Sök:

Sökresultat:

6453 Uppsatser om Computer science - software engineering - Sida 7 av 431

"The Machine Made Me Do It!" : An Exploration of Ascribing Agency and Responsibility to Decision Support Systems

Are agency and responsibility solely ascribable to humans? The advent of artificial intelligence (AI), including the development of so-called ?affective computing,? appears to be chipping away at the traditional building blocks of moral agency and responsibility. Spurred by the realization that fully autonomous, self-aware, even rational and emotionally-intelligent computer systems may emerge in the future, professionals in engineering and computer science have historically been the most vocal to warn of the ways in which such systems may alter our understanding of computer ethics. Despite the increasing attention of many philosophers and ethicists to the development of AI, there continues to exist a fair amount of conceptual muddiness on the conditions for assigning agency and responsibility to such systems, from both an ethical and a legal perspective. Moral and legal philosophies may overlap to a high degree, but are neither interchangeable nor identical.

EU-patent på datorrelaterade uppfinningar : en rättsekonomisk analys

Computer programs must give a technical effect that goes beyond"normal physical interaction"to be considered to belong to a technical field. The invention shall be be susceptible of industrial application, which means that it should be possible to reproduce or use in any other industrial way. The reqirement that the invention shall be new means that the technique must not be previously known because of patents, published articles, etc. That an invention shall be a contribution to the state of the art in a technical field means that the invention shall not be obvious to invent for a person skilled in the art. Patents do effect the innovation among the inventers, but in most industries most inventions would be invented independent if there was a patent system or not.

Gester för navigation i användargränssnitt på mobiltelefoner

Användandet av mobiltelefoner har blivit en del av vår vardag i dagens samhälle. Mobiltelefonindustrin är en miljard industri med stora företag som Motorola, Nokia och Sony Eriksson. De senaste åren har det även kommit in nya aktörer på marknaden som Apple med sin iPhone och Google med sitt mobiltelefons?operativsystem Android. Dessa aktörer har kommit ut med flera nya mobiltelefonmodeller som använder sig ut av pekskärmar.

Mjukvarukvalitet i öppen programvara - en explorativ och kvalitativ studie av uppfattningar om mjukvarukvalitet

Open source software has recently been discussed, not least in media as a revolution in IT. A number of advantages have been listed in changing proprietary software into open source software. Examples of such pros are no expenses for license fees and improved efficiency. In spite of this, few users have made this change. One of the reasons is a distrust of the quality in open source software.

Automatiserad unit testning

Dagens utveckling av mjukvara går snabbare och snabbare samtidigt som mjukvaran blir allt mer komplex. Att under dessa omständigheter kunna bibehålla en lika om inte högre kodkvalité är en utmaning. På UIQ bestämde de sig för att undersöka om ett automatiserat unit test kunde hjälpa dem. Metoderna för att komma fram till resultaten i denna rapport har varit intervjuer, en enkät, intern information och litteratur så som forskningsartiklar m.m. Denna rapport är en utredning av automatiserade test, vad man bör tänka på, vilka fördelarna är, vilka testfall som är möjliga att automatisera med mera. Rapporten kommer även att presentera grunderna i testning av mjukvara, en introduktion till eXtreme Programming och Test-Driven Development samt hur testningen utförs på UIQ idag. Då jag kom fram till att ett automatiserat unit test skulle passa sig bra på UIQ kommer jag i slutet av denna rapport presentera ett implementerings förslag. Man bör även införa en test driven utvecklings metodik för att säkerhetsställa att det kommer att utvecklas automatiserade testfall..

Utveckling av Prisjakts butiksomdömessystem

This thesis work is the result of the company Prisjakt?s wish to develop and improve its current system of opinions for online stores. The challenge was to develop a similar system that competitors are using but better. The collection of information is based on purchases and are collected from Web-shops. The purchases can then be monitored in a control panel.

Dataspelsarvet - klassiker och kanonisering

This master thesis deals with computer game classics and a possible computer game canon. It looks closer at four computer game genres - adventure, RPG, action and strategy - in order to discern which games are considered classics and what characterizes them. To answer the first question a quantitative research method was used. 675 computer game reviews from 5 Internetsites were examined in order to see which games are mentioned most often in this context and therefore might be considered classics. To answer the second question a qualitative research method was used.

En jämförande prestandastudie mellan JSON och XML

När man utvecklar en ny produkt eller tjänst står man ofta inför valet av dataformat. De mest använda idag är JSON och XML. Formaten ser väldigt olika ut, erbjuder olika funktioner, men används inte sällan till samma sak. Vilket som egentligen är snabbast finns det mycket åsikter om, men inte lika mycket testresultat. Den luckan skall detta arbete täcka. Programmeringsspråken som används är Python och JavaScript, vilka båda är populära på webben. Genom experiment testas hur snabbt JSON och XML kan kodas och avkodas.

Change Lab - Att arbeta med lärande förändring

In order to be able to change, to maintain competitiveness as a company in a world where rapid changes is part of the daily life, it is crucial to have knowledge and methods in how to change. One method, originally developed in Finland, is the Change Laboratory. This method is said to be efficient, not only concerning change aspects but also learning, since change and learning in this method is intertwined. This Master Thesis (20p.) tells about the process of conducting a Change Laboratory with a Swedish high-tech company and analyses factors in the process that makes change possible..

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Stereotyper i den virtuella världen. Hur visuella intryck påverkar deltagares uppfattningar av virtuella agenter

The purpose of this study is to examine how participants perceive virtual agents shown on a computer display. In particular, it is explored to what extent participants transfer gender and attraction stereotypes that are commonly applied in the physical world to virtual agents. Previous related studies have often explored only text or voice interfaces, without any visually appearing agents, and here indeed found evidence for a transfer of gender stereotypes. Our hypothesis was that the addition of a visual agent interface would reinforce this effect. The results support our hypothesis that participants transfer human gender and attraction stereotypes onto virtual agents, as well as that these processes are affected by the visual representations of the agents..

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Operatörsoberoende SMS-leverans med designmönstret Bridge

When different type of programs are developed one wants to make these adjustable to future changes and requirements. It must be done a good design of the program from the beginning to make it possible to continue development of it without having to redo big parts of it to high costs. In the area of object orientation there are design pattern, which can be used to design systems that can be adjusted to new changes in an easier way. I have in this thesis chosen to take a closer look at how to design a program that sends SMS to cell phones through a system of an operator. One requirement on the program is that it has to be possible to change what operator to send though in an easy way.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

<- Föregående sida 7 Nästa sida ->