According to our database1, Bengt Carlsson authored at least 44 papers between 1991 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Input-Output Stability Design of an Ammonium Based Aeration Controller for Wastewater Treatment.
Proceedings of the 2018 Annual American Control Conference, 2018
Introducing a Novel Security-Enhanced Agile Software Development Process.
A risk analysis of a smart home automation system.
Future Generation Comp. Syst., 2016
Robust tuning of bending-points detection algorithms in batch-operated processes: Application to Autothermal Thermophilic Aerobic Digesters.
Environmental Modelling and Software, 2015
Learning Maritime Traffic Rules Using Potential Fields.
Proceedings of the Computational Logistics - 6th International Conference, 2015
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Approximate adjoint-based iterative learning control.
Int. J. Control, 2014
On the Risk Exposure of Smart Home Automation Systems.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
Improving software security with static automated code analysis in an industry setting.
Softw., Pract. Exper., 2013
Identification and Evaluation of Security Activities in Agile Projects.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
An Evolutionary View of Collective Intelligence.
Proceedings of the ICAART 2013, 2013
Agile development with security engineering activities.
Proceedings of the International Conference on Software and Systems Process, 2011
Enhanced collaboration in diabetic healthcare for children using multi-agent systems.
On the Simulation of a Software Reputation System.
Proceedings of the ARES 2010, 2010
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?
Proceedings of the The Forth International Conference on Availability, 2009
Initialization of a Nonlinear Identification Algorithm Applied to Laboratory Plant Data.
IEEE Trans. Contr. Sys. Techn., 2008
Evaluating the cost reduction of static code analysis for software security.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
Describing Cryptobiosis as a Time Based Protection System Using Petri Nets.
Proceedings of the First International Conference on Biomedical Electronics and Devices, 2008
Security Aspects on Inter-organizational Cooperation Using Wrapper Agents.
Proceedings of the Agent-Based Technologies and Applications for Enterprise Interoperability, 2008
The Success of Cooperative Strategies in the Iterated Prisoner's Dilemma and the Chicken Game.
Scalable Computing: Practice and Experience, 2007
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Software Vulnerability Assessment Version Extraction and Verification.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007
Privacy-Invasive Software and Preventive Mechanisms.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Analysing Countermeasures Against Privacy-Invasive Software.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006
The Concept and Technology of Plug and Play Business.
Proceedings of the ICEIS 2006, 2006
Interaction analysis and control structure selection in a wastewater treatment plant model.
IEEE Trans. Contr. Sys. Techn., 2005
An integrating linearization method for Hammerstein models.
On Contamination in Information Ecosystems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Software Security Analysis - Execution Phase Audit.
Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August, 2005
Privacy Invasive Software in File-Sharing Tools.
Proceedings of the Information Security Management, Education and Privacy, 2004
Surplus Values in Information Ecosystems.
International Journal of Information Technology and Decision Making, 2002
Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
The Tragedy of the Commons - Arms Race within Peer-to-Peer Tools.
Proceedings of the Engineering Societies in the Agents World II, 2001
Arms Race within Information Ecosystems.
Proceedings of the Cooperative Information Agents V, 5th International Workshop, 2001
The Rise and Fall of Napster - An Evolutionary Approach.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001
Coordination Models for Dynamic Resource Allocation.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000
Estimation of continuous-time AR process parameters from discrete-time data.
IEEE Trans. Signal Processing, 1999
Modeling Strategies as Generous and Greedy in Prisoner's Dilemma like Games.
Proceedings of the Simulated Evolution and Learning, 1998
Continuous-time AR process parameter estimation from discrete-time data.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998
An Iterated Hawk-and-Dove Game.
Proceedings of the Agents and Multi-Agent Systems Formalisms, 1997
An Evolutionary Model of Multi-Agent Systems.
Proceedings of the Distributed Artificial Intelligence: Architecture and Modelling, 1995
A notch filter based on recursive least-squares modelling.
Signal Processing, 1994
Digital differentiation of noisy data measured through a dynamic system.
IEEE Trans. Signal Processing, 1992
Optimal differentiation based on stochastic signal models.
IEEE Trans. Signal Processing, 1991