Now showing items 1807-1826 of 3362

  • Vega-Gorgojo, Guillermo; Slaughter, Laura; Zernichow, Bjørn Marius von; Nikolov, Nikolay; Roman, Dumitru (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2019)
    Linked Data exploration is an essential task in the process of understanding, assessing, and using datasets made available in the Resource Description Framework (RDF) format. Current solutions for exploration of RDF data ...
  • Frimannslund, Trine (Master thesis / Masteroppgave, 2015)
  • Pandey, Vikash; Holm, Sverre (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2016)
    Many of the most interesting complex media are non-Newtonian and exhibit time-dependent behavior of thixotropy and rheopecty. They may also have temporal responses described by power laws. The material behavior is represented ...
  • Mosebekk, Petter (Master thesis / Masteroppgave, 2005)
    The eXplicit Control Protocol (XCP) was released as an RFC draft on October 17, 2004. In this paper we have looked into the theory behind the development of XCP. In addition, we created a working Linux implementation of ...
  • Jørgensen, Adrian Hjørnevik (Master thesis / Masteroppgave, 2014)
    The use of multimedia streaming on the internet is increasing. With this the need for new protocols is created. The Datagram Congestion Control Protocol (DCCP) can support this better than other existing protocols like ...
  • Wangberg, Ruben (Master thesis / Masteroppgave, 2010)
    This thesis reports the results from a literature review conducted on the topic of code smells and refactoring. Code smells are segments of the source code that display potential design issues. Refactoring is the process ...
  • Walla, Alf-Andre (Master thesis / Masteroppgave, 2017)
  • Jacobsen, Niklas (Master thesis / Masteroppgave, 2016)
    The need for computing power is constantly increasing and this has popularized the utilization of specialized computing units, such as a Graphics Processing Unit (GPU), for general-purpose computing. General-purpose GPUs ...
  • Halvorsen, Stig Magnus (Master thesis / Masteroppgave, 2014)
    Video games have proven to be an interesting platform for computer scientists, as many games demand the latest technology, fast response times and effective utilization of hardware. Video games have been used both as a ...
  • Skevik, Gorm Unnli (Master thesis / Masteroppgave, 2014)
    Historically, the use of graphics cards for scientific computing has yielded great performance. Order-of-magnitude performance gains has been obtained over the CPU (Owens et al. 2008). This is mainly due to their massively ...
  • Chung, Hwei-Ming; Li, Wen-Tai; Yuen, Chau; Chung, Wei-Ho; Zhang, Yan; Wen, Chao-Kai (Journal article / Tidsskriftartikkel / AcceptedVersion; Peer reviewed, 2018)
    Malicious attacks in the power system can eventually result in a large-scale cascade failure if not rectified in a timely manner. These attacks, which are traditionally classified into physical and cyber attacks, can be ...
  • Fiva, Jon H.; Halse, Askill Harkjerr (Journal article / Tidsskriftartikkel / AcceptedVersion; Peer reviewed, 2016)
    Pork barrel spending is typically attributed to the strategic behavior of political elites hoping to be electorally rewarded by voters residing in their districts. Such behavior is expected to depend on the incentives ...
  • Riise, Atle; Burke, Edmund K. (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2011)
    We present a model for the surgery admission planning problem, and a meta-heuristic algorithm for solving it. The problem involves assigning operating rooms and dates to a set of elective surgeries, as well as scheduling ...
  • Jøsang, Audun; Rosenberger, Christophe; Miralabé, Laurent; Klevjer, Henning; Varmedal, Kent A; Daveau, Jérôme; Husa, Knut E; Taugbøl, Petter (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2015)
    Identity management is a rather general concept that covers technologies, policies and procedures for recognising and authenticating entities in ICT environments. Current identity management solutions often have inadequate ...
  • Buccino, Alessio Paolo; Ness, Torbjørn Vefferstad; Einevoll, Gaute; Cauwenberghs, Gert; Häfliger, Philipp (Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2017)
    With the latest development in the design and fabrication of high-density Multi-Electrode Arrays (MEA) for in-vivo neural recordings, the spatiotemporal information in the recorded signals allows for refined estimation of ...
  • Lee, Brendan Johan (Master thesis / Masteroppgave, 2011)
    The future is mobile and location aware. More and more of our gadgets are portable and have an online presence. For our location-aware mobile future to be safe, we need to demand that our privacy and anonymity be protected. ...
  • Burdeus, Jaime Font (Doctoral thesis / Doktoravhandling, 2017)
    Most Software Product Lines are built from a set of existing products, that is re-engineered into reusable assets following feature location approaches. Traditional feature location approaches target program code, neglecting ...
  • Cheremetiev, Valeri (Master thesis / Masteroppgave, 2008)
    This thesis considers ways that analysis of Opera mini logs can assist decisions related to global and local load balancing of Opera mini clusters. The analy- sis is aimed to determine the distribution of traffic with ...
  • Ivanovska, Magdalena; Giese, Martin (Research report / Forskningsrapport, 2011)
    We propose a novel approach to the well-studied problem of making a nite, ordered sequence of decisions under uncertainty. Most existing work in this area concentrates on graphical representations of decision problems, ...
  • Jimenez-Ruiz, Ernesto (Chapter / Bokkapittel / PublishedVersion; Peer reviewed, 2019)
    We present the participation of LogMap and its variants in the OAEI 2019 campaign. The LogMap project started in January 2011 with the objective of developing a scalable and logic-based ontology matching system. This is ...