default search action
Bengt Carlsson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j17]Tatiana Chistiakova, Torbjörn Wigren, Bengt Carlsson:
Combined ℒ2-Stable Feedback and Feedforward Aeration Control in a Wastewater Treatment Plant. IEEE Trans. Control. Syst. Technol. 28(3): 1017-1024 (2020)
2010 – 2019
- 2018
- [c32]Tatiana Chistiakova, Torbjörn Wigren, Bengt Carlsson:
Input-Output Stability Design of an Ammonium Based Aeration Controller for Wastewater Treatment. ACC 2018: 2964-2971 - 2017
- [j16]Martin Boldt, Andreas Jacobsson, Dejan Baca, Bengt Carlsson:
Introducing a Novel Security-Enhanced Agile Software Development Process. Int. J. Secur. Softw. Eng. 8(2): 26-52 (2017) - 2016
- [j15]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
A risk analysis of a smart home automation system. Future Gener. Comput. Syst. 56: 719-733 (2016) - 2015
- [j14]Ion Irizar, Jesus Zambrano, Bengt Carlsson, Mikel Morrás, Enrique Aymerich:
Robust tuning of bending-points detection algorithms in batch-operated processes: Application to Autothermal Thermophilic Aerobic Digesters. Environ. Model. Softw. 71: 148-158 (2015) - [c31]Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson:
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting. ARES 2015: 11-19 - [c30]Ewa Osekowska, Bengt Carlsson:
Learning Maritime Traffic Rules Using Potential Fields. ICCL 2015: 298-312 - 2014
- [j13]Johannes Nygren, Kristiaan Pelckmans, Bengt Carlsson:
Approximate adjoint-based iterative learning control. Int. J. Control 87(5): 1028-1046 (2014) - [c29]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
On the Risk Exposure of Smart Home Automation Systems. FiCloud 2014: 183-190 - 2013
- [j12]Dejan Baca, Bengt Carlsson, Kai Petersen, Lars Lundberg:
Improving software security with static automated code analysis in an industry setting. Softw. Pract. Exp. 43(3): 259-279 (2013) - [c28]Bengt Carlsson, Andreas Jacobsson:
An Evolutionary View of Collective Intelligence. ICAART (2) 2013: 571-577 - [c27]Tigist Ayalew, Tigist Kidane, Bengt Carlsson:
Identification and Evaluation of Security Activities in Agile Projects. NordSec 2013: 139-153 - 2012
- [e1]Audun Jøsang, Bengt Carlsson:
Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Lecture Notes in Computer Science 7617, Springer 2012, ISBN 978-3-642-34209-7 [contents] - 2011
- [c26]Darine Zambrano, Soma Tayamon, Bengt Carlsson, Torbjörn Wigren:
Identification of a discrete-time nonlinear Hammerstein-Wiener model for a selective catalytic reduction system. ACC 2011: 78-83 - [c25]Dejan Baca, Bengt Carlsson:
Agile development with security engineering activities. ICSSP 2011: 149-158 - [c24]Anton Borg, Martin Boldt, Bengt Carlsson:
Simulating Malicious Users in a Software Reputation System. STA 2011: 147-156 - 2010
- [j11]Peng Zhang, Bengt Carlsson, Stefan J. Johansson:
Enhanced collaboration in diabetic healthcare for children using multi-agent systems. Int. J. Agent Oriented Softw. Eng. 4(2): 155-173 (2010) - [c23]Martin Boldt, Anton Borg, Bengt Carlsson:
On the Simulation of a Software Reputation System. ARES 2010: 333-340
2000 – 2009
- 2009
- [c22]Dejan Baca, Kai Petersen, Bengt Carlsson, Lars Lundberg:
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? ARES 2009: 804-810 - 2008
- [j10]Linda Brus, Torbjörn Wigren, Bengt Carlsson:
Initialization of a Nonlinear Identification Algorithm Applied to Laboratory Plant Data. IEEE Trans. Control. Syst. Technol. 16(4): 708-716 (2008) - [c21]Bengt Carlsson, Paul Davidsson, Andreas Jacobsson, Stefan J. Johansson, Jan A. Persson:
Security Aspects on Inter-organizational Cooperation Using Wrapper Agents. ATOP@AAMAS 2008: 220-233 - [c20]Bengt Carlsson, K. Ingemar Jönsson, Keith L. Clark:
Describing Cryptobiosis as a Time Based Protection System Using Petri Nets. BIOSIGNALS (1) 2008: 281-285 - [c19]Dejan Baca, Bengt Carlsson, Lars Lundberg:
Evaluating the cost reduction of static code analysis for software security. PLAS 2008: 79-88 - 2007
- [j9]Bengt Carlsson, K. Ingemar Jönsson:
The Success of Cooperative Strategies in the Iterated Prisoner's Dilemma and the Chicken Game. Scalable Comput. Pract. Exp. 8(1) (2007) - [c18]Martin Boldt, Bengt Carlsson, Roy Martinsson:
Software Vulnerability Assessment Version Extraction and Verification. ICSEA 2007: 59 - [c17]Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén:
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. Secure Data Management 2007: 142-157 - 2006
- [c16]Paul Davidsson, Anders Hederstierna, Andreas Jacobsson, Jan A. Persson, Bengt Carlsson, Stefan J. Johansson, Anders Nilsson, Gunnar Ågren, Stefan Östholm:
The Concept and Technology of Plug and Play Business. ICEIS (4) 2006: 213-217 - [c15]Martin Boldt, Bengt Carlsson:
Analysing Countermeasures Against Privacy-Invasive Software. ICSEA 2006: 61 - [c14]Martin Boldt, Bengt Carlsson:
Privacy-Invasive Software and Preventive Mechanisms. ICSNC 2006: 21 - 2005
- [j8]Pär Samuelsson, Hans Norlander, Bengt Carlsson:
An integrating linearization method for Hammerstein models. Autom. 41(10): 1825-1828 (2005) - [j7]Pär Samuelsson, Björn Halvarsson, Bengt Carlsson:
Interaction analysis and control structure selection in a wastewater treatment plant model. IEEE Trans. Control. Syst. Technol. 13(6): 955-964 (2005) - [c13]Bengt Carlsson, Dejan Baca:
Software Security Analysis - Execution Phase Audit. EUROMICRO-SEAA 2005: 240-247 - [c12]Bengt Carlsson, Andreas Jacobsson:
On Contamination in Information Ecosystems. HICSS 2005 - 2004
- [c11]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
Privacy Invasive Software in File-Sharing Tools. International Information Security Workshops 2004: 277-292 - 2002
- [j6]Bengt Carlsson, Paul Davidsson:
Surplus Values in Information Ecosystems. Int. J. Inf. Technol. Decis. Mak. 1(3): 559 (2002) - [c10]Bengt Carlsson, K. Ingemar Jönsson:
Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions. SAC 2002: 42-48 - 2001
- [b1]Bengt Carlsson:
Conflicts in Information Ecosystems. Blekinge Institute of Technology, Sweden, 2001 - [c9]Bengt Carlsson, Rune Gustavsson:
The Rise and Fall of Napster - An Evolutionary Approach. Active Media Technology 2001: 347-354 - [c8]Bengt Carlsson, Rune Gustavsson:
Arms Race within Information Ecosystems. CIA 2001: 202-207 - [c7]Bengt Carlsson:
The Tragedy of the Commons - Arms Race within Peer-to-Peer Tools. ESAW 2001: 119-133 - 2000
- [c6]Stefan J. Johansson, Paul Davidsson, Bengt Carlsson:
Coordination Models for Dynamic Resource Allocation. COORDINATION 2000: 182-197
1990 – 1999
- 1999
- [j5]H. Howard Fan, Torsten Söderström, Magnus Mossberg, Bengt Carlsson, Yuanjie Zou:
Estimation of continuous-time AR process parameters from discrete-time data. IEEE Trans. Signal Process. 47(5): 1232-1244 (1999) - 1998
- [c5]H. Howard Fan, Torsten Söderström, Magnus Mossberg, Bengt Carlsson, Yuenjie Zon:
Continuous-time AR process parameter estimation from discrete-time data. ICASSP 1998: 2333-2336 - [c4]Stefan J. Johansson, Bengt Carlsson, Magnus Boman:
Modeling Strategies as Generous and Greedy in Prisoner's Dilemma like Games. SEAL 1998: 285-292 - 1997
- [j4]Torsten Söderström, Howard Fan, Bengt Carlsson, Stefano Bigi:
Least squares parameter estimation of continuous-time ARX models from discrete-time data. IEEE Trans. Autom. Control. 42(5): 659-673 (1997) - [c3]Bengt Carlsson, Stefan J. Johansson:
An Iterated Hawk-and-Dove Game. Agents and Multi-Agent Systems Formalisms, Methodologies, and Applications 1997: 179-192 - 1995
- [c2]Bengt Carlsson:
An Evolutionary Model of Multi-Agent Systems. DAI 1995: 58-69 - 1994
- [j3]Bengt Carlsson, Peter Händel:
A notch filter based on recursive least-squares modelling. Signal Process. 35(3): 231-239 (1994) - 1992
- [j2]Bengt Carlsson, Mikael Sternad, Anders Ahlén:
Digital differentiation of noisy data measured through a dynamic system. IEEE Trans. Signal Process. 40(1): 218-221 (1992) - [c1]Bengt Carlsson, Peter Händel:
Analysis and interpretation of a constrained notch filter. ICASSP 1992: 293-296 - 1991
- [j1]Bengt Carlsson, Anders Ahlén, Mikael Sternad:
Optimal differentiation based on stochastic signal models. IEEE Trans. Signal Process. 39(2): 341-353 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint