2018
  • In: Journal of Medical Internet Research. - : J M I R Publications, Inc.. - 1438-8871. ; 20:1
  • Journal article (peer-reviewed)abstract
    • Background: Roles in the doctor-patient relationship are changing and patient participation in health care is increasingly emphasized. Electronic health (eHealth) services such as patient accessible electronic health records (PAEHRs) have been implemented to support patient participation. Little is known about practical use of PAEHR and its effect on roles of doctors and patients. Objective: This qualitative study aimed to investigate how physicians view the idea of patient participation, in particular in relation to the PAEHR system. Hereby, the paper aims to contribute to a deeper understanding of physicians' constructions of PAEHR, roles in the doctor-patient relationship, and levels and limits of involvement. Methods: A total of 12 semistructured interviews were conducted with physicians in different fields. Interviews were transcribed, translated, and a theoretically informed thematic analysis was performed. Results: Two important aspects were identified that are related to the doctor-patient relationship: roles and involvement. The physicians viewed their role as being the ones to take on the responsibility, determining treatment options, and to be someone who should be trusted. In relation to the patient's role, lack of skills (technical or regarding medical jargon), motives to read, and patients' characteristics were aspects identified in the interviews. Patients were often referred to as static entities disregarding their potential to develop skills and knowledge over time. Involvement captures aspects that support or hinder patients to take an active role in their care. Conclusions: Literature of at least two decades suggests an overall agreement that the paternalistic approach in health care is inappropriate, and a collaborative process with patients should be adopted. Although the physicians in this study stated that they, in principle, were in favor of patient participation, the analysis found little support in their descriptions of their daily practice that participation is actualized. As seen from the results, paternalistic practices are still present, even if professionals might not be aware of this. This can create a conflict between patients who strive to become more informed and their questions being interpreted as signs of critique and mistrust toward the physician. We thus believe that the full potential of PAEHRs is not reached yet and argue that the concept of patient empowerment is problematic as it triggers an interpretation of "power" in health care as a zero-sum, which is not helpful for the maintenance of the relationship between the actors. Patient involvement is often discussed merely in relation to decision making; however, this study emphasizes the need to include also sensemaking and learning activities. This would provide an alternative understanding of patients asking questions, not in terms of "monitoring the doctor" but to make sense of the situation.
  •  
15.
  • Kavathatzopoulos, Iordanis (author)
  • Information Technology as a tool for democratic skills
  • 2007
  • In: Forms of democracy in education. - 9789607860750 ; , s. 155-162
  • Conference paper (peer-reviewed)abstract
    • Democracy does not depend only on political conditions and processes in society. Psychological conditions and processes of participating persons or citizens are also important. Dialog, for example, is necessary for democracy. But dialog does not occur among people who are absolutely convinced about the truth of their ideas. A personal critical attitude toward own beliefs is a necessary precondition for dialog and democracy. How can IT train for self-criticism, systematic searching and critical thinking? This paper presents two IT-tools, a micro-world simulation of society and a decision support system, which can be used to stimulate autonomous thinking. Autonomous thinking is unconstraint, self-critical, systematic and holistic problem solving and decision making. Both these tools can be used in distance education for democracy using the Internet.
  •  
16.
  •  
17.
  • Pacaci, Görkem, 1986-, et al. (author)
  • Colour Beads Visual Representation of Compositional Relational Programs
  • 2013
  • In: Proceedings of 2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). - : IEEE conference proceedings. - 9781479903696 ; , s. 131-134
  • Conference paper (peer-reviewed)abstract
    • Building on a compositional relational programming language Combilog, code visualization with a motivation of flexible practical applications is explored. Following from earlier work based on Higraph diagram formalizations, a new coloured and human perception-centric iteration of visual representation is introduced, and its effects on understanding compositional relational programs are analysed by means of a user study. Results showed that visuals helped participants to solve coderelated questions 46% faster with 69% less errors.
  •  
18.
  • Homem, Irvin, 1985- (author)
  • Advancing Automation in Digital Forensic Investigations
  • 2018
  • Doctoral thesis (other academic/artistic)abstract
    • Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. Industry standard tools are evidence-centric, automate only a few precursory tasks (E.g. Parsing and Indexing) and have limited capabilities of integration from multiple evidence sources. Furthermore, these tools are always human-driven.These challenges are exacerbated in the increasingly computerized and highly networked environment of today. Volumes of digital evidence to be collected and analyzed have increased, and so has the diversity of digital evidence sources involved in a typical case. This further handicaps digital forensics practitioners, labs and law enforcement agencies, causing delays in investigations and legal systems due to backlogs of cases. Improved efficiency of the digital investigation process is needed, in terms of increasing the speed and reducing the human effort expended. This study aims at achieving this time and effort reduction, by advancing automation within the digital forensic investigation process.Using a Design Science research approach, artifacts are designed and developed to address these practical problems. Summarily, the requirements, and architecture of a system for automating digital investigations in highly networked environments are designed. The architecture initially focuses on automation of the identification and acquisition of digital evidence, while later versions focus on full automation and self-organization of devices for all phases of the digital investigation process. Part of the remote evidence acquisition capability of this system architecture is implemented as a proof of concept. The speed and reliability of capturing digital evidence from remote mobile devices over a client-server paradigm is evaluated. A method for the uniform representation and integration of multiple diverse evidence sources for enabling automated correlation, simple reasoning and querying is developed and tested. This method is aimed at automating the analysis phase of digital investigations. Machine Learning (ML)-based triage methods are developed and tested to evaluate the feasibility and performance of using such techniques to automate the identification of priority digital evidence fragments. Models from these ML methods are evaluated in identifying network protocols within DNS tunneled network traffic. A large dataset is also created for future research in ML-based triage for identifying suspicious processes for memory forensics.From an ex ante evaluation, the designed system architecture enables individual devices to participate in the entire digital investigation process, contributing their processing power towards alleviating the burden on the human analyst. Experiments show that remote evidence acquisition of mobile devices over networks is feasible, however a single-TCP-connection paradigm scales poorly. A proof of concept experiment demonstrates the viability of the automated integration, correlation and reasoning over multiple diverse evidence sources using semantic web technologies. Experimentation also shows that ML-based triage methods can enable prioritization of certain digital evidence sources, for acquisition or analysis, with up to 95% accuracy.The artifacts developed in this study provide concrete ways to enhance automation in the digital forensic investigation process to increase the investigation speed and reduce the amount of costly human intervention needed. 
  •  
19.
  •  
20.
  • David, I., et al. (author)
  • Blended modeling in commercial and open-source model-driven software engineering tools: A systematic study
  • 2023
  • In: Software and Systems Modeling. - : Springer Science and Business Media LLC. - 1619-1366 .- 1619-1374. ; 22, s. 415-447
  • Journal article (peer-reviewed)abstract
    • Blended modeling aims to improve the user experience of modeling activities by prioritizing the seamless interaction with models through multiple notations over the consistency of the models. Inconsistency tolerance, thus, becomes an important aspect in such settings. To understand the potential of current commercial and open-source modeling tools to support blended modeling, we have designed and carried out a systematic study. We identify challenges and opportunities in the tooling aspect of blended modeling. Specifically, we investigate the user-facing and implementation-related characteristics of existing modeling tools that already support multiple types of notations and map their support for other blended aspects, such as inconsistency tolerance, and elevated user experience. For the sake of completeness, we have conducted a multivocal study, encompassing an academic review, and grey literature review. We have reviewed nearly 5000 academic papers and nearly 1500 entries of grey literature. We have identified 133 candidate tools, and eventually selected 26 of them to represent the current spectrum of modeling tools.
  •  
21.
  • Petersson, Jesper, 1974 (author)
  • Medicine At A Distance In Sweden: Spatiotemporal Matters In Accomplishing Working Telemedicine
  • 2011
  • In: Science Studies. - 0786-3012. ; 24:2, s. 43-62
  • Journal article (peer-reviewed)abstract
    • This paper examines the accomplishment of making technology work, using the discourse around telemedicine in Swedish healthcare during 1994-2003. The paper will compare four projects launched in the mid-1990s and policymakers’ visions of healthcare through telemedicine. I will employ a sociotechnical approach developed within Actor-Network Theory that understands functioning technology not as something intrinsic but as an outcome of an ongoing process of negotiations. In the paper, I will extend the sociotechnical approach of what constitutes working technology to include spatiotemporal matters. I will also approach the closely related issue of space that has become a concern of Actor-Network Theory scholars interested in the accomplishment and continued workings of technology as it travels. In this discussion, an emphasis on fixed relations (network space) has been challenged by investigations into changing relations (fluid space). This paper suggests that in order to travel well, technology must be both fixed and fluid.⁰
  •  
22.
  • Bergström, Erik, 1976-, et al. (author)
  • Developing an information classification method
  • 2021
  • In: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 29:2, s. 209-239
  • Journal article (peer-reviewed)abstract
    • Purpose: The purpose of this paper is to develop a method for information classification. The proposed method draws on established standards, such as the ISO/IEC 27002 and information classification practices. The long-term goal of the method is to decrease the subjective judgement in the implementation of information classification in organisations, which can lead to information security breaches because the information is under- or over-classified. Design/methodology/approach: The results are based on a design science research approach, implemented as five iterations spanning the years 2013 to 2019. Findings: The paper presents a method for information classification and the design principles underpinning the method. The empirical demonstration shows that senior and novice information security managers perceive the method as a useful tool for classifying information assets in an organisation. Research limitations/implications: Existing research has, to a limited extent, provided extensive advice on how to approach information classification in organisations systematically. The method presented in this paper can act as a starting point for further research in this area, aiming at decreasing subjectivity in the information classification process. Additional research is needed to fully validate the proposed method for information classification and its potential to reduce the subjective judgement. Practical implications: The research contributes to practice by offering a method for information classification. It provides a hands-on-tool for how to implement an information classification process. Besides, this research proves that it is possible to devise a method to support information classification. This is important, because, even if an organisation chooses not to adopt the proposed method, the very fact that this method has proved useful should encourage any similar endeavour. Originality/value: The proposed method offers a detailed and well-elaborated tool for information classification. The method is generic and adaptable, depending on organisational needs.
  •  
23.
  •  
24.
  • Shirabe, Takeshi (author)
  • Drawing with geography
  • 2015
  • In: Lecture Notes in Geoinformation and Cartography. - Cham : Springer International Publishing. - 9783319167862 ; , s. 327-341
  • Conference paper (peer-reviewed)abstract
    • A method is proposed to assist spatial planners in drawing with ‘geographic’ constraints. These constraints constrain graphic objects to have certain relationships that are not limited to be (Euclidean) geometric or topological but allowed to be dependent on the spatial variation of selected conditions (e.g., elevation and vegetation) characterizing an underlying geographic space. Just as in existing computer-aided design systems, the method accepts a manual change to a graphic object or constraint, and updates all affected graphic objects accordingly. The paper discusses how such a method is motivated and improves the graphic editing capability of geographic information systems, and identifies key issues for its implementation.
  •  
25.
  •  
26.
  • Kavathatzopoulos, Iordanis, 1956- (author)
  • Robots and systems as autonomous ethical agents
  • 2010
  • In: INTECH 2010. - Bangkok : Assumption University. - 9789746151108 ; , s. 5-9
  • Conference paper (peer-reviewed)abstract
    • IT systems and robots can help us to solve many problems caused by the quantity, variation and complexity of information; because we need to handle dangerous and risky situations; or because of our social and emotional needs like elderly care. In helping us, these systems have to make decisions and act accordingly to achieve the goals for which they were built. Ethical decision support tools can be integrated into robots and other decision making systems to secure that decisions are made according to the basic theories of philosophy and to the findings of psychological research.  This can be done, in non-independent systems, as a way for the system to report to its operator, and to support the operator's ethical decision making. On the other hand, fully independent systems should be able to regulate their own decision making strategies and processes. However, this cannot be based on normative predefined criteria, or on the ability to make choices, or on having own control, or on ability of rational processing.  It seems that it is necessary for an independent robot or decision system to have "emotions." That is, a kind of ultimate purposes that can lead the decision process, and depending on the circumstances, guide the adoption of a decision strategy, whatever it may be, rational, heuristic or automatic.
  •  
27.
  • Farooqui, Ashfaq, et al. (author)
  • On Active Learning for Supervisor Synthesis
  • 2024
  • In: IEEE Transactions on Automation Science and Engineering. - : Institute of Electrical and Electronics Engineers Inc.. - 1545-5955 .- 1558-3783. ; 21, s. 78-
  • Journal article (peer-reviewed)abstract
    • Supervisory control theory provides an approach to synthesize supervisors for cyber-physical systems using a model of the uncontrolled plant and its specifications. These supervisors can help guarantee the correctness of the closed-loop controlled system. However, access to plant models is a bottleneck for many industries, as manually developing these models is an error-prone and time-consuming process. An approach to obtaining a supervisor in the absence of plant models would help industrial adoption of supervisory control techniques. This paper presents, an algorithm to learn a controllable supervisor in the absence of plant models. It does so by actively interacting with a simulation of the plant by means of queries. If the obtained supervisor is blocking, existing synthesis techniques are employed to prune the blocking supervisor and obtain the controllable and non-blocking supervisor. Additionally, this paper presents an approach to interface the with a PLC to learn supervisors in a virtual commissioning setting. This approach is demonstrated by learning a supervisor of the well-known example simulated in Xcelgo Experior and controlled using a PLC. interacts with the PLC and learns a controllable supervisor for the simulated system. Note to Practitioners—Ensuring the correctness of automated systems is crucial. Supervisory control theory proposes techniques to help build control solutions that have certain correctness guarantees. These techniques rely on a model of the system. However, such models are typically unavailable and hard to create. Active learning is a promising technique to learn models by interacting with the system to be learned. This paper aims to integrate active learning and supervisory control such that the manual step of creating models is no longer needed, thus, allowing the use of supervisory control techniques in the absence of models. The proposed approach is implemented in a tool and demonstrated using a case study. 
  •  
28.
  • Kavathatzopoulos, Iordanis, 1956-, et al. (author)
  • The common fate of ethics, sustainability and IT
  • 2011
  • In: Social accountability and sustainability in the information society. - Milano : Politeia. ; , s. 4-4
  • Conference paper (peer-reviewed)
  •  
29.
  •  
30.
  • Blanch, Krister, 1991 (author)
  • Beyond-application datasets and automated fair benchmarking
  • 2023
  • Licentiate thesis (other academic/artistic)abstract
    • Beyond-application perception datasets are generalised datasets that emphasise the fundamental components of good machine perception data. When analysing the history of perception datatsets, notable trends suggest that design of the dataset typically aligns with an application goal. Instead of focusing on a specific application, beyond-application datasets instead look at capturing high-quality, high-volume data from a highly kinematic environment, for the purpose of aiding algorithm development and testing in general. Algorithm benchmarking is a cornerstone of autonomous systems development, and allows developers to demonstrate their results in a comparative manner. However, most benchmarking systems allow developers to use their own hardware or select favourable data. There is also little focus on run time performance and consistency, with benchmarking systems instead showcasing algorithm accuracy. By combining both beyond-application dataset generation and methods for fair benchmarking, there is also the dilemma of how to provide the dataset to developers for this benchmarking, as the result of a high-volume, high-quality dataset generation is a significant increase in dataset size when compared to traditional perception datasets. This thesis presents the first results of attempting the creation of such a dataset. The dataset was built using a maritime platform, selected due to the highly dynamic environment presented on water. The design and initial testing of this platform is detailed, as well as as methods of sensor validation. Continuing, the thesis then presents a method of fair benchmarking, by utilising remote containerisation in a way that allows developers to present their software to the dataset, instead of having to first locally store a copy. To test this dataset and automatic online benchmarking, a number of reference algorithms were required for initial results. Three algorithms were built, using the data from three different sensors captured on the maritime platform. Each algorithm calculates vessel odometry, and the automatic benchmarking system was utilised to show the accuracy and run-time performance of these algorithms. It was found that the containerised approach alleviated data management concerns, prevented inflated accuracy results, and demonstrated precisely how computationally intensive each algorithm was.
  •  
31.
  • Yun, Yixiao, 1987, et al. (author)
  • Maximum-Likelihood Object Tracking from Multi-View Video by Combining Homography and Epipolar Constraints
  • 2012
  • In: 6th ACM/IEEE Int'l Conf on Distributed Smart Cameras (ICDSC 12), Oct 30 - Nov.2, 2012, Hong Kong. - 9781450317726 ; , s. 6 pages-
  • Conference paper (peer-reviewed)abstract
    • This paper addresses problem of object tracking in occlusion scenarios, where multiple uncalibrated cameras with overlapping fields of view are used. We propose a novel method where tracking is first done independently for each view and then tracking results are mapped between each pair of views to improve the tracking in individual views, under the assumptions that objects are not occluded in all views and move uprightly on a planar ground which may induce a homography relation between each pair of views. The tracking results are mapped by jointly exploiting the geometric constraints of homography, epipolar and vertical vanishing point. Main contributions of this paper include: (a) formulate a reference model of multi-view object appearance using region covariance for each view; (b) define a likelihood measure based on geodesics on a Riemannian manifold that is consistent with the destination view by mapping both the estimated positions and appearances of tracked object from other views; (c) locate object in each individual view based on maximum likelihood criterion from multi-view estimations of object position. Experiments have been conducted on videos from multiple uncalibrated cameras, where targets experience long-term partial or full occlusions. Comparison with two existing methods and performance evaluations are also made. Test results have shown effectiveness of the proposed method in terms of robustness against tracking drifts caused by occlusions.
  •  
32.
  • Grünloh, Christiane, et al. (author)
  • Using Critical Incidents in Workshops to Inform eHealth Design
  • 2017
  • In: Human-Computer Interaction - INTERACT 2017. - Cham : Springer. - 9783319677439 - 9783319677446 ; , s. 364-373
  • Conference paper (peer-reviewed)abstract
    • Demands for technological solutions to address the variety of problems in healthcare have increased. The design of eHealth is challenging due to e.g. the complexity of the domain and the multitude of stakeholders involved. We describe a workshop method based on Critical Incidents that can be used to reflect on, and critically analyze, different experiences and practices in healthcare. We propose the workshop format, which was used during a conference and found very helpful by the participants to identify possible implications for eHealth design, that can be applied in future projects. This new format shows promise to evaluate eHealth designs, to learn from patients’ real stories and case studies through retrospective meta-analyses, and to inform design through joint reflection of understandings about users’ needs and issues for designers.
  •  
33.
  • Sandkuhl, Kurt, 1963-, et al. (author)
  • Supporting early phases of digital twin development with enterprise modeling and capability management : Requirements from two industrial cases
  • 2020
  • In: Enterprise, Business-Process and Information Systems Modeling. - Cham : Springer. - 9783030494179 - 9783030494186 ; , s. 284-299
  • Conference paper (peer-reviewed)abstract
    • Industry 4.0 is a concept that has attracted much research and development over the last decade. At its core is the need to connect physical devices with their digital representations which essentially means establishing a digital twin. Currently, the technological development of digital twins has gathered much attention while the organizational and business aspects are less investigated. In response, the suitability of enterprise modeling and capability management for the purpose of developing and management of business-driven digital twins has been analyzed. A number of requirements from literature are summarized and two industrial cases have been analyzed for the purpose of investigating how the digital twin initiatives emerge and what forces drive the start of their implementation projects. The findings are discussed with respect to how Enterprise Modeling and the Capability-Driven Development method are able to support the business motivation, design and runtime management of digital twins. 
  •  
34.
  • Kavathatzopoulos, Iordanis, 1956-, et al. (author)
  • What are ethical agents and how can we make them work properly?
  • 2011
  • In: The computational turn. - Münster : MV-Wissenschaft. - 9783869913551 ; , s. 151-153
  • Conference paper (peer-reviewed)abstract
    • To support ethical decision making in autonomous agents, we suggest to implement decision tools based on classical philosophy and psychological research. As one possible avenue, we present EthXpert, which supports the process of structuring and assembling information about situations with possible moral implications.
  •  
35.
  • Kujala, Sari, et al. (author)
  • Benchmarking usability of patient portals in Estonia, Finland, Norway, and Sweden
  • 2024
  • In: International Journal of Medical Informatics. - : Elsevier. - 1386-5056 .- 1872-8243. ; 181
  • Journal article (peer-reviewed)abstract
    • INTRODUCTION: Poor usability is a barrier to widespread adoption of electronic health records (EHR). Providing good usability is especially challenging in the health care context, as there is a wide variety of patient users. Usability benchmarking is an approach for improving usability by evaluating and comparing the strength and weaknesses of systems. The main purpose of this study is to benchmark usability of patient portals across countries. METHODS: A mixed-methods survey approach was applied to benchmark the national patient portals offering patient access to EHR in Estonia, Finland, Norway, and Sweden. These Nordic countries have similar public healthcare systems, and they are pioneers in offering patients access to EHR for several years. In a survey of 29,334 patients, both patients' quantitative ratings of usability and their qualitative descriptions of very positive and very negative peak experiences of portal use were collected. RESULTS: The usability scores ranged from good to fair level of usability. The narratives of very positive and very negative experiences included the benefits of the patient portals and experienced usability issues. The regression analysis of results showed that very positive and negative experiences of patient portal use explain 19-35% of the variation of usability scores in the four countries. The percentage of patients who reported very positive or very negative experiences in each country was unrelated to the usability scores across countries. CONCLUSIONS: The survey approach could be used to evaluate usability with a wide variety of users and it supported learning from comparison across the countries. The combination of quantitative and qualitative data provided an approximation of the level of the perceived usability, and identified usability issues to be improved and useful features that patients appreciate. Further work is needed to improve the comparability of the varied samples across countries. 
  •  
36.
  • Abarenkov, Kessy, et al. (author)
  • Protax-fungi: A web-based tool for probabilistic taxonomic placement of fungal internal transcribed spacer sequences
  • 2018
  • In: New Phytologist. - : Wiley. - 0028-646X .- 1469-8137. ; 220:2, s. 517-525
  • Journal article (peer-reviewed)abstract
    • © 2018 New Phytologist Trust. Incompleteness of reference sequence databases and unresolved taxonomic relationships complicates taxonomic placement of fungal sequences. We developed Protax-fungi, a general tool for taxonomic placement of fungal internal transcribed spacer (ITS) sequences, and implemented it into the PlutoF platform of the UNITE database for molecular identification of fungi. With empirical data on root- and wood-associated fungi, Protax-fungi reliably identified (with at least 90% identification probability) the majority of sequences to the order level but only around one-fifth of them to the species level, reflecting the current limited coverage of the databases. Protax-fungi outperformed the Sintax and Rdb classifiers in terms of increased accuracy and decreased calibration error when applied to data on mock communities representing species groups with poor sequence database coverage. We applied Protax-fungi to examine the internal consistencies of the Index Fungorum and UNITE databases. This revealed inconsistencies in the taxonomy database as well as mislabelling and sequence quality problems in the reference database. The according improvements were implemented in both databases. Protax-fungi provides a robust tool for performing statistically reliable identifications of fungi in spite of the incompleteness of extant reference sequence databases and unresolved taxonomic relationships.
  •  
37.
  • Kavathatzopoulos, Iordanis (author)
  • New technologies in the education of native language
  • 2004
  • In: Greek language education in Scandinavia. ; , s. 73-76
  • Conference paper (peer-reviewed)abstract
    • Education in mother tongue as well as any education, demands the use of adequate methods and tools to be effective. New technology offers many possibilities for this purpose. In the present paper different IT solutions are discussed and their contribution to the goal of learning the mother tongue are examined. Necessary conditions for successful learning are supposed to be the careful choice and the continuous adaptation of used IT tools to the psychological learning process of the child.
  •  
38.
  • Kebande, Victor R., 1985-, et al. (author)
  • A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles
  • 2021
  • In: Sensors. - : MDPI. - 1424-8220. ; 21:18
  • Journal article (peer-reviewed)abstract
    • Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
39.
  • Bengtsson-Palme, Johan, 1985, et al. (author)
  • Improved software detection and extraction of ITS1 and ITS2 from ribosomal ITS sequences of fungi and other eukaryotes for analysis of environmental sequencing data
  • 2013
  • In: Methods in Ecology and Evolution. - 2041-210X. ; 4:10, s. 914-919
  • Journal article (peer-reviewed)abstract
    • The nuclear ribosomal internal transcribed spacer (ITS) region is the primary choice for molecular identification of fungi. Its two highly variable spacers (ITS1 and ITS2) are usually species specific, whereas the intercalary 5.8S gene is highly conserved. For sequence clustering and blast searches, it is often advantageous to rely on either one of the variable spacers but not the conserved 5.8S gene. To identify and extract ITS1 and ITS2 from large taxonomic and environmental data sets is, however, often difficult, and many ITS sequences are incorrectly delimited in the public sequence databases. We introduce ITSx, a Perl-based software tool to extract ITS1, 5.8S and ITS2 – as well as full-length ITS sequences – from both Sanger and high-throughput sequencing data sets. ITSx uses hidden Markov models computed from large alignments of a total of 20 groups of eukaryotes, including fungi, metazoans and plants, and the sequence extraction is based on the predicted positions of the ribosomal genes in the sequences. ITSx has a very high proportion of true-positive extractions and a low proportion of false-positive extractions. Additionally, process parallelization permits expedient analyses of very large data sets, such as a one million sequence amplicon pyrosequencing data set. ITSx is rich in features and written to be easily incorporated into automated sequence analysis pipelines. ITSx paves the way for more sensitive blast searches and sequence clustering operations for the ITS region in eukaryotes. The software also permits elimination of non-ITS sequences from any data set. This is particularly useful for amplicon-based next-generation sequencing data sets, where insidious non-target sequences are often found among the target sequences. Such non-target sequences are difficult to find by other means and would contribute noise to diversity estimates if left in the data set.
  •  
40.
  • Ge, Chenjie, 1991, et al. (author)
  • Co-Saliency-Enhanced Deep Recurrent Convolutional Networks for Human Fall Detection in E-Healthcare
  • 2018
  • In: Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS. - 1557-170X. ; 2018-July, s. 1572-1575
  • Conference paper (peer-reviewed)abstract
    • This paper addresses the issue of fall detection from videos for e-healthcare and assisted-living. Instead of using conventional hand-crafted features from videos, we propose a fall detection scheme based on co-saliency-enhanced recurrent convolutional network (RCN) architecture for fall detection from videos. In the proposed scheme, a deep learning method RCN is realized by a set of Convolutional Neural Networks (CNNs) in segment-levels followed by a Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), to handle the time-dependent video frames. The co-saliency-based method enhances salient human activity regions hence further improves the deep learning performance. The main contributions of the paper include: (a) propose a recurrent convolutional network (RCN) architecture that is dedicated to the tasks of human fall detection in videos; (b) integrate a co-saliency enhancement to the deep learning scheme for further improving the deep learning performance; (c) extensive empirical tests for performance analysis and evaluation under different network settings and data partitioning. Experiments using the proposed scheme were conducted on an open dataset containing multicamera videos from different view angles, results have shown very good performance (test accuracy 98.96%). Comparisons with two existing methods have provided further support to the proposed scheme.
  •  
41.
  • Jayasiri, Subashini C., et al. (author)
  • The Faces of Fungi database: fungal names linked with morphology, phylogeny and human impacts
  • 2015
  • In: Fungal diversity. - : Springer Science and Business Media LLC. - 1560-2745 .- 1878-9129. ; 74:1, s. 3-18
  • Journal article (peer-reviewed)abstract
    • Taxonomic names are key links between various databases that store information on different organisms. Several global fungal nomenclural and taxonomic databases (notably Index Fungorum, Species Fungorum and MycoBank) can be sourced to find taxonomic details about fungi, while DNA sequence data can be sourced from NCBI, EBI and UNITE databases. Although the sequence data may be linked to a name, the quality of the metadata is variable and generally there is no corresponding link to images, descriptions or herbarium material. There is generally no way to establish the accuracy of the names in these genomic databases, other than whether the submission is from a reputable source. To tackle this problem, a new database (FacesofFungi), accessible at www.facesoffungi.org (FoF) has been established. This fungal database allows deposition of taxonomic data, phenotypic details and other useful data, which will enhance our current taxonomic understanding and ultimately enable mycologists to gain better and updated insights into the current fungal classification system. In addition, the database will also allow access to comprehensive metadata including descriptions of voucher and type specimens. This database is user-friendly, providing links and easy access between taxonomic ranks, with the classification system based primarily on molecular data (from the literature and via updated web-based phylogenetic trees), and to a lesser extent on morphological data when molecular data are unavailable. In FoF species are not only linked to the closest phylogenetic representatives, but also relevant data is provided, wherever available, on various applied aspects, such as ecological, industrial, quarantine and chemical uses. The data include the three main fungal groups (Ascomycota, Basidiomycota, Basal fungi) and fungus-like organisms. The FoF webpage is an output funded by the Mushroom Research Foundation which is an NGO with seven directors with mycological expertise. The webpage has 76 curators, and with the help of these specialists, FoF will provide an updated natural classification of the fungi, with illustrated accounts of species linked to molecular data. The present paper introduces the FoF database to the scientific community and briefly reviews some of the problems associated with classification and identification of the main fungal groups. The structure and use of the database is then explained. We would like to invite all mycologists to contribute to these web pages.
  •  
42.
  • Johansson, Björn, et al. (author)
  • Management of Information Systems Outsourcing : Evaluation of Lessons Learned from a Boundary Spanning Perspective
  • 2012
  • In: Electronic Journal of Information Systems Evaluation. - Reading, UK : Academic Publishing International. - 1566-6379. ; 15:1, s. 63-73
  • Journal article (peer-reviewed)abstract
    • Even if outsourcing is a well-researched phenomenon, it can be stated that evaluation studies on IS outsourcing relationships are scarce. From a description of two IS outsourcing relationship cases, a set of lessons learned are presented. A boundary spanning perspective is then used when evaluating these lessons learned in the client-supplier outsourcing relationships and thereby adding a “new” theoretical perspective on outsourcing relationships. The evaluation is concluded in a set of propositions that present the boundary spanning perspective of the lessons learned. The aim of these propositions is to act as both a guiding tool for how to further develop boundary spanning roles in outsourcing relationships and to act as a base for future research on outsourcing relationships.
  •  
43.
  • Buckland, Philip I., 1973-, et al. (author)
  • BugsCEP, an entomological database twenty-five years on
  • 2014
  • In: Antenna (Journal of the Royal Entomological Society). - London : Royal Entomological Society of London. - 0140-1890. ; 38:1, s. 21-28
  • Journal article (peer-reviewed)
  •  
44.
  • Laaksoharju, Mikael, et al. (author)
  • Computerized support for ethical analysis
  • 2009
  • In: Computer ethics. - Corfu, Greece : Ionian University. - 9789602726549 ; , s. 425-437
  • Conference paper (peer-reviewed)abstract
    • EthXpert is a computer based, interactive tool to help decision makers analyze the underlying preconditions of real-life moral problems. It is based on a social scientific approach focusing on the process of ethical decision making. EthXpert’s goals are: 1) to block heteronomy and support autonomy, 2) to organize interrelationships and data in a systematic way and, 3) present the complexity of the issue in a comprehensive way and provide easy access to all data. By using EthXpert a decision maker can take control of his/her own ethical decision process and of the moral problem itself.
  •  
45.
  • Lu, Zhihan, et al. (author)
  • Multimodal Hand and Foot Gesture Interaction for Handheld Devices
  • 2014
  • In: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP). - : Association for Computing Machinery (ACM). - 1551-6857 .- 1551-6865. ; 11:1
  • Journal article (peer-reviewed)abstract
    • We present a hand-and-foot-based multimodal interaction approach for handheld devices. Our method combines input modalities (i.e., hand and foot) and provides a coordinated output to both modalities along with audio and video. Human foot gesture is detected and tracked using contour-based template detection (CTD) and Tracking-Learning-Detection (TLD) algorithm. 3D foot pose is estimated from passive homography matrix of the camera. 3D stereoscopic and vibrotactile are used to enhance the immersive feeling. We developed a multimodal football game based on the multimodal approach as a proof-of-concept. We confirm our systems user satisfaction through a user study.
  •  
46.
  • Theoretical Information Studies : Information In The World
  • 2020
  • Editorial collection (peer-reviewed)abstract
    • This is the first attempt to delineate the synthetic field of the theoretical study of information, treating information as the basic phenomenon on the fundamental level of the world, encompassing nature, technology, individuals and society. The exploration of information is done within Info-computational approaches, to natural and social phenomena such as Bioinformatics, Information Physics, Informational Chemistry, Computational Physics, Cognitive and Social sciences, with special emphasis on interdisciplinary, crossdisciplinary and transdisciplinary knowledge. The book presents results of collaboration across research fields within info-computational and info-structural frameworks, in attempt to better theoretically and conceptually capture the phenomenon of information and its dynamics (such as computation and communication), as they appear on different levels of organization, on different scales and in different contexts.
  •  
47.
  • Andersson, Birger, 1961-, et al. (author)
  • Towards a formal definition of goal-oriented business process patterns
  • 2005
  • In: Business Process Management Journal. - : Emerald Group Publishing. - 1463-7154 .- 1758-4116. ; 11:6, s. 650-662
  • Journal article (peer-reviewed)abstract
    • Purpose – Organizations of today are becoming ever more focused on their business processes. This has resulted in an increasing interest in using best practices for business process re-engineering. Two problems arise in connection to using best practices: how to find a best practice that suits particular purposes, and how to ensure that the process from the best practice has the same nature as the process under re-engineering. The purpose of this paper is to address these issues. Design/methodology/approach – The paper suggests using business process patterns, i.e. relatively high level business process models, for making near formal comparison of business processes. The paper analyzes widespread modeling techniques to find out which of them suits the task of building patterns for comparison. Based on this analysis, the state-flow modeling technique is chosen and first steps towards formal definition of business process patterns based on this technique are suggested. Findings – A pattern is defined based on the notions of state space, goal, as a surface in the state space, and valid movements towards the goal. A thinkable procedure of constructing patterns is demonstrated on two real-life examples. A hypothetical procedure for comparing process is suggested but it still needs to be verified in practice. Originality/value – The originality of the paper is the way the patterns are formulated and the underlying model, the state-flow view of processes, upon which the patterns are founded.
  •  
48.
  • Kavathatzopoulos, Iordanis, 1956-, et al. (author)
  • Computer aided ethical IT systems design
  • 2010
  • In: ETHICOMP 2010. - Tarragona, Spain : Universitat Rovira i Virgili. - 9788469306116 ; , s. 332-340
  • Conference paper (peer-reviewed)abstract
    • The purpose with EthXpert is to help an analyst or decision maker to understand how different design solutions affect the interests of each involved stakeholder. To support this understanding, the analysis is made explicit by iterating a procedure comprising three main steps. The first step is to create an overview by drawing a stakeholder network, i.e. a map over the relations between all stakeholders. Second the impact of each stakeholder’s interests on other stakeholders are analyzed and noted. Finally the considerations for each interest are used as foundation for making assumptions about how the stakeholders are affected by different design solutions. Not only does this process help people to scrutinize, structure and get overview of an ethical problem. The resulting document can also be used as vindication of the choices that are made. Various ethical support systems have targeted the concern of identifying relevant information in different ways. EthXpert has been applied on the design of different IT systems with very positive results. With help from EthXpert the test groups were able to extend previous analyses through identifying additional stakeholders and interests. The procedure also gave insight in how the interests of different stakeholders were interrelated. Some of the test groups especially appreciated the collaboration feature of EthXpert. An ethical analysis often brings up many big and small issues to consider and it is therefore efficient if a group can cooperate in solving the problems. Thus the tool also works as a means to gather several perspectives on a problem. Through the explicit process, the designer acquires both a better overview of the complexity of a problem and a conception of how the involved stakeholders affect and are affected by different solutions. Almost all of the test subjects were of the opinion that the systematic procedure of EthXpert is purposeful for acquiring higher ethical problem-solving and decision-making skills by offering a holistic overview over ethical aspects in the design of IT systems. Although critical remarks about the usability of the interface, many also became aware of shortages in a prior analysis made without the tool. This indicates that a computerized tool that guides the investigation of stakeholders’ interests, and supports structuring and overview over information, is helpful for designing more ethical IT systems.
  •  
49.
  •  
50.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-50 of 18211
Type of publication
conference paper (9252)
journal article (5109)
book chapter (886)
doctoral thesis (876)
reports (836)
licentiate thesis (456)
show more...
other publication (214)
research review (164)
editorial proceedings (163)
book (148)
editorial collection (89)
review (13)
artistic work (8)
patent (5)
show less...
Type of content
peer-reviewed (14077)
other academic/artistic (3809)
pop. science, debate, etc. (320)
Author/Editor
Vyatkin, Valeriy (307)
Nilsson, Anders G. (145)
Zdravkovic, Jelena (140)
Ekenberg, Love (139)
Sandkuhl, Kurt, 1963 ... (134)
Bosch, Jan, 1967 (134)
show more...
Johannesson, Paul (121)
Bider, Ilia (119)
Stirna, Janis (109)
Lundell, Björn (105)
Boström, Henrik (104)
Rusu, Lazar (103)
Osipov, Evgeny (101)
Saffiotti, Alessandr ... (101)
Perjons, Erik (94)
Dalianis, Hercules (93)
Papapetrou, Panagiot ... (92)
Verhagen, Harko (87)
Fors, Uno (84)
Cronholm, Stefan (84)
Peng, Zebo, 1958- (80)
Mozelius, Peter (78)
Danielson, Mats (78)
Eles, Petru Ion, 195 ... (75)
Rahmani, Rahim (73)
Larsson, Aron (73)
Henkel, Martin (71)
Hansson, Henrik (69)
Grönlund, Åke, 1954- (66)
Ramberg, Robert (65)
Kanter, Theo (64)
Kowalski, Stewart (62)
Mirijamdotter, Anita (61)
Johansson, Ulf (60)
Schelén, Olov (60)
Nouri, Jalal (59)
Gamalielsson, Jonas (59)
Lilienthal, Achim J. ... (58)
Magnusson, Johan, 19 ... (58)
Voigt, Thiemo (56)
Asproth, Viveca (56)
Brown, Barry (56)
Fabian, Martin, 1960 (55)
Pettersson, John Sör ... (55)
Juell-Skielse, Gusta ... (55)
Lennartson, Bengt, 1 ... (54)
Knauss, Eric, 1977 (54)
Hansson, Karin (54)
Gustas, Remigijus, 1 ... (54)
Gao, Shang, 1982- (53)
show less...
University
Stockholm University (3281)
Chalmers University of Technology (3012)
Royal Institute of Technology (2182)
Uppsala University (1193)
University of Gothenburg (1157)
Linköping University (1017)
show more...
Luleå University of Technology (992)
University of Skövde (942)
Örebro University (921)
Karlstad University (896)
Umeå University (868)
Linnaeus University (791)
RISE (764)
Mid Sweden University (733)
Mälardalen University (605)
Jönköping University (598)
Blekinge Institute of Technology (510)
Lund University (503)
Halmstad University (422)
University of Borås (323)
Högskolan Dalarna (260)
University West (200)
Malmö University (155)
Karolinska Institutet (139)
Södertörn University (80)
University of Gävle (71)
Swedish University of Agricultural Sciences (63)
Kristianstad University College (39)
VTI - The Swedish National Road and Transport Research Institute (38)
Swedish National Defence College (31)
Stockholm School of Economics (22)
Swedish Museum of Natural History (7)
Red Cross University College (5)
University College of Arts, Crafts and Design (4)
Royal College of Music (4)
IVL Swedish Environmental Research Institute (3)
The Nordic Africa Institute (2)
Marie Cederschiöld högskola (1)
Swedish Agency for Marine and Water Management (1)
show less...
Language
English (17440)
Swedish (743)
German (16)
Japanese (3)
Norwegian (2)
Spanish (2)
show more...
Finnish (2)
Danish (1)
Undefined language (1)
Portuguese (1)
show less...
Research subject (UKÄ/SCB)
Natural sciences (18193)
Engineering and Technology (4377)
Social Sciences (1923)
Medical and Health Sciences (459)
Humanities (340)
Agricultural Sciences (57)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view