Recent Submissions

  • Methods for preprocessing time and distance series data from personal monitoring devices 

    Wiktorski, Tomasz; Bjørkavoll-Bergseth, Magnus; Ørn, Stein (Peer reviewed; Journal article, 2020-06)
    There is a need to develop more advanced tools to improve guidance on physical exercise to reduce risk of adverse events and improve benefits of exercise. Vast amounts of data are generated continuously by Personal Monitoring ...
  • Visualization of generic utility of sequential patterns 

    Wiktorski, Tomasz; Królak, Aleksandra; Rosińska, Karolina; Strumillo, Pawel; Lin, Jerry Chun-Wei (Peer reviewed; Journal article, 2020-05)
    Most of the literature on utility pattern mining (UPM) assumes that the particular patterns' utility in known in advance. Concurrently, in frequent pattern mining (FPM) it is assumed that all patterns take the same value. ...
  • CCNA-Based Communication Technology Courses 

    Nencioni, Gianfranco; Kårstad, Terje Per (Peer reviewed; Journal article, 2020-04)
    Many study programs include courses on communication technology. All these courses explain the basis of communication technology, but they have different levels of detail depending on the study program and the related ...
  • Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model 

    Wang, Rui; Kristensen, Lars Michael; Meling, Hein; Stolz, Volker (Peer reviewed; Journal article, 2019-04)
    Implementing test suites for distributed software systems is a complex and time-consuming task due to the number of test cases that need to be considered in order to obtain high coverage. We show how a formal Coloured Petri ...
  • Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model 

    Wang, Rui; Kristensen, Lars Michael; Meling, Hein; Stolz, Volker (Peer reviewed; Journal article, 2019-04)
    Implementing test suites for distributed software systems is a complex and time-consuming task due to the number of test cases that need to be considered in order to obtain high coverage. We show how a formal Coloured Petri ...
  • A Novel Approach to Data Extraction on Hyperlinked Webpages 

    Shaukat, Kamran; Masood, Nayyer; Khushi, Matloob (Journal article; Peer reviewed, 2019-11)
    The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ...
  • A Widespread Review of Smart Grids Towards Smart Cities 

    Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Chunming, Rong (Journal article; Peer reviewed, 2019-11)
    Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
  • A Widespread Review of Smart Grids Towards Smart Cities 

    Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Rong, Chunming (Journal article; Peer reviewed, 2019-11)
    Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
  • Mixed convolutional and long short-term memory network for the detection of lethal ventricular arrhythmia 

    Picon, Artzai; Irusta, Unai; Alvarez-Gila, Aitor; Aramendi, Elisabete; Alonso-Atienza, Felipe; Figuera, Carlos; Ayala, Unai; Garrote, Estibaliz; Wik, Lars; Kramer-Johansen, Jo; Eftestøl, Trygve Christian (Journal article; Peer reviewed, 2019-05)
    Early defibrillation by an automated external defibrillator (AED) is key for the survival of out-of-hospital cardiac arrest (OHCA) patients. ECG feature extraction and machine learning have been successfully used to detect ...
  • Automatic Estimation of Coronary Blood Flow Velocity Step 1 for Developing a Tool to Diagnose Patients With Micro-Vascular Angina Pectoris 

    Khanmohammadi, Mahdieh; Sæland, Charlotte; Engan, Kjersti; Eftestøl, Trygve Christian; Larsen, Alf Inge (Journal article; Peer reviewed, 2019-01)
    Aim: Our aim was to automatically estimate the blood velocity in coronary arteries using cine X-ray angiographic sequence. Estimating the coronary blood velocity is a key approach in investigating patients with angina ...
  • Dependability of the NFV Orchestrator: State of the Art and Research Challenges 

    Gonzalez, Andres Javier; Nencioni, Gianfranco; Kamisinski, Andrzej; Helvik, Bjarne Emil; Heegaard, Poul Einar (Journal article; Peer reviewed, 2018)
    The introduction of network function virtualisation (NFV) represents a significant change in networking technology, which may create new opportunities in terms of cost efficiency, operations, and service provisioning. Although ...
  • Entity-Oriented Search 

    Balog, Krisztian (The Information Retrieval Series;39, Book, 2018)
    Search engines have become part of our daily lives. We use Google (Bing, Yandex, Baidu, etc.) as the main gateway to find information on theWeb.With a certain type of content in mind, we may search directly on a particular ...
  • Security Incident Information Exchange for Cloud Service Provisioning Chains 

    Frøystad, Christian; Tøndel, Inger Anne; Jaatun, Martin Gilje (Journal article; Peer reviewed, 2018-12)
    Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about ...
  • Orchestration and Control in Software-Defined 5G Networks: Research Challenges 

    Nencioni, Gianfranco; Garroppo, Rosario G.; Gonzalez, Andres J.; Helvik, Bjarne Emil; Procissi, Gregorio (Journal article; Peer reviewed, 2018-08)
    The fifth generation (5G) of cellular networks promises to be a major step in the evolution of wireless technology. 5G is planned to be used in a very broad set of application scenarios. These scenarios have strict ...
  • Risk in the Age of Software Security 

    Jaatun, Martin Gilje (Others, 2017)
    For general applications, it is way too costly to aim for 100 % secure software; for complex systems it may even be impossible. To achieve effective software security at reasonable cost, it is thus necessary to identify ...
  • Accountability Requirements in the Cloud Provider Chain 

    Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
    In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
  • Frå transistor til datamaskin 

    Tengesdal, Morten (Notater fra Universitetet i Stavanger;39, Report, 2018-04)
    Dette skrivet prøver å gi ei forståing av korleis datamaskinar er oppbygde og virkar. Ein ser også på korleis ein kan programmera mindre datamaskinar brukte til styring og overvaking av prosessar. Skrivet er laga for bruk ...
  • Machine learning techniques for the detection of shockable rhythms in automated external defibrillators 

    Figuera, Carlos; Irusta, Unai; Morgado, Eduardo; Aramendi, Elisabete; Ayala, Unai; Wik, Lars; Kramer-Johansen, Jo; Eftestøl, Trygve; Alonso-Atienza, Felipe (Journal article; Peer reviewed, 2016-07)
    Early recognition of ventricular fibrillation (VF) and electrical therapy are key for the survival of out-of-hospital cardiac arrest (OHCA) patients treated with automated external defibrillators (AED). AED algorithms for ...
  • A secure user authentication protocol for sensor network in data capturing 

    Quan, Zhou; Chumning, Tan; Chunming, Rong; Xianghan, Zhen (Journal article; Peer reviewed, 2015-04)
    Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ...
  • A risk assessment model for selecting cloud service providers 

    Cayirci, Erdal; Garaga, Alexandr; Santana de Oliveira, Anderson; Roudier, Yves (Journal article; Peer reviewed, 2016-09)
    The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ...

View more