• Experimental Evaluation of Handover Strategies in 5G-MEC Scenario by using AdvantEDGE 

      Garroppo, Rosario G.; Volpi, Marco; Nencioni, Gianfranco; Wadatkar, Prachi Vinod (Chapter, 2022)
      The 5G-MEC architecture increases the heterogene-ity and dynamicity of the available resources, presenting unique and competing challenges to researchers, network designers, and application developers. Recent studies ...
    • Exploring the need for a CERT for the Norwegian Construction Sector 

      Skytterholm, Andrea Neverdal; Jaatun, Martin Gilje (Chapter, 2023)
      This paper presents an empirical study on the need for sector-specific CERT capacity in the Norwegian construction sector. Findings from the interviews demonstrate a need for developing competence in ICT security in this ...
    • An Extensible Framework for Implementing and Validating Byzantine Fault-tolerant Protocols 

      Gogada, Hanish; Jehl, Leander; Meling, Hein; Olsen, John Ingve (Chapter, 2023-06)
      HotStuff is a Byzantine fault-tolerant state machine replication protocol that incurs linear communication costs to achieve consensus. This linear scalability promoted the protocol to be adopted as the consensus mechanism ...
    • Formal Verification of HotStuff 

      Jehl, Leander (Chapter, 2021)
      HotStuff is a recent algorithm for repeated distributed consensus used in permissioned blockchains. We present a simplified version of the HotStuff algorithm and verify its safety using both Ivy and the TLA Proof Systems ...
    • From Baseline to Top Performer: A Reproducibility Study of Approaches at the TREC 2021 Conversational Assistance Track 

      Lajewska, Weronika; Balog, Krisztian (Chapter, 2023)
      This paper reports on an effort of reproducing the organizers’ baseline as well as the top performing participant submission at the 2021 edition of the TREC Conversational Assistance track. TREC systems are commonly regarded ...
    • GPensim: a new petri net simulator 

      Davidrajuh, Reggie (Chapter; Peer reviewed, 2010)
    • Hydraulic Behavior in Cased and Open Hole Sections in Highly Deviated Wellbores 

      Ytrehus, Jan David; Lund, Bjørnar; Taghipour, Ali; Kosberg, Birgitte Ruud; Carazza, Luca; Gyland, Knud Richard; Saasen, Arild (Chapter, 2019)
      In this paper we present results from flow loop experiments with an oil-based drilling fluid with micronized barite as weight materials. The use of micronized barite allows using lower viscosity drilling fluid, providing ...
    • Identifying hazards to include in risk analyses 

      Leonhardsen, Mette; Olsen, Odd Einar Falnes; Nilsen, Aud Solveig (Peer reviewed; Chapter, 2018)
      A risk analysis should provide decision makers with information regarding relevant hazards. The initiating phase, where the risk analysts identify hazards to be included in the risk analysis, lays the foundation for the ...
    • Invasive cancerous area detection in non-muscle invasive bladder cancer whole slide images 

      Fuster Navarro, Saul; Khoraminia, Farbod; Kiraz, Umay; Kanwal, Neel; Kvikstad, Vebjørn; Eftestøl, Trygve Christian; Zuiverloon, Tahlita C M; Janssen, Emiel; Engan, Kjersti (Chapter, 2022)
      Bladder cancer patients’ stratification into risk groups relies on grade, stage and clinical factors. For non-muscle invasive bladder cancer, T1 tumours that invade the subepithelial tissue are high-risk lesions with a ...
    • The Isolation Concept in the 5G Network Slicing 

      Gonzalez, Andres J.; Ordonez-Lucena, Jose; Helvik, Bjarne Emil; Nencioni, Gianfranco; Xie, Min; Lopez, Diego R.; Grønsund, Pål R. (Chapter, 2020)
      The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ...
    • Learning control applied to a digital-to-analogue converter 

      van Rijt, Noa; Faza, Ahmad Mohammad Ahmad; Oomen, Tom; Eielsen, Arnfinn Aas (Chapter, 2023)
      Digital-to-analogue converters (DACs) exhibit several non-ideal effects that deteriorate performance. Methods in feedback control can reduce such effects. Due to implementation limitations, the feedback signal in existing ...
    • Making sense of nonsense : Integrated gradient-based input reduction to improve recall for check-worthy claim detection 

      Sheikhi, Ghazaal; Opdahl, Andreas Lothe; Touileb, Samia; Setty, Vinay (CEUR Workshop Proceedings;, Chapter, 2023)
      Analysing long text documents of political discourse to identify check-worthy claims (claim detection) is known to be an important task in automated fact-checking systems, as it saves the precious time of fact-checkers, ...
    • Map-based interfaces for common operational picture 

      Opach, Tomasz; Rød, Jan Ketil; Munkvold, Bjørn Erik; Radianti, Jaziar; Steen-Tveit, Kristine; Grottenberg, Lars Ole (Chapter, 2020)
      Common operationalpicture (COP) map-based interfacesdisplay operational information to support integrationofemergency responders. Such interfacesintegrate different subsystems and present the resulting information into an ...
    • MigraMEC: Hybrid Testbed for MEC App Migration 

      Wadatkar, Prachi Vinod; Garroppo, Rosario G.; Nencioni, Gianfranco (Chapter, 2023)
      Multi-access Edge Computing (MEC) enhances the capabilities of 5G by enabling the computation closer to the end-user for real-time and context-aware services. One of the main challenges of MEC is the migration of the MEC ...
    • Minimizing the Cost of 5G Network Slice Broker 

      Ali, Gohar; Nencioni, Gianfranco (Chapter, 2021)
      Network slicing is a key enabler of the fifth-generation (5G) of mobile networks. It allows creating multiple logical networks, i.e. network slices, with heterogeneous requirements over a common underlying infrastructure. ...
    • Mitigating non-linear DAC glitches using dither in closed-loop nano-positioning applications 

      Faza, Ahmad Mohammad Ahmad; Leth, John; Eielsen, Arnfinn Aas (American Control COnference (ACC);, Chapter, 2023)
      Digital-to-analog conversion is essential in digital signal processing applications, including closed-loop control schemes. Noise and distortion in digital-to-analog converters result in reduced performance for high-precision ...
    • Modeling and Evaluating NFV-Enabled Network Services under Different Availability Modes 

      Tola, Besmir; Nencioni, Gianfranco; Helvik, Bjarne Emil; Jiang, Yuming (Chapter, 2019)
      Network and Telecom operators are continuously embracing the adoption of Network Function Virtualization (NFV) as a means to provide more agile, flexible and cost-efficient services. Many telecommunication services need ...
    • Modeling and identification of the Quanser Aero using a detailed description of friction and centripetal forces 

      Dyvik, Mathias; Fjereide, Didrik Efjestad; Rotondo, Damiano (Chapter, 2023)
      This paper deals with the modeling and identification of the Quanser Aero. The Quanser Aero is an aerospace laboratory setup designed for teaching aerospace concepts. Two propellers generate thrust and allow the user to ...
    • Modelling ethical decisions 

      Davidrajuh, Reggie (Chapter; Peer reviewed, 2010)