Oslo, Norway
Oslo, Norway

Time filter

Source Type

Agency: Cordis | Branch: FP7 | Program: CP | Phase: ICT-2007.1.4 | Award Amount: 4.61M | Year: 2008

The core scientific focus of GEMOM is the significant and measurable increase in end-to-end intelligence and resilience of complex, distributed information systems. GEMOMs definition of intelligence and resilience include: - Insensitivity or significant reduction in sensitivity to individual and sometimes multiple faults in the system. Fault is defined as any deterioration of the functional profile of informational system, the volumetric profile, and the security profile - Support for a reconfiguration as an efficient system The primary objective of GEMOM is to research, develop and deploy a prototype of a messaging platform that is evolutionary, self-organising, self-healing, scalable and secure. GEMOM will be resilient and be able to utilise redundant modules (hot-swap or switchover) instantly without information loss. These resilience features will allow specialist, independent system actors, viz. watch-dogs, security and situation monitors, routers, and other optimisers, to remove or replace compromised nodes from the broader network instantly without compromising higher level functionality. GEMOM considers the Publish-Subscribe variant of Message Oriented Middleware to be the predominant one and will focus on issues surrounding that kind of messaging. For completeness GEMOM would provide a synchronous Request and Reply overlay as well. The advances that GEMOM proposes to make to the area of messaging revolve around the notion of a fault. In addition to the intuitive understanding of what a fault might be, whereby any actor stops being operable, connection is lost etc, GEMOM extends the notion of fault to include compromised security or inadequate bandwidth availability in the first iteration and compromised abstract notion of resource in its final iteration.

Dale O.,Norsk Regnesentral | Schulz T.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We present an alternate mobile phone keyboard for inputing text, the JusFone Keyboard. This keyboard allows people to enter characters by resting their finger on a the desired key, and rocking to select a specific character. We ran user tests of the keyboard with 12 seniors comparing it against a touchscreen keyboard, a phone with large buttons, and an on-screen PC keyboard. The users found several things to like about the JusFone Keyboard, including comfort and size of keys and having direct access to characters. Users also had several suggestions about how to make the keyboard better such as making the text on the keys bigger and adjusting the spacing between keys. We also conducted a diary study of a user with reduced hand function who used the JusFone keyboard on his PC. The results indicate that the keyboard may be of assistance to persons with reduced hand function. © 2012 Springer-Verlag.

Fuglerud K.S.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

This paper reports results from a focus group interview and a field study, which includes 28 visually impaired PC users in Norway. The main goal of the study was to identify benefits of, and barriers to, use of ICT for the visually impaired, and to propose measures to remove barriers. The use of Internet services, mobile phones, kiosks, ticket machines, ATMs, and queuing management systems, were studied. Visually impaired users' encounters with technology were investigated through a focus group interview, observation of task-solving activities, and semi-structured interviews. The analysis revealed that several commonly used ICT services, such as online banking, electronic forms, and learning material have major accessibility problems. The first barrier is often mechanisms for registration and authentication. The proliferation of inaccessible everyday technologies, unstable systems, and lack of training constitutes other major challenges. Based on the findings some suggestions for further development and research priorities are suggested. © 2011 Springer-Verlag.

Dale O.,Norsk Regnesentral | Drivenes T.,Norsk Regnesentral | Tollefsen M.,MediaLT AS | Reinertsen A.,Karde AS
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

The use of social media has in recent years increased dramatically. It is imperative that social media are accessible to all. To ensure this, it is important to conduct user testing as part of an accessibility and usability assessment of social media services. This paper focuses on the methodology applied in such undertakings, and its purpose is to draw attention to important aspects that should guide user testing and user studies of social media services. This is done by sharing the experiences gained in the project Net Citizen. The main target groups for the paper are those planning the implementation of social media services and those who conduct accessibility and usability user testing. Key findings are that cumulative usability issues can be likened to poor accessibility. Further, that web services that are accessible in a strict technical sense, may not necessarily be perceived as accessible by real users. © 2012 Springer-Verlag.

Dale O.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

Dementia is a chronic brain disease affecting cognitive functioning. People with dementia have a higher risk of getting lost. In recent years GPS based technology has been utilised to locate lost persons with dementia. We interviewed six families using such technology focusing on perceived usability, user-friendliness and usefulness. The informants also completed the QUEST 2.0 questionnaire which measures satisfaction with assistive technology. By and large the informants found the equipment easy to use, and it was viewed by all as being very useful. There were a number of usability issues which adversely affected usage, e.g. system stability, secure fastening, size, user interface issues and varying GPS-reception. The QUEST 2.0 results corresponded with the findings in the interviews. Further usability studies, as well as R&D to address issues such as security and privacy protection and use in the public health sector are needed. © 2010 Springer-Verlag Berlin Heidelberg.

Zibuschka J.,Fraunhofer Institute for Industrial Engineering | Fritsch L.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We present a novel approach for password/credential storage in Pseudo-SSO scenarios based on a hybrid password hashing/password syncing approach that is directly applicable to the contemporary Web. The approach supports passwords without requiring modification of the server side and thus is immediately useful; however, it may still prove useful for storing more advanced credentials in future SSO and identity management scenarios, and offers a high password security, high availability and integration of secure elements while providing familiar interaction paradigms at a low cost. © 2012 Springer-Verlag.

Fuglerud K.S.,Norsk Regnesentral | Rossvoll T.H.,Norsk Regnesentral
Universal Access in the Information Society | Year: 2012

Several countries are considering web-based voting as an alternative to, or a replacement of, traditional voting methods. It is argued that electronic voting could increase voter participation and help strengthen democracy, as e-voting would increase accessibility for large sections of the population, particularly with regard to groups that previously have experienced difficulties with the traditional voting setup. With a focus on usability and accessibility, this paper reports on a study evaluating several electronic voting prototypes in Norway, involving technical aspects as well as expert evaluation and user testing in the field, with users from a wide range of disabled user groups participating in the study. Technical testing regarding accessibility standard compliance, testing with the personas method and user testing revealed that many rather basic universal design principles were either not fully understood or not prioritized for implementation by the solution providers. However, despite various accessibility difficulties, the participants generally showed a positive attitude towards web-based elections. Through the findings of this study, the authors highlight factors that are important to consider in the development and testing of web-based voting systems. © 2011 Springer-Verlag.

Fuglerud K.S.,Norsk Regnesentral | Sloan D.,University of Dundee
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

It is often said that universal design and similar approaches can be a source of innovation. In this paper key elements in inclusive design are identified, and examples of innovations related to inclusive design are presented. Then, some core elements of the inclusive design process that will help spur innovation are identified. Based on this the link between inclusive design and innovation is discussed. Finally, some recommendations for an inclusive and innovative design process are presented. © 2013 Springer-Verlag.

Boudko S.,Norsk Regnesentral | Leister W.,Norsk Regnesentral
13th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2015 - Proceedings | Year: 2015

Mobile devices are typically equipped with multiple access network interfaces, supporting the coexistence of heteroge-neous wireless access networks. The selection of an optimal set of multiple serving mobile networks for multicast streams is NP-hard and is, therefore, a challenging problem. We pro-pose and evaluate a simple heuristic algorithm that provides con-guration of multicast groups for a given network topol-ogy and network conditions. We consider that a forward error correction technique is applied to deal with packet loss of the wireless communication. Copyright 2015 ACM.

Boudko S.,Norsk Regnesentral | Leister W.,Norsk Regnesentral
ACM International Conference Proceeding Series | Year: 2013

Coexistence of various wireless access networks and the ability of mobile terminals to switch between them make an optimal selection of serving networks for multicast groups a challenging problem. Since optimal network selection requires large dimensions of data to be collected from several network locations and sent between several network components, the scalability can easily become a bottleneck in large-scale systems. Therefore, reducing data exchange within heterogeneous wireless networks is important. We study the decision-making process and the data that needs to be sent between different network components. We present two decentralized solutions to this problem that operate with reduced sets of information. We define the upper and lower bounds to these solutions and evaluate them in the OMNet++ simulation environment. Both solutions provide a substantial improvement in performance compared to the lower bound. © 2013 ACM.

Loading Norsk Regnesentral collaborators
Loading Norsk Regnesentral collaborators