Bengt Carlsson

According to our database1, Bengt Carlsson
  • authored at least 41 papers between 1991 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
A risk analysis of a smart home automation system.
Future Generation Comp. Syst., 2016

2015
Robust tuning of bending-points detection algorithms in batch-operated processes: Application to Autothermal Thermophilic Aerobic Digesters.
Environmental Modelling and Software, 2015

Learning Maritime Traffic Rules Using Potential Fields.
Proceedings of the Computational Logistics - 6th International Conference, 2015

A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Approximate adjoint-based iterative learning control.
Int. J. Control, 2014

On the Risk Exposure of Smart Home Automation Systems.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Improving software security with static automated code analysis in an industry setting.
Softw., Pract. Exper., 2013

Identification and Evaluation of Security Activities in Agile Projects.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

An Evolutionary View of Collective Intelligence.
Proceedings of the ICAART 2013, 2013

2011
Agile development with security engineering activities.
Proceedings of the International Conference on Software and Systems Process, 2011

2010
Enhanced collaboration in diabetic healthcare for children using multi-agent systems.
IJAOSE, 2010

On the Simulation of a Software Reputation System.
Proceedings of the ARES 2010, 2010

2009
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?
Proceedings of the The Forth International Conference on Availability, 2009

2008
Initialization of a Nonlinear Identification Algorithm Applied to Laboratory Plant Data.
IEEE Trans. Contr. Sys. Techn., 2008

Evaluating the cost reduction of static code analysis for software security.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Describing Cryptobiosis as a Time Based Protection System Using Petri Nets.
Proceedings of the First International Conference on Biomedical Electronics and Devices, 2008

2007
The Success of Cooperative Strategies in the Iterated Prisoner's Dilemma and the Chicken Game.
Scalable Computing: Practice and Experience, 2007

Preventing Privacy-Invasive Software Using Collaborative Reputation Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Software Vulnerability Assessment Version Extraction and Verification.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

2006
Privacy-Invasive Software and Preventive Mechanisms.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Analysing Countermeasures Against Privacy-Invasive Software.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

The Concept and Technology of Plug and Play Business.
Proceedings of the ICEIS 2006, 2006

2005
Interaction analysis and control structure selection in a wastewater treatment plant model.
IEEE Trans. Contr. Sys. Techn., 2005

An integrating linearization method for Hammerstein models.
Automatica, 2005

On Contamination in Information Ecosystems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Software Security Analysis - Execution Phase Audit.
Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August, 2005

2004
Privacy Invasive Software in File-Sharing Tools.
Proceedings of the Information Security Management, Education and Privacy, 2004

2002
Surplus Values in Information Ecosystems.
International Journal of Information Technology and Decision Making, 2002

Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

2001
The Tragedy of the Commons - Arms Race within Peer-to-Peer Tools.
Proceedings of the Engineering Societies in the Agents World II, 2001

Arms Race within Information Ecosystems.
Proceedings of the Cooperative Information Agents V, 5th International Workshop, 2001

The Rise and Fall of Napster - An Evolutionary Approach.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001

2000
Coordination Models for Dynamic Resource Allocation.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000

1999
Estimation of continuous-time AR process parameters from discrete-time data.
IEEE Trans. Signal Processing, 1999

1998
Modeling Strategies as Generous and Greedy in Prisoner's Dilemma like Games.
Proceedings of the Simulated Evolution and Learning, 1998

Continuous-time AR process parameter estimation from discrete-time data.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

1997
An Iterated Hawk-and-Dove Game.
Proceedings of the Agents and Multi-Agent Systems Formalisms, 1997

1995
An Evolutionary Model of Multi-Agent Systems.
Proceedings of the Distributed Artificial Intelligence: Architecture and Modelling, 1995

1994
A notch filter based on recursive least-squares modelling.
Signal Processing, 1994

1992
Digital differentiation of noisy data measured through a dynamic system.
IEEE Trans. Signal Processing, 1992

1991
Optimal differentiation based on stochastic signal models.
IEEE Trans. Signal Processing, 1991


  Loading...