Search
Now showing items 1701-1775 of 1775
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Introduction
Ductal carcinoma in situ (DCIS) is a non-invasive lesion of the breast that is frequently detected by mammography and subsequently removed by surgery. However, it is estimated that about half ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background
Bacterial genomes possess varying GC content (total guanines (Gs) and cytosines (Cs) per total of the four bases within the genome) but within a given genome, GC content can vary locally along ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background
Several high-density oligonucleotide microarray platforms are available for genome-wide single nucleotide polymorphism (SNP) detection and microarray-based comparative genomic hybridisation (array ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background
Quantitative real-time RT-PCR (RT-qPCR) is a highly sensitive method for mRNA quantification, but requires invariant expression of the chosen reference gene(s). In pathological myocardium, there ...
(Master thesis / Masteroppgave, 2010)
This paper considers computing accurate solutions on the interval [0, 1000] of ordinary differential equations. This includes implementation of high precision ode solvers and methods to verify the accuracy of the computed ...
(Chapter / Bokkapittel / PublishedVersion; Peer reviewed, 2010)
(Master thesis / Masteroppgave, 2010)
Streaming media files over the Internet have become highly popular in recent years, and the requirements for network resources, and client and server hardware have grown. In this thesis, we argue that today’s unicast ...
(Master thesis / Masteroppgave, 2010)
The planning of constraint-based operations using evolutionary algorithms is an optimization problem that involves finding a chain of operations appearing in a valid left-right or right-left order. This type of planning ...
(Master thesis / Masteroppgave, 2010)
Moderne datamaskiner blir stadig mer parallelle. Det er nå vanlig at prosessorer har alt fra 2 til 8 kjerner. I tillegg blir det også mer vanlig å benytte skjermkort som en medprosessor for enkelte typer beregninger. Dette ...
(Conference object / Konferansebidrag, 2010)
The 10th European Conference on Underwater Acoustics (ECUA). 2010, Istanbul, Turkey.
Mainstream sonars transmit and receive signals at the same frequency. As water is a nonlinear medium, a propagating signal generates ...
(Master thesis / Masteroppgave, 2010)
This thesis reports the results from a literature review conducted on the topic of code smells and refactoring. Code smells are segments of the source code that display potential design issues. Refactoring is the process ...
(Master thesis / Masteroppgave, 2010)
The work of this thesis has comprised addressing issues regarding design and development of composite Domain-Specific Languages, evaluation of DSLs with respect to frameworks, and meta modelling using components.
COMPOSITE ...
(Master thesis / Masteroppgave, 2010)
Denne masteroppgåva fordjupar seg i Multiple MAC Registration Protocol (MMRP) frå IEEE Std. 802.1ak-2007, og multicast i Ethernet. Det er gjort ein teoretisk studie rundt oversetjing frå IP versjon 4 multicast til Ethernet ...
(Master thesis / Masteroppgave, 2010)
Typically, cloud computing has been embraced by businesses. However, this master thesis introduces the personal cloud – a new cloud concept proposed to address personal needs. By bringing cloud computing into the personal ...
(Master thesis / Masteroppgave, 2010)
Indoor Positioning Systems (IPS) have lead to increased e ciency in many types of organizations and industries, and more and more companies embrace the new opportunities and functionality found in IPS solutions. Because ...
(Master thesis / Masteroppgave, 2010)
State of the art image analysis techniques such as SURF feature detection and description are fused with muiltple view geometry theory in order to implement a Structure from Motion pipeline. The Structure from Motion ...
(Master thesis / Masteroppgave, 2010)
En studie av hvordan Microsoft Norge bruker sine kommunikasjonsverktøy: Live Meeting, Communicator, Groove, Sharepoint og e-post.
Sammenliknet med undersøkelser gjort i andre Norske bedrifter av deres bruk av kommunikasj ...
(Master thesis / Masteroppgave, 2010)
Når et IT-prosjekt settes i gang og et selskap får i oppdrag å utvikle et system for en kunde, er det ofte forbundet med stor risiko og usikkerhet. Det finnes svært mange eksempler på store IT-prosjekter som overskrider ...
(Master thesis / Masteroppgave, 2010)
The District Health Information System, version 2 (DHIS 2) is a complex health information system for collecting, analyzing and reporting health related data. DHIS 2 is free and open source and is implemented in many ...
(Master thesis / Masteroppgave, 2010)
Denne masteroppgaven gir en vurdering og sammenligning av flere datakriminaltekniske verktøy, med et spesielt fokus på to spesifikke verktøy. Det første kalles EnCase Forensics og er et kommersielt tilgjengelig verktøy som ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Introduction
Mammographic density (MD), as assessed from film screen mammograms, is determined by the relative content of adipose, connective and epithelial tissue in the female breast. In epidemiological ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background
Combining gene expression microarrays and high resolution magic angle spinning magnetic resonance spectroscopy (HR MAS MRS) of the same tissue samples enables comparison of the transcriptional ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Cross-layer interaction of Distributed Coordination Function (DCF) of 802.11 MAC protocol and TCP transport protocol leads to two types of unfairness. In a mixed traffic scenario, short-lived TCP flows suffer from poor ...
(Doctoral thesis / Doktoravhandling, 2010)
The emergence of large and complex software systems increases the interest in model-driven engineering, as a way to lower the cost of development and maintenance of software. Models allow us to hide irrelevant details, ...
(Doctoral thesis / Doktoravhandling, 2010)
(Doctoral thesis / Doktoravhandling, 2010)
Efficient information sharing among rescue personnel is crucial for a successful rescue operation. If computer networks were actively used by the rescue personnel, it would allow for more efficient communication, and ...
(Doctoral thesis / Doktoravhandling, 2010)
Demand for mobile and personal communications is growing at a rapid pace, both in terms of the number of potential users and introduction of new high-speed services. Meeting this demand is challenging since wireless ...
(Master thesis / Masteroppgave, 2010)
This thesis reproduces the properties of load interference common in many storage devices using resource sharing for flexibility and maximum hardware utilization. The nature of resource sharing and load is studied and ...
(Master thesis / Masteroppgave, 2010)
Massively Multiplayer Online Games have become a popular leisure activ
ity and big business. They have also become targets for attacks beyond
the personally motivated cheating attempts. The opportunity to make real
money ...
(Master thesis / Masteroppgave, 2010)
In 2002, the FCC released an unlicensed UWB frequency band from 3.1 GHz to 10.6 GHz. This frequency band opens for new wireless applications. Most wireless applications need analog front-end for interfacing the antenna, ...
(Master thesis / Masteroppgave, 2010)
Today, virtualization is one focus of attention in computing community. The management of virtual machines become a big challenge for system administrators. In order to alleviate this problem, this project introduce a ...
Checking consistency of Bayesian networks with semantic annotations Restricted Access
(Master thesis / Masteroppgave, 2010)
Oppgaven er en undersøkelse av i hvilken grad det er mulig å bruke semantiske notasjoner på nodene i et Bayesiansk nettverk for å bevise om modelleringen av nettverket er konsistent med en spesifikasjon gitt av en ontologi. ...
Evaluating web performance on Windows Server 2008 R2 Hyper-V Restricted Access
(Master thesis / Masteroppgave, 2010)
(Master thesis / Masteroppgave, 2010)
Disaster recovery solutions for any system are complicated and in most cases expensive. Implementing DR solutions on service level is also
not the best solution since it requires major efforts on each service. Remus, a ...
From talk to text production with EssayCritic : Scaffolds in the early phases of the writing process
(Master thesis / Masteroppgave, 2010)
As computers are steadily gaining entry to places of learning, people seek to use them to the fullest. Not only can they be used as an instrument toward gaining knowledge and experience, they can also take an active role ...
(Master thesis / Masteroppgave, 2010)
In this thesis we give a quick overview of Photon Mapping, and two articles on how this can be accelerated on the GPU. We then explore how the solution from one of the articles can be extended to find a variably sized ...
(Master thesis / Masteroppgave, 2010)
Finding useful texture based features is often hard, even if there are clear patterns in the material at hand, but it will be a very useful contribution to any classification process as the texture might be uncorrelated ...
(Master thesis / Masteroppgave, 2010)
Masteroppgåva prøver å besvara problemstillingar om val av testteknikkar for testing og feilsøking generelt, samt korleis Riksarkivet sitt SAS-program Arkade best bør testast/feilsøkast.
Testteknikkar har innverknad på kva ...
(Master thesis / Masteroppgave, 2010)
Event-Driven Business Process Management (EDBPM) is an emerging discipline that combines modern Business Process Management (BPM) solutions with the techniques of Complex Event Processing (CEP), providing situational ...
(Master thesis / Masteroppgave, 2010)
Tidligere forskning på prototyper i brukertesting har hovedsakelig fokusert på sammenligningen av tradisjonelle high- og low-fidelity prototyper. Utviklingen av ny teknologi gir interaksjonsdesignere stadig mer avanserte ...
(Master thesis / Masteroppgave, 2010)
Identity overload and password fatigue is a common problem for
people who engage in online activities. Federation can be a mitigation
against password fatigue problem. Federated identity management
aims at reducing this ...
(Master thesis / Masteroppgave, 2010)
Felles for mentor-protesjé-forhold er at begge parter må legge nødvendig med tid og ressurser i selve samarbeidet, at mentoren har gode pedagogiske evner, god kunnskap innen de feltene han hjelper gründeren med og er flink ...
ESA: Enterprise Service Architecture Restricted Access
(Master thesis / Masteroppgave, 2010)
The Service oriented perspective is emerging as an important view both for business architecture and IT architecture in the overall context of enterprise architectures. Many existing enterprise architecture frameworks like ...
(Master thesis / Masteroppgave, 2010)
Denne rapporten gir en gjennomgang av den trådløse sensornettverkstandarden WirelessHART, samt implementeringen av det fysiske laget og store deler av datalinklaget på mikrokontrollerbrikken AVR RAVEN fra Atmel.
Sensornettverk ...
(Master thesis / Masteroppgave, 2010)
Legacysystem er enno vanlege i programvareinstallasajonar omkring i verda. Dette gjeld serskilt i feltet health management information systems (HMIS) i utviklingsland. Legacysystem kostar tid og pengar og er dyre eller ...
(Master thesis / Masteroppgave, 2010)
Introduction:
In mobile ad-hoc networks, nodes should function autonomously, and
they should be able to adapt to their environment and any changes in it
without any external intervention. For nodes to be able to adapt to ...
(Master thesis / Masteroppgave, 2010)
I denne oppgaven blir forholdet mellom spillerens valg og questenes struktur og utfall vurdert ved å drøfte meningsfulle valg. Dette begrenses til rollespill som baserer seg på quester og som formidler en lineær historie. ...
(Master thesis / Masteroppgave, 2010)
This master thesis is a qualitative case study, carried out at Microsoft Norway. I have investigated different processes and strategies that are used for information distribution, work performance measurement, and learning ...
Modeling and analysis of the CoCoME case study with Creol Restricted Access
(Master thesis / Masteroppgave, 2010)
This thesis is about the modeling and analysis of the Common Component
Modeling Example (CoCoME) case study with the Creol language. We have
modeled the whole case study and our focus was the behavioral view of the CoCoME. ...
(Master thesis / Masteroppgave, 2010)
The thesis explores how a web-based calendar and reminder service called BirthdayHero could help users improve how well they remember birthdays, anniversaries and other important events. A primary goal is to use the design ...
(Master thesis / Masteroppgave, 2010)
Two non-moving concurrent garbage collectors tailored for realtime audio processing are described.
Both collectors work on copies of the heap to avoid cache misses and audio-disruptive synchronizations.
Both collectors are ...
(Master thesis / Masteroppgave, 2010)
Digitale kameraer har tatt over store deler av amatør og profesjonell fotografering gjennom det siste tiåret, og interessen for digitale speilreflekskameraer vokser. Mange av de som kjøper kameraer er amatører, og kameraer ...
(Master thesis / Masteroppgave, 2010)
Cybercrime is a serious social problem. Data security threats affect not only large financial organizations and government department but also personal computer users. It is very common that laptops or USB drivers are ...
(Master thesis / Masteroppgave, 2010)
Utgangspunktet for denne oppgaven er at SolidGroup ønsket å få utviklet en mobil løsning for deres ERP-produkter. Løsningen skulle utvikles for SAP-systemer i form av en applikasjon på en mobil enhet.
Formålet med denne ...
(Master thesis / Masteroppgave, 2010)
I de senere år har hardwareprodusenter, i stedet for å øke klokkehastigheten, duplisert kjerner på prosessorer. Konsekvensen er at prosessorer stadig får flere kjerner. Skjermkortleverandører har også sett potensialet av ...
(Master thesis / Masteroppgave, 2010)
In order to have a compatible device in a sensor node in wireless sensor network, the sensors have to be made in micro-size, low cost, low power consumption and high performance. By using CMOS-MEMS technology, the micro ...
(Master thesis / Masteroppgave, 2010)
Service oriented architectures have become very popular the last few years. The abstraction of computer systems into a service paradigm bring many new solutions, both for cross business processes to aid interoperability ...
(Master thesis / Masteroppgave, 2010)
(Master thesis / Masteroppgave, 2010)
Volume rendering is a well known technique for visualizing volumetric data, and is commonly used in many areas of science. In four dimensional cardiac ultrasound (3D + time), volume rendering is used to present the user ...
(Master thesis / Masteroppgave, 2010)
Most high-level program languages have their own compiler to interpret and compile source code, and maybe execute it in the special hardware environment. It is, however, important to understand
the principles and functions ...
Motivation and User Satisfaction : A Study of Web-TV Users Restricted Access
(Master thesis / Masteroppgave, 2010)
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Activation of oxidative stress-responses and downregulation of insulin-like signaling (ILS) is seen in Nucleotide Excision Repair (NER) deficient segmental progeroid mice. Evidence suggests that this is a survival response ...
An Empirical Study of a Free Software Company Restricted Access
(Master thesis / Masteroppgave, 2010)
Free software has matured well into the commercial software market, yet little qualitative research
exists which accurately describes the state of commercial free software today. For this thesis, an
instrumental case study ...
(Master thesis / Masteroppgave, 2010)
Java Virtual Machine (JVM) er en populær programvare-plattform som kjører programmer i Java bytecode. JVM støtter mange forskjellige programmeringsspråk med forskjellig tilnærming til typing, programmeringsparadigme og ...
(Master thesis / Masteroppgave, 2010)
Geographic information system (GIS) implementations have a tendency to fail in developing countries. This thesis seeks to explore whether a web based free/open source software (FOSS) development approach can improve chances ...
(Master thesis / Masteroppgave, 2010)
Search-based Software Test Data Generation is a field of research
treating test input generation as a search problem. Search algorithms
require that an objective function computes the quality of solution candidates. When ...
Daily Drilling Report using QuOnto Restricted Access
(Master thesis / Masteroppgave, 2010)
Oil and gas operators in Norway are daily reporting to the Norwegian authorities; they do this by submitting a report called "Daily Drilling Report".
These reports are created individually by each of the operator.
The ...
(Research report / Forskningsrapport, 2010)
Biomolecular interaction data is an increasingly important bioinformatics dataset used to examine biological systems. However, these data are spread across multiple databases and expressed in disparate data structures and ...
(Research report / Forskningsrapport, 2010)
Modular system development causes challenges for security and safety as upgraded subcomponents may interact with the system in unforeseen ways. Due to their lack of modularity, conventional risk analysis methods are poorly ...
(Master thesis / Masteroppgave, 2010)
Utviklingen har bidratt til at to verdener som har stått langt fra hverandre, nå kan møtes gjennom en felles plattform, til nytte for begge parter. På den ene siden er det myndighetene som utvikler juridisk regelverk i ...
(Master thesis / Masteroppgave, 2010)
This thesis aims to examine radiation tolerance of low power digital CMOS circuits in a commercial 90 nm low power triple-well process from TSMC. By combining supply voltage scaling and Radiation-Hardened By Design (RHBD) ...
(Master thesis / Masteroppgave, 2010)
Abstract
The M2M is a fairly new term and has been widely used in recent years.The capability and ability to build a network infrastructure of ubiquitous devices that performs automatic data transfer. The standard for ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background Eschericia coli AlkB is a 2-oxoglutarate- and iron-dependent dioxygenase that reverses alkylated DNA damage by oxidative demethylation. Mouse AlkB homolog 1 (Alkbh1) is one of eight members of the newly discovered ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Background Despite comprehensive investigation, the Escherichia coli SOS response system is not yet fully understood. We have applied custom designed whole genome tiling arrays to measure UV invoked transcriptional changes ...
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2010)
Huntington's disease (HD) is one of several neurodegenerative disorders caused by expansion of CAG repeats in a coding gene. Somatic CAG expansion rates in HD vary between organs, and the greatest instability is observed ...