Blar i Faculty of Science and Technology på dokumenttype "Chapter"
Viser treff 21-40 av 64
-
Exploring the need for a CERT for the Norwegian Construction Sector
(Chapter, 2023)This paper presents an empirical study on the need for sector-specific CERT capacity in the Norwegian construction sector. Findings from the interviews demonstrate a need for developing competence in ICT security in this ... -
An Extensible Framework for Implementing and Validating Byzantine Fault-tolerant Protocols
(Chapter, 2023-06)HotStuff is a Byzantine fault-tolerant state machine replication protocol that incurs linear communication costs to achieve consensus. This linear scalability promoted the protocol to be adopted as the consensus mechanism ... -
Formal Verification of HotStuff
(Chapter, 2021)HotStuff is a recent algorithm for repeated distributed consensus used in permissioned blockchains. We present a simplified version of the HotStuff algorithm and verify its safety using both Ivy and the TLA Proof Systems ... -
From Baseline to Top Performer: A Reproducibility Study of Approaches at the TREC 2021 Conversational Assistance Track
(Chapter, 2023)This paper reports on an effort of reproducing the organizers’ baseline as well as the top performing participant submission at the 2021 edition of the TREC Conversational Assistance track. TREC systems are commonly regarded ... -
GPensim: a new petri net simulator
(Chapter; Peer reviewed, 2010) -
Hydraulic Behavior in Cased and Open Hole Sections in Highly Deviated Wellbores
(Chapter, 2019)In this paper we present results from flow loop experiments with an oil-based drilling fluid with micronized barite as weight materials. The use of micronized barite allows using lower viscosity drilling fluid, providing ... -
Identifying hazards to include in risk analyses
(Peer reviewed; Chapter, 2018)A risk analysis should provide decision makers with information regarding relevant hazards. The initiating phase, where the risk analysts identify hazards to be included in the risk analysis, lays the foundation for the ... -
Invasive cancerous area detection in non-muscle invasive bladder cancer whole slide images
(Chapter, 2022)Bladder cancer patients’ stratification into risk groups relies on grade, stage and clinical factors. For non-muscle invasive bladder cancer, T1 tumours that invade the subepithelial tissue are high-risk lesions with a ... -
The Isolation Concept in the 5G Network Slicing
(Chapter, 2020)The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ... -
Making sense of nonsense : Integrated gradient-based input reduction to improve recall for check-worthy claim detection
(CEUR Workshop Proceedings;, Chapter, 2023)Analysing long text documents of political discourse to identify check-worthy claims (claim detection) is known to be an important task in automated fact-checking systems, as it saves the precious time of fact-checkers, ... -
Map-based interfaces for common operational picture
(Chapter, 2020)Common operationalpicture (COP) map-based interfacesdisplay operational information to support integrationofemergency responders. Such interfacesintegrate different subsystems and present the resulting information into an ... -
MigraMEC: Hybrid Testbed for MEC App Migration
(Chapter, 2023)Multi-access Edge Computing (MEC) enhances the capabilities of 5G by enabling the computation closer to the end-user for real-time and context-aware services. One of the main challenges of MEC is the migration of the MEC ... -
Minimizing the Cost of 5G Network Slice Broker
(Chapter, 2021)Network slicing is a key enabler of the fifth-generation (5G) of mobile networks. It allows creating multiple logical networks, i.e. network slices, with heterogeneous requirements over a common underlying infrastructure. ... -
Mitigating non-linear DAC glitches using dither in closed-loop nano-positioning applications
(American Control COnference (ACC);, Chapter, 2023)Digital-to-analog conversion is essential in digital signal processing applications, including closed-loop control schemes. Noise and distortion in digital-to-analog converters result in reduced performance for high-precision ... -
A model for greener power generation for north-east Sri Lanka based on stand-alone renewable energy systems
(Chapter; Peer reviewed, 2009) -
Modeling and Evaluating NFV-Enabled Network Services under Different Availability Modes
(Chapter, 2019)Network and Telecom operators are continuously embracing the adoption of Network Function Virtualization (NFV) as a means to provide more agile, flexible and cost-efficient services. Many telecommunication services need ... -
Modeling and identification of the Quanser Aero using a detailed description of friction and centripetal forces
(Chapter, 2023)This paper deals with the modeling and identification of the Quanser Aero. The Quanser Aero is an aerospace laboratory setup designed for teaching aerospace concepts. Two propellers generate thrust and allow the user to ... -
Modelling ethical decisions
(Chapter; Peer reviewed, 2010) -
A Multi-Agent Reinforcement Learning Architecture for Network Slicing Orchestration
(Chapter, 2021)The Network Slicing (NS) paradigm is one of the pillars of the future 5G networks and is gathering great attention from both industry and scientific communities. In a NS scenario, physical and virtual resources are partitioned ... -
Numerical Modelling and Sensitivity Analysis of Gas Kick Migration and Unloading of Riser
(Chapter, 2019)In deepwater wells there is a risk of gas entering the riser. This can be caused by gas being trapped by the BOP after a well kill operation, or it can be that the BOP was not closed quickly enough upon kick detection. ...