hh.sePublications
Change search
Refine search result
2345678 201 - 250 of 1796
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 201.
    Bergquist, Magnus
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ljungberg, Jan
    University of Gothenburg, Gothenburg, Sweden.
    Remneland, Björn
    University of Gothenburg, Gothenburg, Sweden.
    Rolandsson, Bertil
    University of Gothenburg, Gothenburg, Sweden.
    From e-government to e-governance: social media and public authorities legitimacy work2017In: Proceedings of the 25th European Conference on Information Systems (ECIS), 2017, p. 858-872Conference paper (Refereed)
    Abstract [en]

    Social media increasingly condition how public authorities build legitimacy when engaging with citizens. In this paper we report on a study of the increasing use of and exposure to social media and social networking platforms in two Swedish public authorities, the Social Insurance Agency (SIA) and the police force. Although formally grounded on the same civic principles, the two authorities have significantly different approaches to social media as a way to generate internal and external legitimacy. SIA has mainly implemented an e-government approach to rationalize services to become more efficient and customer oriented, by using social media as one of several media channels. The police force, however, adopted an e-governance approach to build legitimacy through interaction and reflexive discussion between government and citizens as a way to create transparency and nuance citizens’ attitude towards the police force. Building on a two-dimensional public government/governance framework, we reflect on how the two studied authorities’ social media practices shape and are shaped by different governing practices in their legitimacy work.

    Download full text (pdf)
    fulltext
  • 202.
    Bergvall-Kåreborn, Birgitta
    et al.
    Luleå University of Technology, Luleå, Sweden.
    Ihlström Eriksson, Carina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Melander Wikman, Anita
    Luleå University of Technology, Luleå, Sweden.
    Ståhlbröst, Anna
    Luleå University of Technology, Luleå, Sweden.
    A Model for Reflective Participatory Design - The Role of Participation, Voice and Space2015In: AMCIS 2015 Proceedings, AIS Electronic Library (AISeL) , 2015Conference paper (Refereed)
    Abstract [en]

    This paper aims to contribute to the participatory tradition in health informatics by presenting a model for reflective participatory design emerging from qualitative fieldwork in a participatory project aimed to improve the health and wellbeing of older people in the northern periphery regions of Europe, through new mobile services. The model brings together two established processes in novel ways: systems development and user participation. Within each process three concepts are presented to facilitate discussion and reflection at the concept level, the process level and the integrated process level.

  • 203.
    Bergvall-Kåreborn, Birgitta
    et al.
    Luleå University of Technology, Luleå, Sweden.
    Ihlström Eriksson, Carina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ståhlbröst, Anna
    Luleå University of Technology, Luleå, Sweden.
    Places and Spaces - Their Influence on Innovation Milieus and Innovation Processes2015In: Proceedings of the 2015 ISPIM Conference in Budapest, June 14-17, International Society for Professional Innovation Management (ISPIM) , 2015Conference paper (Refereed)
    Abstract [en]

    Intensified and matured use of internet-based technologies aimed to facilitate development and innovation are increasingly characterized by a mixture of physical and digital locations; commonly referred to as places and spaces. The aim of this paper was therefore to identify different types of places and spaces central for the innovation milieus and processes of Living Lab projects, illustrate their impact on both process and results, and develop guidelines for space that can be designed in order to facilitate value-driven and democratized innovation. Based on a literature review and a cross case analyses different aspects of space, relevant for Innovation and Living Lab studies, have been identified: 1) local-global; 2) physical and digital, and 3) private-public. In the paper we focus on these concepts as tools for understanding present day innovation and we examples of how digital technology has influenced placement and permeability in relation to place and space.

  • 204.
    Bergvall-Kåreborn, Birgitta
    et al.
    Luleå University of Technology, Luleå, Sweden.
    Ihlström Eriksson, Carina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ståhlbröst, Anna
    Luleå University of Technology, Luleå, Sweden.
    Places and Spaces within Living Labs2015In: Technology Innovation Management Review, ISSN 1927-0321, E-ISSN 1927-0321, Vol. 5, no 12, p. 37-47Article in journal (Refereed)
    Abstract [en]

    In this article, we propose the concepts of places and spaces as conceptual tools to facilitate the organization of innovation activities within living labs. We have taken a pragmatic perspective on these concepts regarding how they are integrated in design situations, and how different types of places and spaces can facilitate or hinder innovation. We have found that, by applying openness, realism, and influence in the different spaces of our living lab milieus, they have transformed into many different places depending on the stakeholders involved, the methods chosen, and the facilitation of activities. Hence, by understanding this line of reasoning, living lab managers can make more informed decisions and plans for innovation activities.

  • 205.
    Bergvall-Kåreborn, Birgitta
    et al.
    Luleå University of Technology.
    Ihlström Eriksson, Carina
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ståhlbröst, Anna
    Luleå University of Technology.
    Svensson, Jesper
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    A Milieu for Innovation: Defining Living Labs2009In: Stimulating recovery: the role of innovation management : proceedings of the 2nd ISPIM Innovation Symposium, New York City, USA, 6-9 December 2009 / [ed] K.R.E. Huizingh et al, New York: ISPIM , 2009, p. 12-Conference paper (Refereed)
    Abstract [en]

    A new trend of user involvement in open innovation processes has emerged. Concurring with this trend the Living Lab concept has been re-vitalized. This concept has attracted attention lately, but there exist no coherent view. In this paper we discuss and define the concept and propose five key components and five key principles for Living Labs based on experiences from over 30 development and research projects within two Living Labs, Botnia Living Lab and Halmstad Living Lab. The key components are: ICT & Infrastructure; Management; Partners & Users; Research; and Approach. The key principles are: Openness; Influence; Realism; Value; and Sustainability. Our proposed definition of a Living Lab is: A Living Lab is a user-centric innovation milieu built on every-day practice and research, with an approach that facilitates user influence in open and distributed innovation processes engaging all relevant partners in real-life contexts, aiming to create sustainable values.

  • 206.
    Bernard, Florian
    et al.
    MPI Informatics, Saarland Informatics Campus, Saarbrücken, Germany.
    Thunberg, Johan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Goncalves, Jorge
    LCSB, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
    Theobalt, Christian
    MPI Informatics, Saarland Informatics Campus, Saarbrücken, Germany.
    Synchronisation of partial multi-matchings via non-negative factorisations2019In: Pattern Recognition, ISSN 0031-3203, E-ISSN 1873-5142, Vol. 92, p. 146-155Article in journal (Refereed)
    Abstract [en]

    In this work we study permutation synchronisation for the challenging case of partial permutations, which plays an important role for the problem of matching multiple objects (e.g. images or shapes). The term synchronisation refers to the property that the set of pairwise matchings is cycle-consistent, i.e. in the full matching case all compositions of pairwise matchings over cycles must be equal to the identity. Motivated by clustering and matrix factorisation perspectives of cycle-consistency, we derive an algo- rithm to tackle the permutation synchronisation problem based on non-negative factorisations. In order to deal with the inherent non-convexity of the permutation synchronisation problem, we use an initialisation procedure based on a novel rotation scheme applied to the solution of the spectral relaxation. Moreover, this rotation scheme facilitates a convenient Euclidean projection to obtain a binary solution after solving our relaxed problem. In contrast to state-of-the-art methods, our approach is guaranteed to produce cycle-consistent results. We experimentally demonstrate the efficacy of our method and show that it achieves better results compared to existing methods. © 2019 Elsevier Ltd

  • 207.
    Bhanu, Bir
    et al.
    University of California at Riverside, USA.
    Ratha, Nalini K.
    IBM T.J. Watson Research Center, USA.
    Kumar, Vijay
    Carnegie Mellon University, USA.
    Chellappa, Rama
    University of Maryland.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Guest Editorial: Special Issue on Human Detection and Recognition2007In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 2, no 3 part 2, p. 489-490Article in journal (Refereed)
    Abstract [en]

    The 12 regular papers and three correspondences in this special issue focus on human detection and recognition. The papers represent gait, face (3-D, 2-D, video), iris, palmprint, cardiac sounds, and vulnerability of biometrics and protection against the spoof attacks.

    Download full text (pdf)
    FULLTEXT01
  • 208.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Fingerprint features2009In: Encyclopedia of biometrics / [ed] Stan Z. Li, New York: Springer-Verlag New York, 2009, p. 465-473Chapter in book (Other academic)
  • 209.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Multiple experts2009In: Encyclopedia of biometrics / [ed] Stan Z. Li & Anil Jain, Springer, 2009, p. 986-993Chapter in book (Other academic)
  • 210.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision2006Book (Refereed)
    Abstract [en]

    Presents a systematic, mathematically rigorous examination of modern signal processing concepts used in computer vision and image analysis. This book is illustrated with 4-color graphics and applications, including biometric person authentication, texture analysis, optical character recognition, motion estimation and tracking.

  • 211.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Alonso-Fernandez, Fernando
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Analytic Signal Phase in Ν − D by Linear Symmetry Tensor – fingerprint modelingIn: Article in journal (Other academic)
    Abstract [en]

    We reveal that the Analytic Signal phase, and its gradient have a hitherto unstudied discontinuity in 2−D and higher dimensions. The shortcoming can result in severe artifacts whereas the problem does not exist in 1−D signals. Direct use of Gabor phase, or its gradient, in computer vision and biometric recognition e.g., as done in influential studies, may produce undesired results that will go unnoticed unless special images similar to ours reveal them. Instead of the Analytic Signal phase, we suggest the use of Linear Symmetry phase, relying on more than one set of Gabor filters, but with a negligible computational add-on, as a remedy. Gradient magnitudes of this phase are continuous in contrast to that of the analytic signal whereas continuity of the gradient direction of the phase is guaranteed if Linear Symmetry Tensor replaces gradient vector. The suggested phase has also a built-in automatic scale estimator, useful for robust detection of patterns by multi-scale processing. We show crucial concepts on synthesized fingerprint images, where ground truth regarding instantaneous frequency, (scale \& direction), and phase are known with favorable results. A comparison to a baseline alternative is also reported. To that end, a novel multi-scale minutia model where location, direction, and scale of minutia parameters are steerable, without the creation of uncontrollable minutia is also presented. This is a useful tool, to reduce development times of minutia detection methods with explainable behavior. A revealed consequence is that minutia directions are not determined by the linear phase alone, but also by each other and the influence must be corrected to obtain steerability and accurate ground truths. Essential conclusions are readily transferable to ND, and unrelated applications, e.g. optical flow or disparity estimation in stereo.

  • 212.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Tomas
    TietoEnator ArosTech AB, Linköping.
    Symmetry derivatives of Gaussians illustrated by cross tracking2001Report (Other academic)
    Abstract [en]

    We propose a family of complex differential operators, symmetry derivatives, for pattern recognition in images. We present three theorems on their properties as applied to Gaussians. These show that all orders of symmetry derivatives of Gaussians yield compact expressions obtained by replacing the original differential polynomial with an ordinary polynomial. Just like Gaussians, the symmetry derivatives of Gaussians are (form) invariant to Fourier transform, that is they are rescaled versions of the original. As a result, the symmetry derivatives of Gaussians are closed under the convolution operator, i.e. they map on a member of the family when convolved with each other. Since Gaussians are utilized extensively in image processing, the revealed properties have practical consequences, e.g. when designing filters and filtering schemes that are unbiased w.r.t. orientation (isotropic). A use of these results is illustrated by an application: tracking the cross markers in long image sequences from vehicle crash tests. The implementation and the results of this application are discussed in terms of the theorems presented, along with conclusions.

  • 213.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Tomas
    TietoEnator ArosTech, Linköping, Sweden.
    Nilsson, Kenneth
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Orientation fields filtering by derivatives of a Gaussian2003In: Proceedings of the 13th Scandinavian Conference on Image Analysis (SCIA 2003), Halmstad, Sweden, Date: jun 29-jul 02, 2003, Berlin: Springer Berlin/Heidelberg, 2003, Vol. LNCS-2749, p. 19-27Conference paper (Other academic)
    Abstract [en]

    We suggest a set of complex differential operators, symmetry derivatives, that can be used for matching and pattern recognition. We present results on the invariance properties of these. These show that all orders of symmetry derivatives of Gaussians yield a remarkable invariance : they are obtained by replacing the original differential polynomial with the same polynomial but using ordinary scalars. Moreover, these functions are closed under convolution and they are invariant to the Fourier transform. The revealed properties have practical consequences for local orientation based feature extraction. This is shown by two applications: i) tracking markers in vehicle tests ii) alignment of fingerprints.

  • 214.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Tomas
    TietoEnator AB, Storg. 3, 58223 Linköping, Sweden.
    Nilsson, Kenneth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Recognition by symmetry derivatives and the generalized structure tensor2004In: IEEE Transaction on Pattern Analysis and Machine Intelligence, ISSN 0162-8828, E-ISSN 1939-3539, Vol. 26, no 12, p. 1590-1605Article in journal (Refereed)
    Abstract [en]

    We suggest a set of complex differential operators that can be used to produce and filter dense orientation (tensor) fields for feature extraction, matching, and pattern recognition. We present results on the invariance properties of these operators, that we call symmetry derivatives. These show that, in contrast to ordinary derivatives, all orders of symmetry derivatives of Gaussians yield a remarkable invariance: they are obtained by replacing the original differential polynomial with the same polynomial, but using ordinary coordinates x and y corresponding to partial derivatives. Moreover, the symmetry derivatives of Gaussians are closed under the convolution operator and they are invariant to the Fourier transform. The equivalent of the structure tensor, representing and extracting orientations of curve patterns, had previously been shown to hold in harmonic coordinates in a nearly identical manner. As a result, positions, orientations, and certainties of intricate patterns, e.g., spirals, crosses, parabolic shapes, can be modeled by use of symmetry derivatives of Gaussians with greater analytical precision as well as computational efficiency. Since Gaussians and their derivatives are utilized extensively in image processing, the revealed properties have practical consequences for local orientation based feature extraction. The usefulness of these results is demonstrated by two applications:

    1. tracking cross markers in long image sequences from vehicle crash tests and
    2. alignment of noisy fingerprints.
    Download full text (pdf)
    FULLTEXT01
  • 215.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Choy, Kwok
    Halmstad University.
    Olsson, Henrik
    Halmstad University.
    Evidence on skill differences of women and men concerning face recognition2001In: Audio- and video-based biometric person authentication: Third International Conference, AVBPA 2001, Halmstad, Sweden, June 6-8, 2001 : proceedings / [ed] Josef Bigun, Fabrizio Smeraldi, (eds.), Berlin: Springer, 2001, p. 44-51Conference paper (Other academic)
    Abstract [en]

    We present a cognitive study regarding face recognition skills of women and men. The results reveal that there are in the average sizable skill differences between women and men in human face recognition. The women had higher correct answer frequencies then men in all face recognition questions they answered. In difficult questions, those which had fewer correct answers than other questions, the performance of the best skilled women were remarkably higher than the best skilled men. The lack of caricature type information (high spatial frequencies) hampers the recognition task significantly more than the lack of silhouette and shading (low spatial frequencies) information, according to our findings. Furthermore, the results confirmed the previous findings that hair style and facial expressions degrades the face recognition performance of humans significantly. The reported results concern 1838 individuals and the study was effectuated by means of Internet.

  • 216.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Choy, Kwok-wai
    Olsson, Henrik
    Evidence on skill differences of women and men concerning face recognition2001Report (Other academic)
    Abstract [en]

    We present a cognitive study regarding face recognition skills of women and men. The results reveal that there are in the average sizable skill differences between women and men in human face recognition. The women had higher correct answer frequencies then men in all face recognition questions they answered. In difficult questions, those which had fewer correct answers than other questions, the performance of the best skilled women were remarkably higher than the best skilled men. The lack of caricature type information (high spatial frequencies) hampers the recognition task significantly more than the lack of silhouette and shading (low spatial frequencies) information, according to our findings. Furthermore, the results confirmed the previous findings that hair style and facial expressions degrades the face recognition performance of humans significantly. The reported results concern 1838 individuals and the study was effectuated by means of Internet.

  • 217.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Fierrez-Aguilar, J.
    Universidad Politecnica de Madrid, Spain.
    Ortega-Garcia, J.
    Universidad Politecnica de Madrid, Spain.
    Gonzalez-Rodriguez, J.
    Universidad Politecnica de Madrid, Spain.
    Combining Biometric Evidence for Person Authentication2005In: Advanced Studies in Biometrics: Summer School on Biometrics, Alghero, Italy, June 2-6, 2003 / [ed] Tistarelli, Massimo; Bigun, Josef; Grosso, Enrico, Berlin: Springer Berlin/Heidelberg, 2005, p. 1-18Conference paper (Other academic)
    Abstract [en]

    Humans are excellent experts in person recognition and yet they do not perform excessively well in recognizing others only based on one modality such as single facial image. Experimental evidence of this fact is reported concluding that even human authentication relies on multimodal signal analysis. The elements of automatic multimodal authentication along with system models are then presented. These include the machine experts as well as machine supervisors. In particular, fingerprint and speech based systems will serve as illustration. A signal adaptive supervisor based on the input biometric signal quality is evaluated.

  • 218.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Fiérrez-Aguilar, Julián
    Universidad Autonoma de Madrid, Biometric Recognition Group - ATVS, Madrid, Spain.
    Ortega-García, Javier
    Universidad Autonoma de Madrid, Biometric Recognition Group - ATVS, Madrid, Spain.
    González-Rodríguez, Joaquín
    Universidad Autonoma de Madrid, Biometric Recognition Group - ATVS, Madrid, Spain.
    Multimodal biometric authentication using quality signals in mobile communications2003In: Proceedings - 12th International Conference on Image Analysis and Processing, ICIAP 2003, Los Alamitos, USA: IEEE Computer Society, 2003, p. 2-11Conference paper (Other academic)
    Abstract [en]

    The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and speech based systems will serve as illustration of a mobile authentication application. A novel signal adaptive supervisor, based on the input biometric signal quality is evaluated. Experimental results on data collected from mobile telephones are reported demonstrating the benefits of the proposed scheme. © 2003 IEEE.

  • 219.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Fronthaler, Hartwig
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Kollreider, Klaus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Assuring liveness in biometric identity authentication by real-time face tracking2004In: CIHSPS 2004: proceedings of the 2004 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety : S. Giuliano, Venice, Italy, 21-22 July 2004 / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2004, p. 104-111Conference paper (Refereed)
    Abstract [en]

    A system that combines real-time face tracking as well as the localization of facial landmarks in order to improve the authenticity of fingerprint recognition is introduced. The intended purpose of this application is to assist in securing public areas and individuals, in addition to enforce that the collected sensor data in a multi modal person authentication system originate front present persons, i.e. the system is not under a so called play back attack. Facial features are extracted with the help of Gabor filters and classified by SVM experts. For real-time performance, selected points from a retinotopic grid are used to form regional face models. Additionally only a subset of the Gabor decomposition is used for different face regions. The second modality presented is texture-based fingerprint recognition, exploiting linear symmetry. Experimental results on the proposed system are presented.

  • 220.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Gustavsson, TomasChalmers University of Technology, Department of Signals and Systems, Gothenburg, Sweden.
    Image analysis: 13th Scandinavian Conference, SCIA 2003, Halmstad, Sweden, June 29-July 2, 2003, Proceedings2003Conference proceedings (editor) (Other academic)
    Abstract [en]

    This book constitutes the refeered proceedings of the 13th Scandinavian Conference on Image Analysis, SCIA 2003, held in Halmstad, Sweden in June/July 2003.The 148 revised full papers presented together with 6 invited contributions were carefully reviewed and selected for presentation. The papers are organized in topical sections on feature extraction, depth and surface, shape analysis, coding and representation, motion analysis, medical image processing, color analysis, texture analysis, indexing and categorization, and segmentation and spatial grouping.

  • 221.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Karlsson, Stefan M.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Histogram of directions by the structure tensor2011In: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, New York, NY: Association for Computing Machinery (ACM), 2011Conference paper (Refereed)
    Abstract [en]

    Many low-level features, as well as varying methods of extraction and interpretation rely on directionality analysis (for example the Hough transform, Gabor filters, SIFT descriptors and the structure tensor). The theory of the gradient based structure tensor (a.k.a. the second moment matrix) is a very well suited theoretical platform in which to analyze and explain the similarities and connections (indeed often equivalence) of supposedly different methods and features that deal with image directionality. Of special interest to this study is the SIFT descriptors (histogram of oriented gradients, HOGs). Our analysis of interrelationships of prominent directionality analysis tools offers the possibility of computation of HOGs without binning, in an algorithm of comparative time complexity.

    Download full text (pdf)
    fulltext
  • 222.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Malmqvist, Kerstin
    Proceedings: Symposium on image analysis, Halmstad March 7-8, 20002000Conference proceedings (editor) (Other academic)
  • 223.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Mikaelyan, Anna
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Dense frequency maps by Structure Tensor and logarithmic scale space: application to forensic fingerprintsManuscript (preprint) (Other academic)
    Abstract [en]

    Increasingly, reliable absolute frequency and orientation maps are needed, e.g. for image enhancement. Less studied is however the mutual dependence of both maps, and how to estimate them when none is known initially. We introduce a logarithmic scale space generated by the trace of Structure Tensor to study the relationship. The scale space is non-linear and absolute frequency estimation is reduced to an orientation estimation in it. We show that this offers significant advantages, including construction of efficient estimation methods, using Structure Tensor yielding dense maps of absolute frequency as well as orientation. In fingerprints, both maps can successively improve each other, combined in an image enhancement scheme via Gabor filtering. We verify that the suggested method compares favorably with state of the art, using forensic fingerprints recognition as test bed, and using test images where the ground truth is known. Furthermore, we suggest a novel continuous ridge counting method, relying only on dense absolute frequency and orientation maps, without ridge detection, thinning, etc. We present new evidence that the neighborhoods of the absolute frequency map are useful attributes of minutiae. In experiments, we use public data sets to support the conclusions.

    Download full text (pdf)
    fulltext
  • 224.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Mikaelyan, Anna
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Frequency map by Structure Tensor in Logarithmic Scale Space and Forensic Fingerprints2016In: PROCEEDINGS OF 29TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, (CVPRW 2016), Piscataway, NJ: IEEE, 2016, p. 204-213, article id 7789522Conference paper (Refereed)
    Abstract [en]

    Increasingly, absolute frequency and orientation maps are needed, e.g. for forensics. We introduce a non-linear scale space via the logarithm of trace of the Structure Tensor. Therein, frequency estimation becomes an orientation estimation problem. We show that this offers significant advantages, including construction of efficient isotropic estimations of dense maps of frequency. In fingerprints, both maps are shown to improve each other in an enhancement scheme via Gabor filtering. We suggest a novel continuous ridge counting method, relying only on dense absolute frequency and orientation maps, without ridge detection, thinning, etc. Furthermore, we present new evidence that frequency maps are useful attributes of minutiae. We verify that the suggested method compares favorably with state of the art using forensic fingerprints as test bed, and test images where the ground truth is known. In evaluations, we use public data sets and published methods only.

  • 225.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Smeraldi, FabrizioHalmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Audio- and Video-Based Biometric Person Authentication: Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6–8, 2001 Proceedings2001Conference proceedings (editor) (Other academic)
    Abstract [en]

    This book constitutes the refereed proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2001, held in Halmstad, Sweden in June 2001.The 51 revised papers presented together with three invited papers were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on face as biometrics; face image processing; speech as biometrics and speech processing; fingerprints as biometrics; gait as biometrics; and hand, signature, and iris as biometrics.

  • 226.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Teferi, Dereje
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Damascening video databases for evaluation of face tracking and recognition – The DXM2VTS database2007In: Pattern Recognition Letters, ISSN 0167-8655, E-ISSN 1872-7344, Vol. 28, no 15, p. 2143-2156Article in journal (Refereed)
    Abstract [en]

    Performance quantification of biometric systems, such as face tracking and recognition highly depend on the database used for testing the systems. Systems trained and tested on realistic and representative databases evidently perform better. Actually, the main reason for evaluating any system on test data is that these data sets represent problems that systems might face in the real world. However, building biometric video databases with realistic background for testing is expensive especially due to its high demand of cooperation from the side of the participants. For example, XM2VTS database contain thousands of video recorded in a studio from 295 subjects. Recording these subjects repeatedly in public places such as supermarkets, offices, streets, etc., is not realistic. To this end, we present a procedure to separate the background of a video recorded in studio conditions with the purpose to replace it with an arbitrary complex background, e.g., outdoor scene containing motion, to measure performance, e.g., eye tracking. Furthermore, we present how an affine transformation and synthetic noise can be incorporated into the production of the new database to simulate natural noise, e.g. motion blur due to translation, zooming and rotation. The entire system is applied to the XM2VTS database, which already consists of several terabytes of data, to produce the DXM2VTS–Damascened XM2VTS database essentially without an increase in resource consumption, i.e., storage, bandwidth, and most importantly, the time of clients populating the database, and the time of the operators.

  • 227.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Verikas, AntanasHalmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Proceedings SSBA '09: Symposium on Image Analysis, Halmstad University, Halmstad, March 18-20, 20092009Conference proceedings (editor) (Other academic)
  • 228.
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A preliminary study of wireless body area networks2008Report (Other academic)
    Abstract [en]

    The purpose of this preliminary study is to introduce wireless body area networks (WBAN) to the reader but also to give an understanding of what possibilities and challenges there are when using short range wireless communication in this domain. Up to date, there is no standard specifically intended for low-power WBANs thus a developer is referred to use proprietary solutions which could be demanding to compare and choose. This study tries to provide the reader with the knowledge about important parameters in low-power sensor networks. Energy consumption is the really weak part of a wireless sensor network since the transceiver and other hardware equipment still drain batteries. For example the startup time for a transceiver that has been in power-down mode could consume as much as three times the energy

    as compared when sending the actual bits that invoked the transceiver in first place. The actual application must be the one driving the requirements on the communication. However, the application must be designed with for example the startup time in mind. A sensor network is a true cross-layer design problem where many different areas must meet such as hardware designers, application developers and communication people.

    Download full text (pdf)
    FULLTEXT01
  • 229.
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A survey regarding wireless communication standards intended for a high-speed vehicle environment2007Report (Other academic)
    Abstract [en]

    The high velocities and dynamic conditions that a vehicular environment represents introducenew and demanding challenges in the area of wireless communication. Vehicle Alert System(VAS) is a research project at Halmstad University, Sweden, focusing on reliable wirelessvehicle communication. Typical examples of applications for a vehicle alert system are pre-crash warning, communicating slippery road conditions, emergency vehicle routing etc. InVAS a set of application scenarios have been chosen specifically to illustrate as manyinteresting research aspects of a vehicle alert system as possible. The chosen scenarios includeboth vehicle-to-vehicle and vehicle-to-infrastructure communications. Research is conductedon all layers of the communication stack relevant for a vehicle alert system – application,network, data link and the physical layer. From a communication perspective a vehicle alertsystem is characterized by short event-driven control messages that have to be receivedwithout errors in time. This implies that different coding strategies, diversity andretransmission schemes must be used to achieve correctness and robustness against theimpairments of the wireless channel.

    This survey presents and discusses different wireless communication standards as well asproprietary solutions that are intended especially for a high-speed vehicular environment. Since VAS is aiming for real-time wireless communication, the examined standards will beevaluated accordingly. Real-time communication implies that there is an upper bound on thecommunication delay such that if the data never reaches its intended recipient before a certaindeadline this will have a more or less negative impact on the system performance. One of themost important features of a real-time communication system (and perhaps even more crucialin a wireless high-speed vehicular environment) is the medium access method. If it is notdeterministic (i.e., if there exists no upper bound on the delay before a station gets access tothe wireless channel) it is not possible to give guarantees about meeting the deadlines.All currently existing standards, draft specifications and proprietary solutions with explicitintention for being used in a vehicular environment are covered in this survey. In preparationof this document the standard/draft documents themselves have been studied and forproprietary solutions the respective company’s home pages and in some cases articles havebeen used for collecting information. One of the currently most discussed standards is thedraft IEEE 802.11p which has been thoroughly studied here. It inherits features from theQuality of Service amendment IEEE 802.11e and the physical layer supplement IEEE802.11a. The full protocol suite WAVE, also developed by IEEE, incorporates the 802.11p.Other standards, drafts and proprietary solutions that have been studied are IEEE 802.16,IEEE 802.20, flash-OFDM, national DSCR systems, CALM and IEEE 802.21. These systemsrange from being simple RFID-look-a-like DSRC systems to more advanced centralized WMAN standards. It can be concluded that none of the standards or proprietary solutions described in this surveyis suitable for applications such as those considered in the VAS research project. Within thedifferent standards there certainly are features suitable for a vehicle alert system but nostandard totally fit the requirements of VAS. One lacking feature common for all standardsinvestigated is the ability of providing deterministic medium access for vehicle-to-vehiclecommunication.

    Download full text (pdf)
    FULLTEXT01
  • 230.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Böhm, Annette
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Lidström, Kristoffer
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Strandén, Lars
    SP Technical Research Institute of Sweden, Borås, Sweden.
    Zakizadeh, Hossein
    Volvo Technology Corporation, Göteborg, Sweden .
    Vehicle Alert System2007In: Proceedings of 14th world congress on intelligent transport system (ITS), 2007, p. 2-9Conference paper (Refereed)
    Abstract [en]

    The Vehicle Alert System (VAS) project focuses on cooperative alert services based on timely and reliable communication under the challenging circumstances pertaining to a highly mobile vehicular network. Through a cross-layer design, we gain the flexibility needed to adapt the system to the individual requirements of three chosen application scenarios that represent different situations where cooperation between vehicles can make a significant impact. The VAS project is a collaboration involving academic as well as industrial partners and the final stage of the project is a demonstrator that implements results from the research.

    Download full text (pdf)
    fulltext
  • 231.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Böhm, Annette
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Lidström, Kristoffer
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Report on the Collaboration between CVIS and CERES in the Project Vehicle Alert System (VAS)2009Report (Other academic)
    Abstract [en]

    In March 2007, an agreement was made for interchange of experiences between CVIS and the Centre for Research on Embedded Systems (CERES) at Halmstad University in Sweden. The majority of the work relating to this collaboration has been conducted within the CERES project Vehicle Alert System (VAS), aiming to use vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to provide different types of warning messages. The main focus of the VAS project is on communication and in particular the lower layers of the communication stack are investigated. VAS involves academic researchers from Halmstad University as well as researchers from Volvo Technology, SP Technical Research Institute of Sweden and the company Free2move. This report presents the results of the VAS project, its publications, and other issues of interest both to the CVIS consortium as well as a broader scope.

    Download full text (pdf)
    FULLTEXT01
  • 232.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Medium access control in vehicular networks based on the upcoming IEEE 802.11p standard2008In: World Congress on Intelligent Transport Systems (ITS), 2008, World Congress on ITS , 2008, p. 12-Conference paper (Refereed)
    Abstract [en]

    In this paper, initial simulations are presented showing that the upcoming IEEE 802.11p standard is not suitable for traffic safety applications requiring reliable, low delay communication between vehicles. The medium access control procedure is one of the most important parts in the design of delay-constrained communication systems, and emerging vehicle safety applications put new stringent demands on timely and reliable delivery of data packets. The medium access procedure used in 802.11p is carrier sense multiple access, which is inherently unsuitable for time-critical data traffic since it is contention-based and cannot provide a finite upper bound on the time to channel access. The simulation results indicate that with IEEE 802.11p, channel access cannot be granted in a manner that is sufficiently predictable to support reliable, low-delay communications between vehicles on a highway.

    Download full text (pdf)
    FULLTEXT01
  • 233.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication2008In: 68th IEEE Vehicular Technology Conference, 2008. VTC 2008-Fall: IEEE Vehicular Technology Conference (VTC) (2008), Piscataway, N.J.: IEEE Press, 2008, p. 1-5Conference paper (Refereed)
    Abstract [en]

    In this paper the medium access control (MAC) method of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes listen to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for time critical communications. The simulation results reveal that a specific node/vehicle is forced to drop over 80% of its heartbeat messages because no channel access was possible before the next message was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic between vehicles. This MAC method is already successfully applied in commercial surveillance applications for ships (AIS) and airplanes (VDL mode 4). Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad hoc vehicular networks.

    Download full text (pdf)
    FULLTEXT01
  • 234.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the 802.11p MAC method and STDMA to support real-time vehicle-to-vehicle communications2009In: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, Vol. 2009, no 902414, p. 1-14Article in journal (Refereed)
    Abstract [en]

    Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the intelligent transportation systems (ITS) sphere. Many of these new applications require real-time communication with high reliability, meaning that packets must be successfully delivered before a certain deadline. Applications with early deadlines are expected to require direct V2V communications, and the only standard currently supporting this is the upcoming IEEE 802.11p, included in the wireless access in vehicular environment (WAVE) stack. To meet a real-time deadline, timely and predictable access to the channel is paramount. However, the medium access method used in 802.11p, carrier sense multiple access with collision avoidance (CSMA/CA), does not guarantee channel access before a finite deadline. In this paper, we analyze the communication requirements introduced by traffic safety applications, namely, low delay, reliable, real-time communications.We show by simulation of a simple, but realistic, highway scenario, that vehicles using CSMA/CA can experience unacceptable channel access delays and, therefore, 802.11p does not support real-time communications. In addition, we present a potential remedy for this problem, namely, the use of self-organizing time division multiple access (STDMA). The real-time properties of STDMA are investigated by means of the same highway simulation scenario, with promising results.

    Download full text (pdf)
    FULLTEXT01
  • 235.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers, Gothenburg.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the IEEE 802.11p and STDMA to provide predictable channel access2009In: Proceedings of the 16th World Congress on Intelligent Transport Systems (ITS), 2009, p. 10-Conference paper (Refereed)
    Abstract [en]

    Emerging traffic safety applications requiring low delay communications will need vehicle ad-hoc networks. The only communication standard currently supporting this is IEEE 802.11p. However, 802.11p uses the medium access method CSMA/CA, which has a major drawback: unbounded worst case channel access delay. We therefore propose an algorithm already in commercial use in the shipping industry: STDMA. With STDMA, nodes always get predictable channel access regardless of the number of competing nodes and the maximum delay is deterministic. In this paper we elaborated with different parameter settings for the two protocols with the aim of improving performance without altering the standards.

     

    Download full text (pdf)
    FULLTEXT01
  • 236.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bluetooth and Wireless Multihop Networks in Industrial Communication Systems2008Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The objective of this thesis is to investigate the use of short-range wireless communication technology in industrial communication systems where there is a need for guaranteed timely delivery of correct information. Methods for achieving such capability are developed in the context of the physical layer, the data link layer and the application layer. Based on the insight that it is impossible to achieve strict determinism in a wireless communication system, a probabilistic definition of hard real-time systems is suggested, and thus a guarantee is given in the form of the probability of fulfilling a certain goal. Since a wireless channel is time variant, it is also necessary to continuously keep track of available resources. Allocation and link management methods for wireless communication systems therefore need to be dynamic and of an online character. An exhaustive resource allocation method with redundancy is first proposed for single message delivery and then extended for the operation of a single Bluetooth piconet. However, many devices in an industrial automation system have limited computational resources, especially if wireless sensors/actuators powered by battery or wireless power are considered. This implies that methods used for resource allocation must be of low computational complexity. The complexity issue becomes evident when large systems are implemented, even if each individual sensor generates small amounts of data. The upstream and downstream flows of data grow rapidly in a hierarchical system with many sub-systems, sensors and actuators. It is empirically shown that the aggregated data flow in a monitoring system requires powerful communication nodes already at low levels in the industrial communication hierarchy. A predictable system requires that representative entities for the available resources are defined. In a communication system with a single broadcast domain, such as a single Bluetooth piconet, the resource space is often limited to the time domain. When a multihop wireless network with multiple broadcast domains is considered, the spatial domain is added as an available resource and, if a multi-channel radio transceiver is used, the frequency is also added as an available resource domain. These three domains represent the physical resource space that is available for a wireless multihop network. These are subject to trade-off in all of the three lowest protocol layers, and one of the most challenging problems in the design of a wireless multihop network is how to achieve efficient sharing of these resources. This problem is addressed by proposing a clustered architecture based on a dual-radio node that enables dynamic use of these resource domains.

  • 237.
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Design Space Exploration of Wireless Multihop Networks2005Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis explores the feasible design space of wireless multihop networks and identifies fundamental design parameters. In the process of exploring it is important to ignore all details and instead take a holistic view. This means that all protocol details are overseen, all details of radio wave propagation models are overseen and the system is modelled strictly on an architectural level. From a theoretical information perspective, there is a limit to the capacity that a certain bandwidth and a certain signal-to-noise ratio at the receiver can provide. This limit is approximated as a volume in the time-frequency-space domain. A single transmission is represented as an occupied volume in this domain. A wireless multihop network covers a spatial area, and the question is how multiple numbers of transmission volumes can be fit into a given limited spatial area. This volume fitting should be done in order to maximize the overall performance or to trade available resources to favour a specific characteristic in the wireless multihop network. The volume model is used for the design space exploration of a wireless multihop network. It is argued that the fault tolerance and the energy gain achieved in a multihop topology are its strength as compared to a single-hop architecture. It is further shown that the energy gain is achieved at the expense of delay and a greater end-to-end error probability. This indicates that these parameters must be very carefully balanced in order to gain in the global overall performance perspective. It can further be concluded that the overall spatial capacity is increased as a result of the spatial channel reuse in a multihop topology. On the other hand, it is also shown that the multihop topology introduces a rather stringent geometrical capacity limitation when the number of nodes of a wireless multihop network is increased. The dynamics (e.g. node mobility, changing radio channels etc.) of a large scale wireless multihop network is also a limiting factor. The nodes’ mobility creates a knowledge horizon beyond which very little can be known about the present network topology.

  • 238.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    The use of clustered wireless multihop networks in industrial settings2007In: ETFA 2007: IEEE Conference on Emerging Technologies and Factory Automation, Vols 1-3, Piscataway, NJ: IEEE Press, 2007, p. 211-218Conference paper (Refereed)
    Abstract [en]

    This paper suggests a cluster collision avoidance mechanism and a dual transceiver architecture to be used in a clustered wireless multihop network. These two contributions make the clustered wireless multihop network the preferred architecture for future industrial wireless networks. The wireless multihop cluster consists of one master and several slaves, where some of the slaves will act as gateways between different clusters. Frequency hopping spread spectrum is used on a cluster level and to avoid frequency collisions between clusters a "neighbor cluster collision avoidance mechanism" is proposed and evaluated through simulations. To break up the dependence between the clusters, introduced by the gateway nodes, each node is equipped with two transceivers. The paper is concluded with a suggestion to use a clustered wireless multihop network with orthogonal hopping sequences for an industrial setting.

    Download full text (pdf)
    FULLTEXT01
  • 239.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Using Dual-Radio Nodes to Enable Quality of Service in a Clustered Wireless Mesh Network2006In: IEEE Conference on Emerging Technologies and Factory Automation, 2006. ETFA '06, Piscataway, N.J.: IEEE Press, 2006, p. 54-61Conference paper (Refereed)
    Abstract [en]

    In this paper some well established wireless technologies are merged into a new concept solution for a future industrial wireless mesh network. The suggested clustered wireless mesh network can handle probabilistic quality of service guarantees and is based on a dual-radio node architecture using synchronized frequency hopping spread spectrum Bluetooth radios. The proposed architecture gives a heuristic solution to the inter-cluster scheduling problem of gateway nodes in clustered architectures and breaks up the dependence between the local medium access schedules of adjacent clusters. The dual-radio feature also enables higher network connectivity, implying, for example, that a higher link redundancy can be achieved.

    Download full text (pdf)
    FULLTEXT01
  • 240.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    The next challenge for the communication society: co-operating embedded systems2003Conference paper (Refereed)
    Download full text (pdf)
    FULLTEXT01
  • 241.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Parsapoor, Mahboobeh
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Framework and Architecture for a Cognitive Manager Based on a Computational Model of Human Emotional Learning2013In: Proceedings of SDR-WInnComm-Europe 2013: Wireless Innovation European Conference on Wireless Communications Technologies and Software Defined Radio / [ed] Lee Pucker, Kuan Collins & Stephanie Hamill, 2013, p. 64-72Conference paper (Refereed)
    Abstract [en]

    In this paper we propose an architecture for a cognitive engine that is based on the emotional learning cycle instead of the traditional cognitive cycle. The cognitive cycle that traditionally has been used as reference for cognitive radio is on the basis of the Unified Theories of Cognition (UTC) to model rational decision making in humans. UTC represents a rational goal-oriented decision-action made by an intelligent agent. However, the emotional cycle represents an emotional reaction-oriented cycle instead. These two models differ in function and structure of learning, decision making and optimization. In this work the structure of these two learning cycles are compared and a computational model for artificial emotional learning based engine is suggested.

    Download full text (pdf)
    fulltext
  • 242.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Stranne, Frida
    Halmstad University, School of Education, Humanities and Social Science, Centrum för lärande, kultur och samhälle (CLKS). The Swedish Institute for North American Studies (SINAS), Uppsala University, Uppsala, Sweden.
    Peace in Cyberspace Will Not Take Place2016Conference paper (Refereed)
    Abstract [en]

    The ongoing debate whether cyberwar exists or not is odd and to large extent based on an Industrial age view of the definition of war. The ongoing digital revolution ends the industrial age and it was in the context of the industrial age that the Clausewitzian theories of war were defined. The industrial age was built upon machines and physical objects, and the theories of war in this era were also based on these elements. However, when the importance of physical values is vanishing and replaced by other values, as information and knowledge, the fundamental elements of war in the industrial age becomes week. An extension of the theories of war in the information age is that destruction of digital assets is representing the same element of violence, if it potentially cripples an enemy to defeat. When a society’s valuable assets are in the digital form and not necessarily even present within the geographical area of a sovereign state one maybe have to reconsider the understanding of war. This paper explores the discourse framing war in the information age, and conducts a discussion on how to define peace and war in cyberspace, especially in the context of digital violence.

  • 243.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Free2move AB.
    An architecture comparison between a wireless sensor network and an active RFID system2004In: The 29th Annual IEEE International Conference on Local Computer Networks, 2004, IEEE, 2004, p. 583-584Conference paper (Refereed)
    Abstract [en]

    In This work a new hardware platform for active RFID and wireless sensor network is presented. Furthermore a comparison of these two architectures is performed, i.e., the singlehop and the multihop architecture. The comparison reveals important issues regarding the utilization and energy consumption for the singlehop as well as for the multihop architecture.

    Download full text (pdf)
    FULLTEXT01
  • 244.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    An Implementation of a 3-tier Hierarchical Wireless Sensor Network2006In: 2006 IEEE International Conference on Industrial Informatics, Piscataway, N.J.: IEEE Press, 2006, p. 138-143Conference paper (Refereed)
    Abstract [en]

    In this paper an implementation of a wireless sensor network is described. The aim with the implementation is to investigate if present design patterns are applicable on wireless sensor networks. A 3-tier model is adopted as a possible candidate for the software as well as for the network architecture. The implemented wireless sensor network consists of a heterogeneous set of hardware devices such as sensors, sensor hubs, beepers, PDAs and connectors. Most of the hardware components are COTS and most of the software is GNU licensed. All these form a 3-tier hierarchical network architecture.

    Download full text (pdf)
    FULLTEXT01
  • 245.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bluetooth in industrial environment2000In: 2000 IEEE International Workshop on Factory Communication Systems: proceedings : 6-8 September, 2000, ISEP, Porto, Portugal / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2000, p. 239-246Conference paper (Refereed)
    Abstract [en]

    In this paper an initial study of the use of Bluetooth in industrial environment is presented. The tests have been performed at a paper-mill, and in an office environment at Halmstad University. It shows the possibility to use Bluetooth for wireless short range communication in an industrial environment.

  • 246.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Routing protocol for wireless real-time multihop networks1999Conference paper (Refereed)
  • 247.
    Bin Ali, Nauman
    et al.
    Blekinge Institute of Technology, Karlskrona, Sweden.
    Engström, Emelie
    Lund University, Lund, Sweden.
    Taromirad, Masoumeh
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Mousavi, Mohammad Reza
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). University Leicester, Leicester, United Kingdom.
    Minhas, Nasir Mehmood
    Blekinge Institute of Technology, Karlskrona, Sweden.
    Helgesson, Daniel
    Lund University, Lund, Sweden.
    Kunze, Sebastian
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Varshosaz, Mahsa
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    On the search for industry-relevant regression testing research2019In: Journal of Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 24, no 4, p. 2020-2055Article in journal (Refereed)
    Abstract [en]

    Regression testing is a means to assure that a change in the software, or its execution environment, does not introduce new defects. It involves the expensive undertaking of rerunning test cases. Several techniques have been proposed to reduce the number of test cases to execute in regression testing, however, there is no research on how to assess industrial relevance and applicability of such techniques. We conducted a systematic literature review with the following two goals: firstly, to enable researchers to design and present regression testing research with a focus on industrial relevance and applicability and secondly, to facilitate the industrial adoption of such research by addressing the attributes of concern from the practitioners' perspective. Using a reference-based search approach, we identified 1068 papers on regression testing. We then reduced the scope to only include papers with explicit discussions about relevance and applicability (i.e. mainly studies involving industrial stakeholders). Uniquely in this literature review, practitioners were consulted at several steps to increase the likelihood of achieving our aim of identifying factors important for relevance and applicability. We have summarised the results of these consultations and an analysis of the literature in three taxonomies, which capture aspects of industrial-relevance regarding the regression testing techniques. Based on these taxonomies, we mapped 38 papers reporting the evaluation of 26 regression testing techniques in industrial settings. © The Author(s) 2019

  • 248.
    Binotto, Alécio P. D.
    et al.
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Freitas, Edison Pignaton
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Götz, Marcelo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Pereira, Carlos E.
    Informatics Institute, Federal University of Rio Grande do Sul, Brazil.
    Stork, André
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Dynamic Self-Rescheduling of Tasks over a Heterogeneous Platform2008In: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, Los Alamitos, Calif.: IEEE Computer Society, 2008, p. 253-258Conference paper (Refereed)
    Abstract [en]

    Modern applications require powerful high-performance platforms to deal with many different algorithms that make use of massive calculations. At the same time, low-cost and high-performance specific hardware (e.g., GPU, PPU) are rising and the CPUs turned to multiple cores, characterizing together an interesting and powerful heterogeneous execution platform. Therefore, self-adaptive computing is a potential paradigm for those scenarios as it can provide flexibility to explore the computational resources on heterogeneous cluster attached to a high-performance computer system platform. As the first step towards a run-time reschedule load-balancing framework targeting that kind of platform, application time requirements and its crosscutting behavior play an important role for task allocation decisions. This paper presents a strategy for self-reallocation of specific tasks, including dynamic created ones, using aspect-oriented paradigms to address non-functional application timing constraints in the design phase. Additionally, as a case study, a special attention on Radar Image Processing will be given in the context of a surveillance system based on Unmanned Aerial Vehicles (UAV).

  • 249.
    Binotto, Alécio Pedro Delazari
    et al.
    Informatics Institute, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Informatics Institute, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pereira, Carlos Eduardo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Towards Dynamic Task Scheduling and Reconfiguration using an Aspect Oriented Approach applied on Real-time concerns of Industrial Systems2009In: Elsevier IFAC Publications / IFAC Proceedings series, ISSN 1474-6670, Vol. 13, no PART 1, p. 1423-1428Article in journal (Refereed)
    Abstract [en]

    High performance computational platforms are required by industries that make use of automatic methods to manage modern machines, which are mostly controlled by high-performance specific hardware with processing capabilities. It usually works together with CPUs, forming a powerful execution platform. On an industrial production line, distinct tasks can be assigned to be processed by different machines depending on certain conditions and production parameters. However, these conditions can change at run-time influenced mainly by machine failure and maintenance, priorities changes, and possible new better task distribution. Therefore, self-adaptive computing is a potential paradigm as it can provide flexibility to explore the machine resources and improve performance on different execution scenarios of the production line. One approach is to explore scheduling and run-time task migration among machines’ hardware towards a balancing of tasks, aiming performance and production gain. This way, the monitoring of time requirements and its crosscutting behaviour play an important role for task (re)allocation decisions. This paper introduces the use of software aspect-oriented paradigms to perform machines’ monitoring and a self-rescheduling strategy of tasks to address nonfunctional timing constraints. As case study, tasks for a production line of aluminium ingots are designed. © 2009 IFAC.

  • 250.
    Binotto, A.P.D.
    et al.
    Fraunhofer IGD / TU Darmstadt, Germany.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Pereira, Carlos Eduardo
    PPGC UFRGS, Brazil.
    Stork, André
    Fraunhofer IGD / TU Darmstadt, Germany.
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Real-time task reconfiguration support applied to an UAV-based surveillance system2008In: 2008 International Multiconference on Computer Science and Information Technology (Imcsit) / [ed] Ganzha, M, Piscataway, N.J.: IEEE Press, 2008, p. 581-588Conference paper (Refereed)
    Abstract [en]

    Modern surveillance systems, such as those based on the use of Unmanned Aerial Vehicles, require powerful high- performance platforms to deal with many different algorithms that make use of massive calculations. At the same time, low- cost and high-performance specific hardware (e.g., GPU, PPU) are rising and the CPUs turned to multiple cores, characteriz- ing together an interesting and powerful heterogeneous execu- tion platform. Therefore, reconfigurable computing is a poten- tial paradigm for those scenarios as it can provide flexibility to explore the computational resources on heterogeneous cluster attached to a high-performance computer system platform. As the first step towards a run-time reconfigurable workload bal- ancing framework targeting that kind of platform, application time requirements and its crosscutting behavior play an impor- tant role for task allocation decisions. This paper presents a strategy to reallocate specific tasks in a surveillance system composed by a fleet of Unmanned Aerial Vehicles using aspect- oriented paradigms in order to address non-functional applica- tion timing constraints in the design phase. An aspect support from a framework called DERAF is used to support reconfigu- ration requirements and provide the resource information needed by the reconfigurable load-balancing strategy. Finally, for the case study, a special attention on Radar Image Process- ing will be given.

    Download full text (pdf)
    fulltext
2345678 201 - 250 of 1796
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf