Now showing items 2644-2663 of 4930

  • Seppälä, Toni T; Ahadova, Aysel; Dominguez-Valentin, Mev; Macrae, Finlay; Evans, D. G; Therkildsen, Christina; Sampson, Julian; Scott, Rodney; Burn, John; Möslein, Gabriela; Bernstein, Inge; Holinski-Feder, Elke; Pylvänäinen, Kirsi; Renkonen-Sinisalo, Laura; Lepistö, Anna; Lautrup, Charlotte K; Lindblom, Annika; Plazzer, John-Paul; Winship, Ingrid; Tjandra, Douglas; Katz, Lior H; Aretz, Stefan; Hüneburg, Robert; Holzapfel, Stefanie; Heinimann, Karl; Valle, Adriana D; Neffa, Florencia; Gluck, Nathan; de Vos tot Nederveen Cappel, Wouter H; Vasen, Hans; Morak, Monika; Steinke-Lange, Verena; Engel, Christoph; Rahner, Nils; Schmiegel, Wolff; Vangala, Deepak; Thomas, Huw; Green, Kate; Lalloo, Fiona; Crosbie, Emma J; Hill, James; Capella, Gabriel; Pineda, Marta; Navarro, Matilde; Blanco, Ignacio; ten Broeke, Sanne; Nielsen, Maartje; Ljungmann, Ken; Nakken, Sigve; Lindor, Noralane; Frayling, Ian; Hovig, Eivind; Sunde, Lone; Kloor, Matthias; Mecklin, Jukka-Pekka; Kalager, Mette; Møller, Pål (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2019)
    Background Recent epidemiological evidence shows that colorectal cancer (CRC) continues to occur in carriers of pathogenic mismatch repair (path_MMR) variants despite frequent colonoscopy surveillance in ...
  • Gjerstad, Julie; Kadiric, Fikret; Grov, Gudmund; Kjellstadli, Espen Hammer; Asprusten, Markus Leira (Chapter / Bokkapittel / AcceptedVersion; Peer reviewed, 2023)
    Development and evaluation of data-driven capabilities for both threat hunting and intrusion detection require high-quality and up-to-date datasets. The generation of such datasets poses multiple challenges, which has led ...
  • Jelisavcic, Milan; Glette, Kyrre; Haasdijk, Evert; Eiben, AE (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2019)
    We study evolutionary robot systems where not only the robot brains but also the robot bodies are evolvable. Such systems need to include a learning period right after ‘birth’ to acquire a controller that fits the newly ...
  • Munkvold, Bjørn Erik; Bygstad, Bendik (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2016)
    Qualitative research approaches are now well established in information systems research, and are given equal weight as quantitative research in research methods courses in graduate programs. Similar, the heated paradigm ...
  • Dang, Martin (Master thesis / Masteroppgave, 2016)
    Denne oppgaven handler om å undersøke atferden til Langtons maur og hvordan vi kan bruke maurens atferd til å konstruere logiske porter. Videre skal vi bruke de logiske portene til å utføre beregninger. Senere skal vi se ...
  • Wold, Sondre (Master thesis / Masteroppgave, 2022)
    Combining structured information with language models is a standing problem in NLP. Building on previous work, we study how lightweight neural networks, known as adapters, can be used to inject information from a knowledge ...
  • Karami, Farzane (Doctoral thesis / Doktoravhandling, 2023)
    Nowadays, compliance with the General Data Protection Regulation (GDPR) poses a significant challenge for enterprises processing personal data. The GDPR protects individuals' privacy and imposes strict requirements on the ...
  • Feten, Katrine (Master thesis / Masteroppgave, 2023)
    The implementation of the GDPR brought about the legal requirement of performing DPIAs on software systems. Consequently, many templates for performing DPIAs are available for use. However, common for most of them is that ...
  • Dahl, Geir; Storvik, G.; Fadnes, A. (Research report / Forskningsrapport, 1998)
    An important problem in image analysis is to segment an image into regions with different class-labels. This is releveant in applications in medicine and cartography. In a proper statistical framework this problem may be ...
  • Dahle, Torjus Kleng (Master thesis / Masteroppgave, 2020)
    The number of services that connect to the Internet is steadily increasing. Applications integrate with each other more than ever before. As such, the possible attack surface of a given entity is ever increasing as well. ...
  • Ali, Usman; Caso, Giuseppe; De Nardis, Luca; Kousias, Konstantinos; Rajiullah, Mohammad; Alay, Ozgu; Neri, Marco; Brunstrom, Anna; Di Benedetto, Maria-Gabriella (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2022)
    Understanding radio propagation characteristics and developing channel models is fundamental to building and operating wireless communication systems. Among others uses, channel characterization and modeling can be used ...
  • Nakken, Sigve; Rødland, Einar A; Rognes, Torbjørn; Hovig, Eivind (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2009)
    Background Recent segmental duplications are relatively large (≥ 1 kb) genomic regions of high sequence identity (≥ 90%). They cover approximately 4–5% of the human genome and play important roles in gene ...
  • Hapnes, Erlend Kristoffer Hatløy (Master thesis / Masteroppgave, 2023)
    Congestion control coupling methods rely on knowing if multiple flows between the same host-pair share the same bottleneck. However, IPv4 load balancing hash algorithms traditionally use data from the transport layer header ...
  • Munir, Imad (Master thesis / Masteroppgave, 2017)
    Cancer Registry stores cancer data collected through local cancer registries i.e., clinical department, hospitals, health communities etc. The purpose of collecting data is to understand and address the cancer disease more ...
  • Birkedal, Erlend (Master thesis / Masteroppgave, 2006)
    The amount of time critical data sent on the Internet is increasing. As a result, the networks are in danger of getting congested. When sending time critical data on congested networks, we risk that the data may get too ...
  • Lan, Dapeng; Pang, Zhibo; Fischione, Carlo; Liu, Yu; Taherkordi, Amirhosein; Eliassen, Frank (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2019)
    Proximity service (ProSe), using the geographic location and device information by considering the proximity of mobile devices, enriches the services we use to interact with people and things around us. ProSe has been used ...
  • Erikstad, Geir Arveschoug (Master thesis / Masteroppgave, 2009)
    Massive multiplayer online games (MMOGs) have stringent latency requirements, and must support a large amount of concurrent players. To handle these conflicting requirements, it is common to divide the virtual world into ...
  • Culén, Alma Leora (Chapter / Bokkapittel / SubmittedVersion, 2015)
    The paper presents a qualitative, interview-based study that seeks to describe participants’ perceptions and experiences with information and communication technology. The participants in the study were active people, aged ...
  • Antonsen, Einar Løvhøiden (Master thesis / Masteroppgave, 2017)
    The standard public-key cryptosystems used today relies mathematical problems that require a lot of computing force to solve, so much that, with the right parameters, they are computationally unsolvable. But there are ...
  • Salomonsen, Morten (Master thesis / Hovedoppgave, 1994)