Blar i Vitenskapelige publikasjoner (TN-IDE) på tittel
Viser treff 4-23 av 246
-
A Novel Approach to Data Extraction on Hyperlinked Webpages
(Journal article; Peer reviewed, 2019-11)The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ... -
A risk assessment model for selecting cloud service providers
(Journal article; Peer reviewed, 2016-09)The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ... -
A secure user authentication protocol for sensor network in data capturing
(Journal article; Peer reviewed, 2015-04)Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
Accountability Requirements for the Cloud
(Chapter, 2017)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ... -
Accountability Requirements in the Cloud Provider Chain
(Journal article; Peer reviewed, 2018-04)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ... -
Activity-Oriented Petri Net for scheduling of resources
(Conference object, 2012-10)This work presents a new methodology for modeling discrete systems in which activities compete for resources. The new methodology known as Activity-Oriented Petri Net (AOPN) allows modelers to concentrate on modeling ... -
Actuator and sensor fault estimation based on a proportional multiple‐integral sliding mode observer for linear parameter varying systems with inexact scheduling parameters
(Peer reviewed; Journal article, 2020)This article proposes an approach for the estimation of states, actuator, and sensor faults in nonlinear systems represented by a polytopic linear parameter varying (LPV) system with inexact scheduling parameters. In the ... -
Ad Hoc Table Retrieval using Semantic Similarity
(Chapter, 2018)We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ... -
Advancing Deep Learning to Improve Upstream Petroleum Monitoring
(Peer reviewed; Journal article, 2019)Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ... -
An interative approach for distribution chain design in agile virtual environment
(Journal article; Peer reviewed, 2005)Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ... -
Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecasting
(Peer reviewed; Journal article, 2022)The solar photovoltaics (PV) energy resources have become more important with their significant contribution to the current power grid among renewable energy resources. However, the integration of the solar PV causes ... -
Analysis of Machine Learning Based Imputation of Missing Data
(Peer reviewed; Journal article, 2023)Data analysis and classification can be affected by the availability of missing data in datasets. To deal with missing data, either deletion- or imputation-based methods are used that result in the reduction of data records ... -
Annotation Markers for runtime replication protocol selection
(Journal article; Peer reviewed, 2008)This paper presents an architecture enabling developers to easily and flexibly assign replication protocols simply by annotating individual server methods. This avoids using costly replication protocols for all object ... -
Application of Borehole Thermal Energy Storage in Waste Heat Recovery from Diesel Generators in Remote Cold Climate Locations
(Peer reviewed; Journal article, 2019-02)Remote communities that have limited or no access to the power grid commonly employ diesel generators for communal electricity provision. Nearly 65% of the overall thermal energy input of diesel generators is wasted through ... -
Architectural Risk Analysis in Agile Development of Cloud Software
(Chapter, 2019)Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ... -
An architecture for self-healing autonomous object groups
(Journal article; Peer reviewed, 2007)Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the object group paradigm, enabling construction of ... -
Are you sure it’s an artifact? Artifact detection and uncertainty quantification in histological images
(Peer reviewed; Journal article, 2023)Modern cancer diagnostics involves extracting tissue specimens from suspicious areas and conducting histotechnical procedures to prepare a digitized glass slide, called whole slide image (WSI), for further examination. ... -
Array-based logic for realizing inference engine in mobile applications
(Journal article; Peer reviewed, 2007)Mobile and wireless devices suffer from technological limitations such as limited battery life and limited memory size. Hence, use of technologies for mobile applications is confined to those technologies that are faster ...