Endre søk
Begrens søket
23456 201 - 250 of 298
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 201.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Countering agent security vulnerabilities using an extended SENSE schema2004Inngår i: IEEE/WIC/ACM International Conference on Intelligent Agent Technology: IAT 2004. Proceedings / [ed] Ning Zhong, Los Alamitos, Calif: IEEE Computer Society Press , 2004, s. 183-189Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to detect code-tampering attacks made by malicious entities. While describing the security schema, the paper details some scenarios that make the agent vulnerable to malicious attacks. The paper also proposes an extension to the original schema enabling it to cover another security vulnerability in agent operation.

  • 202.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Countering security vulnerabilities in agent execution using a self executing security examination2004Inngår i: AAMAS'2004: proceedings of the Third International Joint Conference on Autonomous agents and multiagent systems, New York City, New York, USA, 19-23 July 2004 / [ed] Nicholas R. Jennings; Carles Sierra; Liz Sonenberg, New York: ACM Digital Library, 2004, Vol. 3, s. 1486-1487Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The paper describes the evolution and implementation of a self-executing security examination (SENSE) for agents executing in non-trusted domains. It outlines the shortcomings of some of the existing agent security schemas. To meet these shortcomings, the paper proposes the implementation of SENSE as a reliable method for detecting a malicious action attempted on an executing agent at run-time. The incorporation of SENSE into its normal processing operation will make the agent self-reliant with respect to its security function and allow it to confidently execute in an alien environment, without having to depend on an external support for security. To build a strong case for its adoption, the paper elaborates the ease of operation, simplicity and efficiency of the schema.

  • 203.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities2004Inngår i: Proceedings of the 1st International Workshop on Safety and Security in Multi-Agent Systems: SASEMAS 2004, 2004, s. 85-101Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper examines the security vulnerabilities faced by agent communities implemented using agent and multi-agent systems. It attempts to define security from an agent as well as from an agent community perspective. To preserve the integrity and sanctity of the community model, it proposes the use of a shared-security schema. This schema distributes the security function of the community among all valid members. The advantage of this schema is that one or more valid agent community members scrutinize the integrity of every agent. All agents are in turn subject to an integrity check. This chain-reaction approach helps in mitigating the risk of malicious attacks from other agents and entities external to the community.

  • 204.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Evaluating security in software agent systems using a security analysis tool2003Inngår i: Proceedings of the 1st Australian Information Security Management Conference: InfoSec 2003, Edith Cowan University , 2003Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper exposes different security threats posed to information in software agent systems. It describes various scenarios in which security can be compromised and highlights the requirements of a standard security-testing environment. This environment is generated using a Security Analysis Tool (SAT) proposed and described in this paper. The tool also fills in the requirement of a much-needed benchmarking function for the security implementations of different mobile agent systems.

  • 205.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Securing m>Business scenarios using the buddy model of security for agent communities2004Inngår i: M-business 2004: uncovering the next waves - major opportunities and the essential lessons; the Third International Mobile Business Conference (ICMB); July 12 - 13, 2004, Roosevelt Hotel, NYC / [ed] M. Horwitch, New York: Institute for Technology and Enterprise, Polytechnic University , 2004, s. 1-12Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The paper describes m-commerce application scenarios implemented using mobile agents. It describes the applicability of agents in these pervasive scenarios and lists the advantages of an agent based business model as compared to other architectures. Further, the paper examines the security vulnerabilities that arise within the dynamic scenarios generated by the business model. To counter these vulnerabilities, the Buddy model of security for agent communities is proposed and its implementation and suitability for the business models discussed.

  • 206.
    Page, John
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Indrawan, Maria
    Monash University, Melbourne, VIC.
    Security aspects of software agents in pervasive information systems2003Inngår i: Proceedings of the 14th Australasian Conference on Information Systems: ACIS 2003, Edith Cowan University , 2003Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper discusses vulnerabilities of mobile agent based information systems and calls for an increased level of security awareness, which can be achieved by employing self-reliant security features. The paper describes an IS realised as a multi-agent architecture. For a secure channel to exist within the IS, the use of indicator digests reduces the risk of exposing sensitive information to malicious objects. These solutions add to the underlying layer of security offered by the execution environment and work as plug-ins. This enables them to seamlessly integrate with the system they are protecting and to be transparent to the application user.

  • 207. Patara-Atikom, Wasan
    et al.
    Prathombutr, Passakon
    Raphiphan, Panraphee
    Zaslavsky, Arkady
    Distributed context aware system for travel time estimation based on cellular probes in metropolitan environment2007Inngår i: Proceedings of the 2007 ECTI International Conference / [ed] Wanlop Surakampontorn, Mae Fah Luang University , 2007Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Travel time estimation is an important component of Intelligent Transportation System (ITS). Many techniques for estimating travel time on various routes based on different types of sensors were proposed. In the past, stationary sensors were more popular, but they came with inflexibility, extra investment, and disruption to traffic flow during installation and maintenance. Global Positioning System (GPS) devices can also be used as mobile sensors but the signal penetration can be limited in the city environment. In this paper, we propose architecture of a context aware system for travel time estimation based on cellular probes in city environment. A cellular probe technique is our preference since necessary infrastructure is already in place without the weaknesses of stationary sensor techniques and GPS devices. The context analysis module in our system helps eliminate unrelated cellular probes from input data. Traffic data delivery methods are also discussed. Our system is very helpful for routes selection especially in the metropolitan area. The architecture of our system is open, flexible, extensible, and it can develop an evolutionary.

  • 208.
    Pedro, J. San
    et al.
    Monash University, Melbourne, VIC.
    Burstein, F.
    Monash University, Melbourne, VIC.
    Wassertheil, J.
    Monash University, Melbourne, VIC.
    Arora, N.
    Monash University, Melbourne, VIC.
    Churilov, L.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    On development and evaluation of prototype mobile decision support for hospital triage2005Inngår i: Proceedings of the 38th Annual Hawaii International Conference on System Sciences: 3 - 6 January 2005, Big Island, Hawaii, [Hilton Waikoloa] ; abstracts and CD-ROM of full papers / [ed] Ralph H. Sprague, Los Alamitos, Calif: IEEE Communications Society, 2005Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Ambiguous triage scenarios in hospital emergency departments are often difficult to assess without decision support. Subjective assessments of such scenarios can either lead to under-triaging or over-triaging for which true conditions of patients are often not addressed within the required time. In this paper, we propose a decision support model that can guide a clinician when identifying the urgency of medical intervention when patient presents with ambiguous triage case. Our model is a heuristic approach that selects the best triage category, identifies corresponding discriminating attribute of the patient, and allows clinician to attach a level of confidence in the decision. We implemented this model as a mobile decision support system, called iTriage. Results of an initial evaluation of iTriage using fourteen paper-based adult triage scenarios showed that our model produced robust decisions for urgent scenarios. For non-urgent scenarios, the proposed model provided guidance especially when the scenarios were ambiguously stated.

  • 209. Pedro, J.C. San
    et al.
    Burstein, F.V.
    Zaslavsky, Arkady
    An approach to sensitivity analysis for data quality assessment in mobile decision-making2003Inngår i: Proceedings of the 7th International Conference of the International Society for Decision Support Systems: ISDSS'03 / [ed] T. Bui; H. Sroka; S. Stanek; J. Gotuchowski, 2003, s. 323-332Konferansepaper (Fagfellevurdert)
  • 210.
    Pedro, Jocelyn San
    et al.
    Monash University, Melbourne, VIC.
    Burstein, Frada
    Monash University, Melbourne, VIC.
    Cao, Patrick
    Monash University, Melbourne, VIC.
    Churilov, Leonid
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Wassertheil, Jeff
    Monash University, Melbourne, VIC.
    Mobile decision support for triage in emergency departments2004Inngår i: Decision Support in an Uncertain and Complex World: Proceedings of the 2004 IFIP WG 8.3 International Conference on Decision Support Systems DSS2004 / [ed] R. Meredith; G. Shanks; D. R. Arnott; S. Carlsson, Monash University , 2004, s. 714-723Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Triage in emergency departments is often complex and subject to conditions of uncertainty. The need for timely and accurate clinical assessment based on restricted and ambiguous information; the need to be consistent with standard triage scale and the stressful environment contribute to complexity and uncertainty of triage decision-making. This paper proposes a model for mobile decision support that aims at assisting the nurse when determining treatment category of a triage patient. Our model integrates soft computing and mobile computing technologies to provide intelligent decision support. The paper describes the model and prototype implementation of the model.

  • 211. Pirotta, Martin
    et al.
    Zaslavsky, Arkady
    Resource billing in mobile agent based heterogeneous distributed information systems2003Inngår i: Proceedings of the 14th Australasian Conference on Information Systems, Edith Cowan University , 2003Konferansepaper (Fagfellevurdert)
  • 212.
    Pradhan, Sunam
    et al.
    School of Information Technology and Mathematical Sciences, University of Ballarat.
    Zaslavsky, Arkady
    A smart proxy for a next generation web services transaction2007Inngår i: 6th IEEE/ACIS International Conference on Computer and Information Science, 2007: ICIS 2007 ; 11 - 13 July 2007, Melbourne, Australia ; in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) ; proceedings / [ed] Roger Y. Lee, Los Alamitos, Calif: IEEE Computer Society Press , 2007, s. 646-651Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, we propose and describe sProxy -- smart proxy, a software tool in Web Services transaction. sProxy acts as a gateway between transaction management systems and Web Services which implements a key abstraction of proxy management systems. This enables to perform transactions in the loosely coupled environment i.e. loose coupling among services. Proxies are useful to invoke Web Services to allow an easy programming model that facilitates the serialization and transmission of service invocations. Our proposed model supports relaxation of traditional ACID properties with existing commit and recovery protocols. The model works on non-ACID type of transactions which encapsulates Web Services. It also uses multithreading proxies to check and update transaction simultaneously. The proposed model solves the current problems with distributed computational activities which involves both transactions and Web Services. The proposed model is more abstract and generic as demonstrated in the paper.

  • 213.
    Pradhan, Sunam
    et al.
    Graduate School of Information Technology and Mathematical Sciences, University of Ballarat.
    Zaslavsky, Arkady
    Tari, Zahir
    School of Computer Science, RMIT University, Melbourne.
    Spring framework in smart proxy transaction model2010Inngår i: 2009 5th International Conference on Next Generation Web Services Practices: (NWeSP 2009) ; Prague, Czech Republic, 9 - 11 September 2009 / [ed] Ajith Abraham, Piscataway, NJ: IEEE Communications Society, 2010, s. 23-28Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper explores adoption of open source application framework in Smart Proxy (sProxy) Transaction model for transaction support. An open source application framework - Spring Framework is plugged into the Smart Proxy (sProxy) Transactional model to support transactional properties. Spring Framework in the sProxy Transaction model increases the transactional interoperability in Web Services context

  • 214.
    Pratistha, Dennis
    et al.
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Zaslavsky, Arkady
    Cuce, Simon
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Dick, Martin
    School of Business Information Technology, RMIT University.
    Improving operational efficiency of web services with mobile agent technology2005Inngår i: IEEE/WIC/ACM International Conference on Intelligent Agent Technology: 19 - 22 Sept. 2005, [Compiègne University of Technology, France] / [ed] Andrzej Skowron, Los Alamitos, Calif: IEEE Computer Society Press , 2005, s. 725-731Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The distributed environment has often been described as unpredictable and variable, thus exposing hosted applications to potential reliability and performance related problems. The Web service architecture lacks support for applications to handle potential problems (including system overloading, insufficient performance, and security threats). This paper proposes and describes an implemented mechanism to address the lack of a formalized infrastructure for handling some of the potential problems, using the mobile agent technology. In particular, we propose a nomadic and adaptive Web service infrastructure, which facilitates applications to autonomously react to operational issues arising during execution. Further, the process of Web service relocation is also demonstrated and implementation has also been discussed.

  • 215.
    Pratistha, Dennis
    et al.
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Zaslavsky, Arkady
    Cuce, Simon
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Dick, Martin
    School of Business Information Technology, RMIT University.
    Performance based cost models for improving web service efficiency through dynamic relocation2005Inngår i: E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005. Proceedings / [ed] Kurt Bauknecht, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2005, s. 248-257Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The performance and quality of a web service are important factors and are expected by parties utilizing the service. This paper proposes and implements a cost efficiency solution to cater for web services in a unique set of situation. The solution is designed for web services that have frequent user groups scattered in various geographic locations, without the existence of access patterns. This optimization solution is developed for the Fluid Infrastructure methodology. Its main emphasis is fundamentally to provide a mechanism that is capable of reacting to various problems (operational and performance related) in an efficient and autonomous manner. Discussions within this paper focus on the algorithms that are used to compute the efficiency metrics and implementation issues of the solution. Further, evaluation of these solutions are also demonstrated and validated

  • 216.
    Pratistha, Dennis
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Dick, Martin John
    Monash University, Melbourne, VIC.
    Cuce, Simon
    Monash University, Melbourne, VIC.
    Nomadic and adaptive web services for mBusiness applications2004Inngår i: M-business 2004: uncovering the next waves - major opportunities and the essential lessons ; the Third International Mobile Business Conference (ICMB) ; July 12 - 13, 2004, Roosevelt Hotel, NYC, New York: Institute for Technology and Enterprise, Polytechnic University , 2004Konferansepaper (Fagfellevurdert)
  • 217.
    Pratistha, I Made (Dennis)
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Fluid: supporting a transportable and adaptive web service2004Inngår i: Applied computing 2004: proceedings of the 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus, March 14 - 17, 2004 / [ed] Hisham M. Haddad, New York: Association for Computing Machinery (ACM), 2004, s. 1600-1606Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Web services introduce new capabilities in the distributed application development model. This model is built on widely used internet standards, thereby presenting interoperability among different platforms. However, there are still several restrictions within the current standards, for instance, lack of the capability to react swiftly given poor-performance or requirements of maintenance on the host that is executing the web service. This paper proposes a nomadic and resource-aware web service framework, which provides the capabilities of migrating a web service to different hosts dynamically and adjusting itself to the available resources of the new host. Therefore, allowing web services to react as a result of run-time requirements and poor-performance of hosts, as well as placing itself closer to the group of clients that frequently accesses the web service for performance enhancement. Such an approach is applicable to ad-hoc networks of individually resource-poor mobile devices. Implementation issues are also discussed and demonstrated.

  • 218.
    Pratistha, I Made (Dennis)
    et al.
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Zaslavsky, Arkady
    Cuce, Simon
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Dick, Martin
    School of Business Information Technology, RMIT University.
    A generic cost model and infrastructure for improving web service efficiency through dynamic relocation2005Inngår i: Proceedings: 2005 IEEE International Conference on Web Services, ICWS 2005 : July 11 - 15, 2005, Orlando, Florida, Los Alamitos, Calif: IEEE Computer Society Press , 2005, Vol. 1, s. 381-388Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The Web service paradigm promotes the delivery of software as a service via the Web, instead of a product to end-users. The increase in assigned responsibilities for supporting organizational operations drives the needs for higher operational efficiencies (i.e. performance and reliability) and flexibilities (i.e. customizations). This paper makes two contributions. An infrastructure to support the development and operation of customized cost model components, used to manage cost efficiency and reliability issues. Secondly, a generic cost model algorithm that can be used as the foundation algorithm for cost model components. Further, the process of Web service relocation is also demonstrated and implementation has also been discussed.

  • 219. Rakotonirainy, A.
    et al.
    Loke, Seng Wai
    Zaslavsky, Arkady
    Towards a mobile enterprise framework2000Inngår i: Proceedings: Academia/Industry Working Conference on Research Challenges '00 : [next generation enterprises: virtual organizations and mobile/pervasive technologies] ; Buffalo, New York, April 27 - 29, 2000, Los Alamitos, Calif: IEEE Communications Society, 2000, s. 233-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The RM-ODP Enterprise Language comprises concepts, rules and structures for the specification of a community, where a community comprises objects (human, software, or combinations thereof) formed to meet an objective. The Enterprise Language focuses on the purpose, scope and policies of the community, where an enterprise policy is a set of rules with a particular objective related to the community's purpose described as obligations, prohibitions, and permissions. In order to enable adaptations of the enterprise's objectives, structure, policies and roles, we are designing a conceptual architecture with a process-oriented view of roles and policy adaptation mechanisms. Mobile enterprise objects interact with the rest of the community via processes called role-proxies

  • 220. Rakotonirainy, A.
    et al.
    Loke, Seng Wai
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Towards multi-agent support for open mobile virtual communities2000Inngår i: Proceedings of the International Conference on Artificial Intelligence: IC-AI 2000 / [ed] H.R. Arabnia, CSREA Press, 2000, Vol. 1, s. 127-133Konferansepaper (Fagfellevurdert)
  • 221.
    Rakotonirainy, Andry
    et al.
    University of Queensland.
    Jaga, Jaga
    University of Queensland.
    Loke, Seng Wai
    RMIT University, Melbourne.
    Zaslavsky, Arkady
    Middleware for reactive components: an integrated use of context, roles, and event based coordination2001Inngår i: Middleware 2001: IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001 Proceedings / [ed] Rachid Guerraoui, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2001, s. 77-98Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The proliferation of mobile devices and new software creates a need for computing environments that are able to react to environmental (context) changes. To date insufficient attention has been paid to the issues of defining an integrated component-based environment which is able to describe complex computational context and handle different types of adaptation for a variety of new and existing pervasive enterprise applications. In this paper a run-time environment for pervasive enterprise systems is proposed. The associated architecture uses a component based modelling paradigm, and is held together by an event-based mechanism which provides significant flexibility in dynamic system configuration and adaptation. The approach used to describe and manage context information captures descriptions of complex user, device and application context including enterprise roles and role policies. In addition, the coordination language used to coordinate components of the architecture that manage context, adaptation and policy provides the flexibility needed in pervasive computing applications supporting dynamic reconfiguration and a variety of communication paradigms

  • 222.
    Ranjan, Rajiv
    et al.
    CSIRO, Australia.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Saha, Suhit
    CSIRO, Australia.
    Georgakopoulos, Dimitrios
    CSIRO, Australia.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Do-it-yourself content delivery network orchestrator2012Inngår i: Web Information Systems Engineering - WISE 2012: 13th International Conference, Paphos, Cyprus, November 28-30, 2012. Proceedings, Piscataway, NJ: Encyclopedia of Global Archaeology/Springer Verlag, 2012, s. 789-791Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Content delivery networks (CDNs) [1] provide fast and reliable content access to the end-users. CDN providers (e.g., Akamai [2]), either own the entire infrastructure or it is outsourced to a single Cloud provider. Content owners (e.g., clients and end-users) need to establish expensive contracts with third party ISPs or CDN providers. Hence, existing CDN services are out of reach for all but large enterprises. Current CDNs do not provide services that allow an end-user to create dynamic content such as combining music videos from an existing content source on the Internet. Finally, the content owners do not have low-level control over the orchestration operations such as, multiple Cloud provider selection and resource management for hosting content. Hence, the content owners are dependent on their CDN providers to perform these operations behind the scene.

  • 223.
    Raphipan, Panraphee
    et al.
    Caulfield School of Information Technology, Monash University.
    Zaslavsky, Arkady
    Prathombutr, Passakon
    National Electronics and Computer Technology Center (NECTEC).
    Meesad, Phayung
    Faculty of Technical Education, King Mongkut's University of Technology North Bangkok.
    Context aware traffic congestion estimation to compensate intermittently avaialble mobile sensors2009Inngår i: Tenth International Conference on Mobile Data Management: systems, services and middleware, 2009: MDM '09 ; 18 - 20 May 2009, Taipei, Taiwan, Piscataway, NJ: IEEE Communications Society, 2009, s. 405-410Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Estimating the degree of traffic congestion at run time is crucially important for intelligent transportation systems (ITS) especially when selecting travel routes. One of the challenges when using a mobile sensor (e.g. mobile phone, GPS) as source of traffic data stems from its mobility. This paper proposes a novel approach to fusing mobile data and an algorithm for traffic congestion estimation to compensate intermittent available mobile sensors. Furthermore, our proposed model is also tolerant to incomplete data and it is open to any type of sensors. This approach differs from other traffic congestion estimation techniques in that it utilizes discoverable context even on sensorless road segments in real time instead of entirely relying on a sensor-based data of observed road segment. Implementation and validation through extensive experimentation with real data confirms feasibility of the proposed approach.

  • 224.
    Raphipan, Panraphee
    et al.
    School of Information Technology, Monash University.
    Zaslavsky, Arkady
    Prathombutr, Passakon
    National Electronics and Computer Technology Center (NECTEC).
    Meesad, Phayung
    Department of Teacher Training in Electrical Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok.
    Overcoming uncertainty of roadside sensors with smart adaptive traffic congestion analysis system2009Inngår i: 2009 IEEE Intelligent Vehicles Symposium: IV ; Xi'an, China, 3 - 5 June 2009, Piscataway, NJ: IEEE Communications Society, 2009, s. 1045-1050Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Real time traffic congestion degree is useful information in assisting decision making of drivers. It can also be a factor for calculating other traffic information. The congestion degree can be usually calculated on the basis of sensors installed along roads. It is possible that the sensory data can be lost due to potentially unreliable communication or faulty sensors, leading to lost of important traffic data. In this paper, we propose both adaptive traffic congestion analysis system architecture as well as a novel traffic congestion estimation algorithm that can compensate missing sensory data. An ability to provide traffic condition of road segments at all time is feasible. Unlike other existing methods, our approach aims not to rely on only traffic data from sensors, but utilize discoverable external context instead. The promising experiment result and analysis are reported in this paper. In addition, the context attribute correlation analysis is also discussed.

  • 225.
    Raphiphan, Panraphee
    et al.
    Caulfield School of Information Technology, Monash University.
    Prathombutr, Passakon
    National Electronics and Computer Technology Center (NECTEC).
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Meesad, Phayung
    Department of Teacher Training in Electrical Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok.
    Real time traffic congestion degree computation for minor sensorless roads using cost efficient context reasoning2010Inngår i: 13th International IEEE Conference on Intelligent Transportation Systems (ITSC): Funchal, Madeira Island, Portugal, 19 - 22 September 2010, Piscataway, NJ, 2010, s. 1741-1746Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Traffic congestion is the cause of pollution and economic loss. The Real time traffic state report can alleviate this problem by assisting drivers for route planning and choosing unblocked roads. More traffic information could lead to more accurate route planning and greater awareness of traffic situations and road conditions for drivers. However, investment into sensor infrastructure for small minor roads is rarely available. In this paper, we present a cost efficient approach to compute real time traffic congestion degrees for non-sensor infrastructure roads, such as small minor roads, based on context fusion and context reasoning method. Our framework intends to utilize real time acquirable context instead of relying on traffic sensory data which made our approach suitable for insufficient sensor infrastructure environment. The evaluation throughout several experimentations conducted in Bangkok has proven the feasibility of our approach. Besides, the experimental result indicated that the methodology of our experiment can be used as an alternative cost efficient tool for infrastructure investment decision making.

  • 226. Rasheed, A.
    et al.
    Zaslavsky, Arkady
    Ensuring database availability in dynamically changing mobile computing environment1996Inngår i: Proceedings / ADC '96, Seventh Australasian Database Conference : 29 - 30 January, 1996, Melbourne, Australia / [ed] Rodney Topor, Australian computer science communications , 1996, s. 100-108Konferansepaper (Fagfellevurdert)
  • 227. Rasheed, A.
    et al.
    Zaslavsky, Arkady
    Transaction model to support disconnected operation in a mobile computing environment1998Inngår i: Proceedings / OOIS '97, 1997 International Conference on Object Oriented Information Systems, 10 - 12 November 1997, Brisbane / [ed] Maria E. Orlowska, London: Encyclopedia of Global Archaeology/Springer Verlag, 1998Konferansepaper (Fagfellevurdert)
  • 228.
    Rasheed, A.
    et al.
    School of Computer Science & Software Engineering, Monash University Melbourne.
    Zaslavsky, Arkady
    Twin-transactions: delayed transaction synchronisation model1998Inngår i: Object oriented technology: workshop reader, workshops, demos, and posters ; proceedings / ECOOP '98, Brussels, Belgium, July 20 - 24, 1998, Encyclopedia of Global Archaeology/Springer Verlag, 1998, s. 63-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In a mobile computing environment, mobile hosts are not available all the time. Due to this reason, mobile computers are usually considered as clients who can connect to different servers and ask for certain services (client-server). To reduce the contention on the narrow bandwidth of the wireless channel, it is suggested to cache part of a database on mobile computers [1]. When a mobile computer also hosts data (or a portion of a data), the data on such hosts will not be available all the time. Replication of such data will make the data available, but will create certain concurrency and consistency problems. The twin-transaction model (TTM) proposes to replicate transaction-processing flow along with data items stored on mobile hosts.

  • 229.
    Sadat, Anwar
    et al.
    Monash University, Melbourne, VIC.
    Karmakar, G.C.
    Monash University, Melbourne, VIC.
    Gaber, Mohamed
    Portsmouth University.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Reliable and energy efficient backup clustering scheme for wireless sensor networks2010Konferansepaper (Fagfellevurdert)
  • 230. Saguna, Saguna
    et al.
    Jayaraman, P
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Monash University, Melbourne, VIC.
    Determining user presence using context in a decentralized unified messaging system (IPAD-UMS)2008Inngår i: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (Mobiquitous '08), 2008Konferansepaper (Fagfellevurdert)
    Abstract [en]

    UMS can be described as a system that allows for communication between users via a number of communication technologies over heterogeneous network infrastructures[1]. It integrates networking technologies such as Ethernet, ATM, IEEE 802.11, GSM and UMTS alongwith various devices such as laptops, tablet PCs, desktops, mobile phones, smartphones, PDAs, fax machines and landline phones. In other words, it allows the users to access their different types of messages by logging into one inbox from these different devices[2]. The user is able to create, modify, access and administer messages belonging to various formats on a single device to which he/she has immediate access. This form of 'anywhere', 'anytime' access to 'anykind' of messages enables the UMS to become ubiquitous and pervasive[3, 4].

  • 231.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chakraborty, Dipanjan
    IBM Research Lab., New Delhi.
    Building activity definitions to recognize complex activities using an online activity toolkit2012Inngår i: IEEE 13th International Conference on Mobile Data Management, MDM 2012, Piscataway, NJ: IEEE Communications Society, 2012, s. 344-347Konferansepaper (Fagfellevurdert)
    Abstract [en]

    One of the biggest challenges in the field of activity recognition is gathering training data for building activity inference models. To address this problem, we have developed an online activity toolkit for gathering activity data from online users. We use this data to build activity definitions for use in our system which is based on Context-Driven Activity Theory. We use Markov chain analysis to assign weights to activities and context attributes of a complex activity as well as to build activity signatures based on transition and path probabilities. Our demo is intended to show how complex activities and associated atomic activities and context attributes can be described using an activity toolkit. The toolkit is used to take input from users available online and the results analysis of different complex activities can be viewed online in near real-time using the graphical user interface (GUI).

  • 232.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chakraborty, Dipanjan
    IBM Research, India Research Lab.
    Complex activity recognition using context driven activity theory in home environments2011Inngår i: Smart spaces and next generation wired/wireless networking: 11th international conference, NEW2AN 2011 and 4th Conference on Smart Spaces, RuSMART 2011, St. Petersburg, Russia, August 22-15, 2011 ; proceedings / [ed] Sergey Balandin; Yevgeni Koucheryavy; Honglin Hu, Heidelberg: Encyclopedia of Global Archaeology/Springer Verlag, 2011, s. 38-50Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper proposes a context driven activity theory (CDAT) and reasoning approach for recognition of concurrent and interleaved complex activities of daily living (ADL) which involves no training and minimal annotation during the setup phase. We develop and validate our CDAT using the novel complex activity recognition algorithm on two users for three weeks. The algorithm accuracy reaches 88.5% for concurrent and interleaved activities. The inferencing of complex activities is performed online and mapped onto situations in near real-time mode. The developed systems performance is analyzed and its behavior evaluated

  • 233.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chakraborty, Dipanjan
    IBM Research, India Research Lab.
    CrysP: multi-faceted activity-infused presence in emerging social networks2010Inngår i: Smart spaces and next generation Wired/Wireless networking: third Conference on Smart Spaces, ruSMART 2010, and 10th international conference, NEW2AN 2010, St. Petersburg, Russia, August 23-25, 2010 ; proceedings / [ed] Sergey Balandin; Roman Dunaytsev; Yevgeni Koucheryavy, Encyclopedia of Global Archaeology/Springer Verlag, 2010, s. 50-61Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper presents Crystal Presence (CrysP) approach wher- e we fuse presence and activity in the realm of social networking. CrysP functions on the basis of the activity-infused multi-faceted presence information. This information is derived from user's involvement in multiple activities at any point in time. We propose and develop the CrysP System (CrysPSys) to determine CrysP from the user and his/her environmental context information (mainly relating to user activity, moods/emotions and cognition/thoughts) and then sharing the relevant CrysP with the appropriate devices, services and social-networks (corporate, personal and interest networks) and blogs (text, micro, video, photo and voice). We also highlight the benefits and challenges faced in developing such a system. This paper proposes the architecture and its test-bed and prototype implementation.

  • 234.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chakraborty, Dipanjan
    Recognizing concurrent and interleaved activities in social interactions2011Inngår i: Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), Piscataway, NJ: IEEE Communications Society, 2011, s. 230-237Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Social networks constitute an important research area where users are involved in social interactions and inform each other of activities they perform. In this paper a complex activity recognition system (SEMACT) is proposed, built and validated. Different activities performed by users form an activity hierarchy. We perform semantic reasoning by using ontological constructs and rules to recognize both concurrent and interleaved complex activities at different levels of granularity of this activity hierarchy. Different application domains require activity recognition systems to define and recognize activities at different levels of granularity. Our system tackles this problem by recognizing complex activities which are then shared across application domains using a generic API. A test-bed and prototype are built to validate our SEMACT system. Extensive experimentation is performed which demonstrates that high accuracy of 94.35% was achieved for the recognition of complex activities both concurrent and interleaved within computationally feasible time

  • 235.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chakraborty, Dipanjan
    IBM Research, India Research Lab.
    Towards a robust concurrent and interleaved activity recognition of mobile users2011Inngår i: 12th International Conference on Mobile Data Management (MDM), 2011: Lulea, Sweden 6-9 June 2011, Piscataway, NJ: IEEE Communications Society, 2011, s. 297-298Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper proposes a situation and context-aware complex activity recognition system where we use on-body sensor information along with other context information to infer mobile user activities which are both concurrent and interleaved. We develop and validate our complex activity recognition algorithm for detecting these multiple complex activities. Activities are mapped onto situations using spatio-temporal analysis. We further build a test-bed in the social-networking domain to test and validate our approach in different scenarios using mobile devices

  • 236.
    Saguna, Saguna
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Zaslavsky, Arkady
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Paris, Cécile
    CSIRO, Australia.
    Context-Aware Twitter Validator (CATVal): a system to validate credibility and authenticity of Twitter content for use in decision support systems2012Inngår i: Fusing Decision Support Systems into the Fabric of the Context / [ed] Ana Respício; Frada Burstein, Anávissos, Greece: IOS Press, 2012, s. 323-334Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Decision support systems (DSS) are beginning to use content sourced from social networks such as Twitter to provide decision makers with information to make timely and critical decisions. Misleading information obtained from Twitter can lead to adverse outcomes as well as cause trust issues within DSSs. In this paper, we propose and investigate a context-aware Twitter validator (CATVal) system to validate credibility and authenticity of Twitter content at run-time for use in DSS. We build, store and update a credibility index for Twitter users and verify user's context information each time a user tweets. The proposed system can benefit a DSS by providing credible and dependable information while detecting misleading and false information sourced from Twitter and possible other social media.

  • 237. Srinivasan, Balasubramaniam
    et al.
    Zaslavsky, Arkady
    Experience with developing CD-ROM for subject delivery to computing students1997Inngår i: 8th Australasian Conference on Information Systems: ACIS'97, Adelaide, September, 1997, 1997Konferansepaper (Fagfellevurdert)
  • 238. Stanski, P.
    et al.
    Zaslavsky, Arkady
    A portable file system for distributed multimedia applications1998Inngår i: International Conference on Computational Intelligence and Multimedia Applications 1998: ICCIMA 1998 ; [held on 9-11 February 1998 in Gippsland, Victoria, Australia] / [ed] Henry Selvaraj, Singapore: World Scientific and Engineering Academy and Society, 1998Konferansepaper (Fagfellevurdert)
  • 239.
    Stanski, Peter
    et al.
    Monash University, Melbourne, VIC.
    Giles, Stephen
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Document archiving, replication and migration container for mobile Web users1998Inngår i: Applied computing 1998: proceedings of the 1998 ACM Symposium on Applied Computing, Tlanta Marriott Marquis Hotel, Atlanta, Georgia, February 27 - March 1, 1998 / [ed] Janice Carroll, New York: Association for Computing Machinery (ACM), 1998, s. 400-404Konferansepaper (Fagfellevurdert)
  • 240. Stanski, Peter
    et al.
    Thompson, Dean
    Nzama, Mqhele
    Zaslavsky, Arkady
    Craske, Noel
    Automating directory services for mobile agent tracking1998Inngår i: Conference record: IEEE GLOBECOM 1998 - The Bridge to Global Integration : Sydney, 8 - 12 November 1998 Piscataway, NJ, Piscataway, NJ: IEEE Communications Society, 1998, s. 1947-1951Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Since the introduction of a number of distributed computing environments, there has been an increase in the number of network and application services that are distributed throughout large networks. The distribution of services makes it difficult for users and mobile agents to locate the required host services. This problem is more pronounced for mobile agents which unlike human users are not able to draw on a variety of information sources and services. Mobile agents make use of directory services to obtain location information. This paper presents a unification model for extending directory services. The proposed model provides a standard directory service in a multiple protocol environment for the interface, location and navigation of distributed services

  • 241. Stanski, Peter
    et al.
    Zaslavsky, Arkady
    Expressing dynamics of mobile agent systems using ambient calculus1998Inngår i: Proceedings: Ninth International Workshop on Database and Expert Systems Applications : August 26-28, 1998, Vienna, Austria ; [workshop papers] / [ed] A Min Tjoa; Roland R. Wagner, Los Alamitos, Calif: IEEE Communications Society, 1998, s. 434-439Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The mobile agent approach has become popular due to recent developments in the mobile code paradigm and enabling programming technologies. Many existing agent-based systems lack clear standards and rely upon their own approaches and solutions to challenging research problems. Additionally, this rapid evolution has been poorly supported with formal methods. Ambient calculus has been recently proposed as a theoretical framework for distributed and mobile objects/agents. This paper analyses ambient calculus and how it may be used to model the mobility of software objects. A number of extensions to this framework are also proposed to describe various components within a mobile agent system

  • 242. Staqski, Peter
    et al.
    Zaslavsky, Arkady
    Distributed and persistent mobile agents for heterogeneous personal communications systems1997Inngår i: Proceedings: 6th International Conference on Computer Communications and Networks, September 22 - 25, 1997, Las Vegas, Nevada / [ed] Kia Makki, Los Alamitos, Calif: IEEE Communications Society, 1997, s. 256-261Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Problems of environment heterogeneity and interoperability between different mobile computing platforms are among the most urgent to address by the research community. This paper proposes an environment, which supports migration of mobile code developed using heterogeneous languages. Current developments in the area of mobile code and distributed mobile computing systems are discussed and placed within the context of the proposed system. The architecture behind the proposed Portable Environment Small Operating System (PESOS) provides an open platform for distributed persistent personal agents written using a variety of languages. Additionally, PESOS introduces and discusses the concept of a uniform migration wrapper consisting of portable file systems (PFS) within which applications and data are embedded.

  • 243. Steele, P.
    et al.
    Nolan, M.
    Ceddia, J.
    Zaslavsky, Arkady
    Identifying domains in relational databases to support reverse engineering1994Inngår i: Proceedings of the Baltic Workshop on National Infrastructure Databases: problems, methods, experiences, Inst. of mathematics and informatics , 1994, s. 196-205Konferansepaper (Fagfellevurdert)
  • 244. Steele, P.
    et al.
    Zaslavsky, Arkady
    A framework for conceptual exchange between object-role modelling and extended entity-relationship modelling1994Inngår i: Methods and tools, theory and practice: proceedings of the Fourth International Conference Information Systems Development, ISD '94, Bled, Slovenia, 20-22 September 1994, Moderna Organizacija , 1994, s. 83-92Konferansepaper (Fagfellevurdert)
  • 245. Steele, P.
    et al.
    Zaslavsky, Arkady
    CASE tool support for integration of system modelling techniques1993Inngår i: Proceedings of the 4th Australian Conference on Information Systems, Brisbane, Queensland, Australia, 28-30 September 1993 / [ed] Paul Ledington, Univ. of Queensland , 1993Konferansepaper (Fagfellevurdert)
  • 246.
    Steele, Philip M.
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    The role of meta models in federating system modelling techniques1994Inngår i: Entity-relationship approach: proceedings / ER '93, 12th International Conference on the Entity-Relationship Approach, Arlington, Texas, USA, December 15 - 17, 1993 / [ed] Ramez A. Elmasri, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 1994, s. 315-326Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Given the large number of system modelling techniques currently available, and the continual need to develop new and improved paradigms and approaches, it must be accepted that this diversity is inevitable, and perhaps even desirable. At the same time, it must be admitted, that the lack of integration and interoperability creates difficulties in effectively combining heterogeneous system modelling techniques and inhibits cost efficient transition of models from one CASE tool to another. This paper discusses the problems of incorporating heterogeneous system modelling techniques, including the extended entity-relationship approach and data flow diagrams, into a unifying conceptual framework. It also outlines the DROTIS project, which aims to develop a generic meta model and a set of interfaces and protocols to support the integration and interoperability of different system modelling techniques and CASE tools used for information systems development. The concept of a semantic space is introduced. This space allows the representation of different system modelling techniques as subsets of concepts in order to support their interoperability and federation.

  • 247.
    Sung, Edmund
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Software assisted handover of mobile clients in heterogeneous wireless computing environments1997Inngår i: Proceedings: Asia Pacific Software Engineering Conference and International Computer Science Conference, December 2 - 5, 1997, Hong Kong, Los Alamitos, Calif: IEEE Communications Society, 1997, s. 527-528Konferansepaper (Fagfellevurdert)
    Abstract [en]

    A software-assisted handover between wireless local area network (LAN) and wide area networks (WAN) (SAHWW) is presented for application roaming in heterogeneous networks. Wireless WAN is chosen as a backup for wireless LAN (WLAN). In a situation when WLAN cannot handle the connection, it is passed to the backup network. Such process is assisted by a software-handover agent which resides on the MW and the server. The handover agent virtually coordinates the two networks and makes the handover procedure transparent to users. SAHWW is developed in order to provide seamless roaming between WLAN and WAN.

  • 248. Sung, Ying Man
    et al.
    Tari, Z.
    Zaslavsky, Arkady
    Achieving reliability of distributed applications in wireless multi-network environment1998Inngår i: Parallel and distributed computing and systems : proceedings of the Tenth IASTED International Conference / [IASTED International Conference Parallel and Distributed Computing and Systems], Las Vegas, Nevada, USA, October 28 - 31, 1998 / [ed] Yi Pan, IASTED/Acta Press , 1998Konferansepaper (Fagfellevurdert)
  • 249.
    Tan, J.
    et al.
    Monash University, Melbourne, VIC.
    Zaslavsky, Arkady
    Bond, A.
    Monash University, Melbourne, VIC.
    Meta object approach to database schema integration2000Inngår i: Proceedings: DOA '00, International Symposium on Distributed Objects and Applications : 21 - 23 September 2000, Antwerp, Belgium / [ed] Pamela Drew, Los Alamitos, Calif: IEEE Communications Society, 2000, s. 145-154Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Database schema integration is significant not only in building multidatabase systems but also in data warehousing. Meta data, which define schemas, are normally involved in the surrounding issues. And while many of these issues have been addressed in the past, unresolved issues remain. The authors present an approach that not only uses metadata but also uses meta-meta information to make schema integration more possible. Our solution requires a meta object facility that serves not only as a repository but also as a more feasible means of managing meta data. We also advocate the use of such a facility as part of an object oriented middleware environment that provides an open interface standard and several useful services in distributed object management

  • 250. Tan, J.
    et al.
    Zaslavsky, Arkady
    Ewald, C.
    Bond, A.
    An object-based metadata facility for ad-hoc federated database systems2001Inngår i: Proceedings: 3rd International Symposium on Distributed Objects and Applications, DOA '01 : 17 - 20 September 2001, Rome, Italy / [ed] Gordon Blair, Los Alamitos, Calif: IEEE Communications Society, 2001Konferansepaper (Fagfellevurdert)
23456 201 - 250 of 298
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf